Try our new research platform with insights from 80,000+ expert users

Gigamon Deep Observability Pipeline vs ThreatBook Threat Intelligence Platform (TIP) comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jul 6, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Gigamon Deep Observability ...
Average Rating
8.6
Reviews Sentiment
6.5
Number of Reviews
9
Ranking in other categories
Application Performance Monitoring (APM) and Observability (40th), Event Monitoring (10th), Data Loss Prevention (DLP) (29th), Security Information and Event Management (SIEM) (45th), Web Application Firewall (WAF) (34th), Advanced Threat Protection (ATP) (26th), Network Packet Broker (NPB) (1st), Network Detection and Response (NDR) (17th)
ThreatBook Threat Intellige...
Average Rating
9.6
Reviews Sentiment
7.6
Number of Reviews
4
Ranking in other categories
Threat Intelligence Platforms (17th)
 

Featured Reviews

LeonardoAlves - PeerSpot reviewer
Improved the capability to analyze the environment and network problems with easy setup
It improved the capability to analyze the environment and network problems. It also helped streamline your security and performance monitoring The application I use is a script. My environment is a mix of technologies. I have many passionate people in my network who are on a journey in…
RG
Enhancement in incident response through reduced false positives and contextual intelligence
ThreatBook has positively impacted our organization by allowing us to detect all alerts and threats effectively. In the past, we needed to search logs from various sources, including terminals, DI servers, and firewalls, collecting a lot of logs and searching the internet for contextual information about threat actors. After using ThreatBook TDP, all alerts and contexts are easily displayed on the dashboard, making it very helpful for us. During the incident response scenario, ThreatBook saves us over 80% of the time for each incident. We usually took about one day or two days for attribution and understanding how the attacker attacked us, but after using ThreatBook TDP, we usually take around one or two hours to finish all these tasks. Additionally, their AI techniques save a lot of time, allowing me to ask in natural language for explanations about the meaning and target of the attacker.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The tool's most valuable feature is the encryption feature. From a security perspective, the solution hasn't significantly strengthened our security posture. However, it has greatly improved performance by streamlining encryption processes and avoiding encryption at multiple layers. This has also simplified troubleshooting, as we can whitelist certain processes."
"It offers straightforward integration."
"The Pipeline's Comprehensive Insights into data flows have helped improve operational efficiency and security."
"The most valuable feature is NetFlow."
"It has high stability."
"The most valuable feature for improving network visibility with Gigamon is the packet filtering capability."
"The solution is straightforward to set up."
"It is a good product. It provides network visibility, which is important. Gigamon can bring some optimizations to my network. It is helpful for security inspection, and it makes my firewall work fast because my firewall doesn't have to do the inspection of the SSL connections, for example."
"We have not suffered from any attack for the past few months, which has relatively improved our network security."
"ThreatBook saves us over 80% of the time for each incident."
"ThreatBook Threat Intelligence Platform (TIP) has positively impacted our organization by helping us generate the strategic threat focus reports and aiding us in decision-making, leading to improved cybersecurity operation efficiency."
"ThreatBook saves us over 80% of time for each incident, reducing the usual time taken from one or two days for attribution to just one or two hours, thanks to their AI techniques."
 

Cons

"The Gigamon Deep Observability Pipeline should have a feature showing the traffic flow within its platform. Currently, customers have to use separate tools for monitoring, which is inconvenient. If it had its visibility feature, it would make monitoring easier and more complete without needing extra tools."
"The security should be improved."
"It only inspects a specific kind of traffic. There should be different kinds of use cases."
"Its filtering feature needs improvement."
"They should increase the solution's cluster capacity."
"Gigamon Deep Observability Pipeline needs to improve its performance. I face issues with performance because we use SPAN, and the SPAN traffic is not good."
"In terms of improvement, while the initial setup is not overly complicated, we did encounter a few issues."
"The graphical user interface could be improved."
"ThreatBook Threat Intelligence Platform (TIP) could be improved by providing more integrations to support additional platforms."
"We’ve seen strong ROI through reduced incident response times, increased threat visibility, and less time wasted on false positives."
"It would be great if ThreatBook could integrate with our ITSM system to streamline the tasks and incident management"
"I hope that ThreatBook can integrate a feature where if I detect any internal compromised hosts, I can block or isolate those compromised hosts within my internal network; that would be good."
 

Pricing and Cost Advice

"The solution is highly-priced."
"The solution's price is reasonable."
"I would rate the solution as expensive, around an eight or nine out of ten. There are other competitive solutions available."
Information not available
report
Use our free recommendation engine to learn which Event Monitoring solutions are best for your needs.
866,956 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Computer Software Company
12%
Healthcare Company
8%
Manufacturing Company
7%
Recreational Facilities/Services Company
46%
Financial Services Firm
16%
Performing Arts
7%
Real Estate/Law Firm
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business3
Midsize Enterprise1
Large Enterprise5
No data available
 

Questions from the Community

What do you like most about Gigamon Deep Observability Pipeline?
The most valuable feature for improving network visibility with Gigamon is the packet filtering capability.
What needs improvement with Gigamon Deep Observability Pipeline?
Gigamon Deep Observability Pipeline needs to improve its performance. I face issues with performance because we use SPAN, and the SPAN traffic is not good. They need to improve their performance.
What is your primary use case for Gigamon Deep Observability Pipeline?
I am working with Gigamon Deep Observability Pipeline and Firemon, and I have been working with it for a year.
What is your experience regarding pricing and costs for ThreatBook?
My experience with pricing, setup cost, and licensing is that it is cost-effective and the price is reasonable, with very good overall value and quality.
What needs improvement with ThreatBook?
I hope that ThreatBook can integrate a feature where if I detect any internal compromised hosts, I can block or isolate those compromised hosts within my internal network; that would be good. I wou...
What is your primary use case for ThreatBook?
We use ThreatBook to have overview visibility of all our assets including if there are any compromised hosts or if there are any incoming attacks from external threats. When we first deployed Threa...
 

Also Known As

Gigamon, GigaSecure
No data available
 

Overview

 

Sample Customers

Amica Insurance, College of William & Mary, Gamma, IntercontinentalExchange, OppenheimerFunds
Information Not Available
Find out what your peers are saying about Gigamon Deep Observability Pipeline vs. ThreatBook Threat Intelligence Platform (TIP) and other solutions. Updated: June 2025.
866,956 professionals have used our research since 2012.