TAP Into Technology Blog
Leading the Way in Network Technology
The Deployment Defender: Ensuring Network Uptime with Bypass TAPs
Summary In this comprehensive blog post, we explore the critical role of bypass TAPs in inline security deployments. By providing a fail-safe mechanism, bypass TAPs protect networks from costly downtime during maintenance or upgrades of...
Part 1 – Passive Inspection of TLS 1.3 Within The Enterprise
This blog is the first in a series that looks at a NIST project “Addressing Visibility Challenges with TLS 1.3 within the Enterprise.” The home page for the project is here:...
3 Benefits of a TAP Fabric in OT Networks
Every week, I hear from industrial companies about their cybersecurity tools needing access to the data flowing through their OT networks. In a previous post, I shared why companies are constantly looking to improve their OT network...
Upgrade Cabling without Blowing the Budget
It never fails. You’re in a hurry, running late. You’re driving too fast when, suddenly, a speed bump. What was designed for safety has now created fury, as your not-so-decaf coffee instantly repaints the car’s interior an unflattering...
The 101 Series: Bypass Network TAPs Protectors of the Critical Link
Introduction Typically, a network TAP (test access point) is a device that creates a full duplex copy of 100% of the network traffic flowing between the two (2) connected devices. The Bypass TAP functions differently than the traditional...
3 Key Considerations When Building an Effective Cyber Fly-away Kit (FAK)
For professionals operating in cybersecurity or IT within the Department of Defense, cyber Fly-away Kits (FAKs) are mission-critical tools. When responding to remote deployments or securing on-the-ground environments, a well-equipped FAK...