Blogheader image.png

TAP Into Technology

Leading the Way in Network Technology

Understanding Advanced Features in a Network Packet Broker

Network Packet Brokers (NPBs) have come a long way from their modest roots as data monitoring switches, though their intended application remains nearly the same.  The NPB is still primarily used as a device to maximize the performance of monitoring and security tools. The NPB’s most important features remain unchanged, these includes, 1:1, 1:N, N:1, and N:N port mappings, full L2-L4 filtering options, and configurable load balancing options.  In the pursuit of gaining a competitive advantage, vendors continue to add advanced features. This adds complexity in selecting the right product for your network. The key to selecting the right product is the understanding of each advanced feature and its alternatives. Looking at Deduplication, SSL/TLS decryption, and Netflow generation are a good place to start.
Read More

Challenges of Defending the Internet of Things

on 7/10/18 8:00 AM By | Chris Bihary | 0 Comments | Network Security
Do you remember what you were doing on October 21, 2016? Probably not, but I can tell you what you weren’t doing. You weren’t on Twitter, Spotify, Netflix, Reddit, Tumblr, or visiting so many other major websites.
Read More

Back to the Basics: What is Network Monitoring?

on 7/5/18 8:00 AM By | Chris Bihary | 0 Comments | Network Visibility/Monitoring
Network monitoring is far from a new topic. However, with so many new networking trends and applications demanding attention, it’s easy to lose focus on network monitoring despite the fact that it’s so critical to long-term business success.
Read More

Design-IT: Reverse Bypass Mode

on 7/3/18 8:00 AM By | Jonathan Devoy | 0 Comments | Network Security DesignIT
There have been quite a few posts about the benefits of Bypass TAPs and how they can keep the network up and running in the event an inline appliance fails. But what about situations where the inline appliance is the main source of security for the network, and the company has zero tolerance for unsecured traffic? In those cases, the Bypass TAP has a “Reverse Bypass Mode” to accommodate for just that.
Read More

Cybersecurity Threat Breakdown [MyHeritage, Coca-Cola]

on 6/28/18 8:00 AM By | Chris Lauzze | 0 Comments | Network Security Hacks and Data Breaches
Here’s your monthly roundup of the latest hacks and data breaches around the world. In this monthly series, we’ll share information and updates on the most recent hacks that have made headlines, including causes, resolutions, and what you can do to protect your data.
Read More

A Brief History of Multi-mode Fiber; Are you ready for what’s next?

on 6/21/18 8:00 AM By | Jerry Dillard | 0 Comments | Data Center Network Infrastructure
The magnitude of what we can do on any given mobile device has grown exponentially over the past few decades; our productivity is no longer dependent upon the ability to commute to work, but rather our connectivity to those we work with, network around, or hope to engage.
Read More