Try our new research platform with insights from 80,000+ expert users

Anomali vs Gigamon Deep Observability Pipeline comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jul 6, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Anomali
Ranking in Security Information and Event Management (SIEM)
34th
Ranking in Advanced Threat Protection (ATP)
22nd
Average Rating
7.8
Reviews Sentiment
7.2
Number of Reviews
4
Ranking in other categories
User Entity Behavior Analytics (UEBA) (19th), Threat Intelligence Platforms (7th), Extended Detection and Response (XDR) (27th)
Gigamon Deep Observability ...
Ranking in Security Information and Event Management (SIEM)
41st
Ranking in Advanced Threat Protection (ATP)
25th
Average Rating
8.6
Reviews Sentiment
6.5
Number of Reviews
9
Ranking in other categories
Application Performance Monitoring (APM) and Observability (38th), Event Monitoring (10th), Data Loss Prevention (DLP) (30th), Web Application Firewall (WAF) (32nd), Network Packet Broker (NPB) (1st), Network Detection and Response (NDR) (17th)
 

Mindshare comparison

As of July 2025, in the Security Information and Event Management (SIEM) category, the mindshare of Anomali is 0.3%, up from 0.2% compared to the previous year. The mindshare of Gigamon Deep Observability Pipeline is 0.1%, up from 0.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Security Information and Event Management (SIEM)
 

Featured Reviews

CC
Enables automated threat intelligence sorting and enhances proactive threat hunting capabilities
You have to have at least a threat intelligence background or a SOC analyst background to use it, as that's the information you'll dig around with in there. If you don't have that kind of knowledge, it probably can be a little hard to use, but they do provide training. They offer training not only for how to use the platform but also some basic threat intelligence training to explain what these things are and what these terms mean. My company is a customer of Anomali. I would recommend it to other people. I would advise making sure you don't pick it without testing other products and have your use cases well thought out and documented before testing, so you know it will solve the problems you're trying to address. Keep an open mind with it and realize that whatever you can dream of, you can probably do with the platform. Overall, I would rate Anomali an eight out of ten.
LeonardoAlves - PeerSpot reviewer
Improved the capability to analyze the environment and network problems with easy setup
It improved the capability to analyze the environment and network problems. It also helped streamline your security and performance monitoring The application I use is a script. My environment is a mix of technologies. I have many passionate people in my network who are on a journey in…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"We now have a very robust collection of threat intelligence based on the capabilities that Anomali provides."
"I have found Cyber threat intelligence (CTI) very useful and concise. The solution is easy to use."
"The most valuable aspect of Anomali is the threat modeling capability."
"The feature I have found most valuable is credential monitoring. This feature is easy and quick."
"It has high stability."
"The solution is straightforward to set up."
"It offers straightforward integration."
"The most valuable feature is NetFlow."
"The most valuable feature for improving network visibility with Gigamon is the packet filtering capability."
"The tool's most valuable feature is the encryption feature. From a security perspective, the solution hasn't significantly strengthened our security posture. However, it has greatly improved performance by streamlining encryption processes and avoiding encryption at multiple layers. This has also simplified troubleshooting, as we can whitelist certain processes."
"The Pipeline's Comprehensive Insights into data flows have helped improve operational efficiency and security."
"It is a good product. It provides network visibility, which is important. Gigamon can bring some optimizations to my network. It is helpful for security inspection, and it makes my firewall work fast because my firewall doesn't have to do the inspection of the SSL connections, for example."
 

Cons

"Support in the past has been top-notch, but recent trends indicate that it has taken a back seat, as we often don't get answers for days."
"Less code in integration would be nice when building blocks."
"A lot of tools can give you many features, such as CTI intelligence and a tax service reduction. However, many people are combining different tools together to have more capabilities. It is up to the consumer whether they want to have multiple tools or have one tool that serves the purpose. Anomali Enterprise could improve by combining all the other tools' features into one solution."
"An area for improvement is the intelligence sharing within the Anomali community. The tagging system can be inconsistent, as any company can use any tags for their reporting."
"The Gigamon Deep Observability Pipeline should have a feature showing the traffic flow within its platform. Currently, customers have to use separate tools for monitoring, which is inconvenient. If it had its visibility feature, it would make monitoring easier and more complete without needing extra tools."
"Its filtering feature needs improvement."
"Gigamon Deep Observability Pipeline needs to improve its performance. I face issues with performance because we use SPAN, and the SPAN traffic is not good."
"The security should be improved."
"In terms of improvement, while the initial setup is not overly complicated, we did encounter a few issues."
"The graphical user interface could be improved."
"They should increase the solution's cluster capacity."
"It only inspects a specific kind of traffic. There should be different kinds of use cases."
 

Pricing and Cost Advice

"When comparing the price of Anomali Enterprise to other solutions it is in the medium to high range. However, I am satisfied with the price."
"The solution is highly-priced."
"The solution's price is reasonable."
"I would rate the solution as expensive, around an eight or nine out of ten. There are other competitive solutions available."
report
Use our free recommendation engine to learn which Security Information and Event Management (SIEM) solutions are best for your needs.
863,429 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
17%
Computer Software Company
12%
Manufacturing Company
7%
Government
7%
Financial Services Firm
15%
Computer Software Company
14%
Healthcare Company
7%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What needs improvement with Anomali ThreatStream?
An area for improvement is the intelligence sharing within the Anomali community. The tagging system can be inconsistent, as any company can use any tags for their reporting. Combining all aliases ...
What is your primary use case for Anomali ThreatStream?
I use Anomali ( /products/anomali-reviews ) for threat hunting, threat collection, operationalization of intelligence, such as indicators of compromise (IOCs), and dissemination of reports for repo...
What advice do you have for others considering Anomali ThreatStream?
For new users, I recommend taking the training provided by Anomali as it is very well articulated. I advise reading the user manual and taking the instructor-led training sessions from the customer...
What do you like most about Gigamon Deep Observability Pipeline?
The most valuable feature for improving network visibility with Gigamon is the packet filtering capability.
What needs improvement with Gigamon Deep Observability Pipeline?
The challenge is monitoring the cloud network. In on-premises environments, monitoring is straightforward, as I can verify all packets and communications. However, due to the way access tools and p...
What is your primary use case for Gigamon Deep Observability Pipeline?
It improved the capability to analyze the environment and network problems. It also helped streamline your security and performance monitoring.
 

Also Known As

Match, Lens, ThreatStream, STAXX, Anomali Security Analytics
Gigamon, GigaSecure
 

Overview

 

Sample Customers

Bank of England, First Energy, UBISOFT, Bank of Hope, Blackhawk Network
Amica Insurance, College of William & Mary, Gamma, IntercontinentalExchange, OppenheimerFunds
Find out what your peers are saying about Anomali vs. Gigamon Deep Observability Pipeline and other solutions. Updated: July 2025.
863,429 professionals have used our research since 2012.