GCM provides both confidentiality and data origin authentication, can be efficiently implemented in hardware for speeds of 10 gigabits per second and above, and is also well-suited to software implementations.
RFC-5288 defines TLS Cipher Suites that use AES-GCM with RSA, DSA, and Diffie-Hellman-based Key-Exchange mechanisms.