TAP Into Technology Blog
Leading the Way in Network Technology
Supporting the SOC Visibility Triad with Network TAPs
To put it bluntly, organizational IT and security teams have never been in a more difficult position than they are today. The non-stop need for businesses to adopt any-and-all devices has significantly expanded the size of enterprise...
The 101 Series: Passive Network TAPs
Companies that are using network monitoring tools, either for analyzing security threats, packet flow or Key Performance Indicators (KPIs) – all have one thing in common. They need to ensure that those applications have access to 100% of...
The Deployment Defender: Ensuring Network Uptime with Bypass TAPs
Summary In this comprehensive blog post, we explore the critical role of bypass TAPs in inline security deployments. By providing a fail-safe mechanism, bypass TAPs protect networks from costly downtime during maintenance or upgrades of...
Part 1 – Passive Inspection of TLS 1.3 Within The Enterprise
This blog is the first in a series that looks at a NIST project “Addressing Visibility Challenges with TLS 1.3 within the Enterprise.” The home page for the project is here:...
3 Benefits of a TAP Fabric in OT Networks
Every week, I hear from industrial companies about their cybersecurity tools needing access to the data flowing through their OT networks. In a previous post, I shared why companies are constantly looking to improve their OT network...
Upgrade Cabling without Blowing the Budget
It never fails. You’re in a hurry, running late. You’re driving too fast when, suddenly, a speed bump. What was designed for safety has now created fury, as your not-so-decaf coffee instantly repaints the car’s interior an unflattering...