Blogheader image.png

TAP Into Technology

Leading the Way in Network Technology

How to capture and analyze all your network traffic

on 10/18/18 8:00 AM By | John Gamble | 0 Comments | Technology Partners Network Visibility/Monitoring
Since virtually all attacks cross the network, security professionals need to make fast sense of what’s actually happening with their traffic. Easier said than done, however, given the challenges associated with: Reliably and cost-effectively capturing all the traffic Reliably transforming that traffic into security-usable data
Read More

Network Engineer’s Guide to Reducing Mean Time to Resolution

on 10/16/18 8:00 AM By | Tim O'Neill | 0 Comments | Network Management Network Design
The days of siloed IT infrastructures are quickly ending as services, applications and network components become more interdependent. IT infrastructures are becoming more complex and it’s falling on your shoulders to keep mean time to resolution (MTTR) metrics at a reasonable level. Research shows that the average MTTR in medium-density desktop support centers is nearly 10 hours—but this doesn’t paint a complete picture of the problem.
Read More

The 101 Series: Breakout Network TAPs

on 10/11/18 8:00 AM By | George Bouchard | 0 Comments | Network TAPs Network Design The 101 Series
I recently wrote a blog about the six different types of network TAPs with a brief overview of each TAPs functionality. In this blog, I’m going to explain in detail more about how the breakout or commonly referred to 'normal' TAP mode operates.  Let's talk breakout TAP mode...
Read More

Ensure Digital Integrity to Comply with GDPR

General Data Protection Regulation (GDPR) is a mandated regulatory standard designed to unify data privacy and security requirements. This regulation affects companies that provide services within the European Union; however, any company that provides services over the internet can be subject to this regulation.  With the ubiquity of internet based services, whether it is social media, streaming content, shopping or accessing your personal records online, personal data privacy and security practices will need to be regulated. Adoption is currently taking place in other regions around the world while using GDPR as a model to scrutinize privacy and security practices.
Read More

Cybersecurity Threat Breakdown [Bristol Airport +SHEIN]

on 9/27/18 8:00 AM By | Erica Tank | 0 Comments | Network Security Hacks and Data Breaches
With years of experience in the technology industry, headlines about cyber attacks and data breaches stand out to me. Here’s your monthly roundup of the latest hacks and data breaches around the world. In this monthly series, I’ll share information and updates on the most recent hacks that I saw in the news, including causes, resolutions, and what you can do to protect your data.
Read More

Using a Breakout Cable with a Breakout TAP

on 9/25/18 8:00 AM By | Jonathan Devoy | 0 Comments | Network TAPs
A term that is often used when discussing the advantages of using an aggregation appliance is "Speed Conversion." Speed conversion enables communication between Multimode 40Gb or 100Gb connections, using MTP/MPO connectors, and with 10Gb or 25Gb connections using LC connectors. This mismatch of connection media is bridged through the use of a breakout cable.
Read More