TAP Into Technology | Blog

Network TAP vs SPAN Port: Putting Them to the Test

Posted by Chris Greer on 4/27/17 8:08 AM

For years now we all have read about the difference between data capture off a span/mirror port and an inline network TAP. In fact, many of those comments have come from one of the great moderators of lovemytool.com, Tim O'Neill, the @OldCommGuy who loves the TAP side of the ring.

Packet Pioneer was interested to see the difference between a data stream captured on a network TAP versus a SPAN port. So they set up a test with a few PCs, a TAP, a SPAN port, a couple of hardware network analyzers, and a healthy stream of data.

The results were interesting, to say the least: The study showed that Tim O’Neill is correct!

Read More

Topics: Network TAPs, TAPs vs SPAN, Network Security

McAfee Resurrection - Can Real Collaboration Exist in the Security Ecosphere?

Posted by Chris Bihary on 4/25/17 8:00 AM

At Intel Security’s Focus 2016 conference, a small group of Security Innovation Alliance partners (SIA) gathered for an invitation-only session to learn about Intel Security changes - where the big 'McAfee is back' announcement was made.

This was an exciting and welcoming announcement for all to hear, because it allows for a pure-play security focus, as well as McAfee to once again be nimble.

However, the message that resonated with me the most was the overall encouragement for SIA partners to collaborate within the security ecosphere - which is the game changer.

Read More

Topics: Network Security, Technology Partners

[Get the Data You Want] Simplify PCI DSS Compliance with an MSSP

Posted by Darrick Kristich on 4/20/17 9:04 AM

For years, the financial services industry was the most targeted industry for sophisticated cyber attackers (and some not so sophisticated). This was never too surprising—attackers often follow the money, starting with the low hanging fruit.

Out of all the credit card breaches that have been made public in the last several years, not many (if any) companies were truly compliant Payment Card Industry Data Security Standards (PCI DSS) compliance.

At the same time, being compliant also doesn’t mean that you are truly protecting the data that is important. 

Read More

Topics: Network Infrastructure, Network Security, Network Visibility/Monitoring

[Infographic] What Security Tools are you Deploying in your Network?

Posted by Chris Bihary on 4/18/17 8:00 AM

What tools are you deploying in your network? Are you securing your network with tools such as DDoS, NGFWs, Secure Sockets Layer or Data Loss Prevention?


There’s a TAP for that.

 


Read More

Topics: Network TAPs, In Band Security Appliances

­­­MSSPs: The Pros and Cons of Outsourcing Network Security

Posted by Chris Bihary on 4/13/17 8:00 AM

When firewalls emerged to protect networks in the early 1990s, outsourcing cyber security to a Managed Security Service Provider (MSSP) wasn’t even a consideration.

However, defending your network from sophisticated cyber attackers today requires a laundry list of appliances and applications, including: DDoS protection, intrusion prevention systems, web application firewalls, data loss prevention, security information and management, deep packet inspection, Wireshark, network analyzers, and lawful intercept. 

With so many requirements just from a hardware and software perspective, it’s easy for companies to become overwhelmed by their growing cyber security budget. Like many other aspects of your business, outsourcing security might make sense now—but do your research before deciding.

Before diving into the world of MSSPs, check out these pros and cons to see if outsourcing security is right for you.

Read More

Topics: Network Security

[Video] How To Determine DHCP Option 60 Value Using Wireshark

Posted by Tony Fortunato on 4/11/17 8:00 AM

There are an increasing number of network attached devices, and trying to keep them organized gets to be challenging. Since different devices might require different IP configuration settings and statically configuring them isn’t realistic.

There are several approaches to deal with this.

Read More

Topics: Network Visibility/Monitoring, Wireshark