Gigamon is a company that provides network visibility and security solutions that help organizations monitor, manage, and protect their data across cloud, hybrid, and on-premises environments. Pulse 2.0 interviewed Gigamon Chief AI and Security Officer Chaim Mazal to gain a deeper understanding of the company.
Chaim Mazal’s Background

Could you tell me more about your background? Mazal said:
“I am the Chief AI and Security Officer (CAISO) at Gigamon, where I oversee the security of Gigamon solution offerings as well as the company’s global security, artificial intelligence (AI), information technology, network operations, governance, risk, compliance, and internal business systems. I have more than a decade of cybersecurity experience and have served in several executive IT and security positions at companies such as Kandji, ActiveCampaign, Avant, Uptake, and more. Since joining Gigamon, I have spearheaded efforts to make hybrid cloud infrastructure more secure and resilient while strengthening security offerings for Gigamon, its partners, and its customers.”
Core Products
What are the company’s core products and features? Mazal explained:
“The Gigamon Deep Observability Pipeline delivers network-derived telemetry (packets, flows, metadata) to cloud, security, and observability tools that have traditionally relied on MELT (metric, event, log, and trace) data. The powerful combination of telemetry + MELT data delivers deep observability, which helps organizations eliminate blind spots, optimize network traffic, and lower the cost and complexity of securing and managing hybrid cloud infrastructure.”
“The GigaVUE Cloud Suite, part of the Deep Observability Pipeline, helps organizations gain the visibility and intelligence for cloud security and observability tools. The GigaVUE Fabric Manager simplifies and automates configuration and management of the Deep Observability Pipeline by enabling management and monitoring of all physical and virtual nodes across on-prem, virtual, or cloud deployments.”
“To help organizations secure and manage hybrid cloud infrastructure, Gigamon has embedded AI into the Deep Observability Pipeline to deliver intelligent visibility, uncover Shadow AI, and enhance operational efficiency. Gigamon uniquely tackles the growing challenge of AI-generated traffic, something traditional tools like firewalls, SIEMs, and endpoint agents struggle to handle effectively, with Gigamon AI Traffic Intelligence. This further strengthens cyber defenses and lowers operational cost and complexity, a need that’s growing as generative AI-driven workloads amplify network data volumes and demand ultra-responsive visibility.”
AI Reshaping Threat Landscape
In what ways will AI reshape the threat landscape—and what should security leaders do to stay ahead of adversaries? Mazal explained:
“Breach rates are rising, AI threats are rapidly evolving, and the sheer volume of data is pushing conventional security tools to their limit. Traditional threat detection and prevention models no longer hold. Today’s Security leaders must recalibrate risk in real time, respond to emerging vulnerabilities, and lead at the intersection of visibility, control, and business strategy.”
“As AI accelerates complexity, complete visibility is emerging as a defining success factor for cybersecurity strategies. The ability to monitor all data in motion, particularly lateral East-West traffic across hybrid environments, is what transforms fragmented signals into actionable intelligence. This priority is gaining urgency. According to the Gigamon 2025 Hybrid Cloud Survey, 83 percent of CISOs reported they believe that effective cloud security depends on visibility into all data in motion. As a result, real-time threat monitoring and visibility across all data in motion was named the top priority to optimize defense-in-depth strategy.”
“The threat surface fueled by AI is also expanding. We’re seeing an increase in ransomware attacks powered by AI and nearly half of the respondents in our survey reported an increase in attacks targeting their organization’s LLMs.”
“Lastly, Shadow AI is another emerging challenge. As GenAI workloads multiply, organizations face surging data volumes, expanding attack surfaces, and growing security risks. One of the most fundamental challenges is simply knowing which AI services are in use. Many teams are struggling with identification of Shadow AI, or unsanctioned AI usage, in order to reduce risk and improve oversight.”
Challenges Faced
What are the main challenges for CISOs in cloud environments? Mazal acknowledged:
“CISOs are under mounting pressure as hybrid cloud environments grow more distributed, dynamic, and difficult to secure. What was once seen as a trade-off for agility is now a major liability—75% of CISOs say public cloud presents the greatest security risk of any environment, and nearly three-quarters are considering moving sensitive workloads back to private clouds. As AI advances digital transformation, it also introduces unprecedented complexity, outpacing the capabilities of conventional security and management tools. Visibility remains a core issue, especially in lateral East-West traffic, which nearly half of CISOs admit they still can’t fully monitor. As a result, 97 percent of CISOs reveal they are making compromises in how they secure and manage their hybrid cloud infrastructure.”
“Another area Security leaders should address is that despite growing expectations, CISOs are still navigating unclear lines of ownership when it comes to cybersecurity strategy, decision-making, and funding. Bridging this gap starts with alignment across the leadership team, including the board. This becomes even more critical – and urgent – in the age of AI.”
Influencing Enterprise AI Governance
How can security leaders influence enterprise AI governance and cloud policy at the executive level? Mazal concluded:
“The governance of AI isn’t a job for Security or IT alone; it’s now a board-level priority. Many organizations, like ours, are forming AI governance committees that include the CEO, CISO, CRO, and General Counsel. The committee is tasked not just with setting rules, but with defining the organization’s risk appetite, monitoring AI use, and steering compliance.”
“Engaging leaders across functions ensures not only alignment with a security-first mindset, but also a deep understanding of departmental use cases—enabling the organization to adopt AI in the most strategic and lowest risk way. The reality is that true governance isn’t a set of rules—it’s cultural. A security-first culture defines how AI is used and by whom, but also ensures it’s applied in ways that are safe, transparent, and genuinely beneficial to both employees and the organization.”
“As important, CISOs need to establish ongoing communication with the board. It’s critical to provide regular updates on security improvements and their impact on the organization, to maintain the board’s support and emphasize the value of security investments. Even brief, twice yearly updates on security initiatives across various parts of the business will help CISOs align policies and value.”
“And CISOs are well aware of the important role the board plays, with over one-third (36%) of CISOs stating that direct input into business decisions around AI adoption and security risk would help strengthen the CISO-board relationship.”