Visibility Solutions

Garland Technology is committed to educating the benefits of having a strong foundation of network visibility and access. By providing this insight we protect the security of data across your network and beyond.

Resources

Garland Technology's resource library offers free use of white papers, eBooks, use cases, infographics, data sheets, video demos and more.

Blog

The TAP into Technology blog provides the latest news and insights on network access and visibility, including: network security, network monitoring and appliance connectivity and guest blogs from Industry experts and technology partners

Partners

Our extensive technology partnership ecosystem solves critical problems when it comes to network security, monitoring, application analysis, forensics and packet inspection.

Company

Garland Technology is dedicated to high standards in quality and reliability, while delivering the greatest economical solutions for enterprise, service providers, and government agencies worldwide.

Contact

Whether you are ready to make a network TAP your foundation of visibility or just have questions, please contact us. Ask us about the Garland Difference!

TAP Into Technology Blog

Leading the Way in Network Technology

5 Steps Healthcare Networks Can Take To Prevent Ransomware Attacks

The disruption COVID-19 has wrought on society presented many opportunities for people to display their best and worst qualities.  I recently saw a video referencing a remark Amy Poehler made in her memoir, Yes Please that stuck with me....

Read More

Optimizing Network Productivity and Application Performance

As a network administrator, you are responsible for troubleshooting poor application performance problems. In an ideal world, Application Performance Management (APM) or Application-aware Network  Performance Management (AANPM) solutions...

Read More

Packet Deduplication Explained

Duplicate packets are one of those things that happen in a busy network. Although using different network equipment and optimizing your network will minimize duplicates, they’ll still crop up on a fairly regular basis. This can be a...

Read More

How to Improve Application Performance Monitoring

As an IT professional, you already know that IT downtime is expensive. It costs organizations, on average, $5,600 for every minute of downtime. But we live in an on-demand world, where customers expect fast, consistent access to your...

Read More

Improving Fly-Away Kit Visibility for Tactical Federal Teams

"Fly away" kits have been in use by the federal government for years, gaining widespread adoption around 2015, with the Army's first Cyber Innovation Challenge. "The speed of technology, combined with always-changing threats, demand that...

Read More

3 Visibility Tips to Improve your Monitoring and Security Tools

We have been speaking with more and more IT teams looking to stretch their budgets to meet tomorrow’s monitoring and security challenges. Speed and network complexity are outpacing tools they bought as recently as 5 years ago. On top of...

Read More

Security in the Wake of Overnight Remote Work From Home Access

In a mad dash to enable a distributed workforce amid the COVID-19 pandemic, IT teams had to make difficult compromises to keep their businesses running. Unfortunately, some of their well-intentioned actions resulted in misconfigurations...

Read More

What Is a Packet Analyzer?

Imagine this: one of the applications running on your network is performing poorly, and you have no idea why. You've checked out all the usual suspects and can't find the issue that needs to be repaired. You're going crazy trying to...

Read More

Network Packet Brokers Explained

We all know traffic across the data center is increasing. The migration towards 100G ethernet is well underway, with 28% of data centers undergoing the upgrade as of 2018. Meanwhile, 400G ethernet is available and creeping towards...

Read More

Managing Your Unmanageable OT and IT Infrastructure

As industrial systems become increasingly connected to IT, Cloud and ERP systems, they become increasingly exposed to cyber threats such as ransomware. In fact, cyber threats for industrial control systems (ICS) are on the rise. Asset...

Read More

Firewall Primer: Best Practices for Avoiding Downtime

Firewalls are the most recognized security tool for safeguarding your network and are a critical component of any security infrastructure. Firewalls are considered the gatekeeper for most network security architectures, allowing only...

Read More

How to Defend Against DDoS Attacks and Network Downtime

Somedays, it feels like the whole internet is slowing down, or like the critical applications you use on a day-to-day basis aren’t responding. Sometimes, that feeling isn’t just you (or the result of your slow computer). Instead, it’s the...

Read More

7 Threat Hunting Best Practices to Keep Your Network Secure

Threat hunting is one of the few IT terms I've come across that probably sounds cool to people who aren't engineers.  But cyber threat hunting is more than just an industry buzzword—or an edgy-sounding skill to add to your resume. It's...

Read More

How To Deliver Total Network Visibility and Threat Detection

Bricata and Garland recently announced a partnership to deliver a joint solution that accelerates network threat detection and response. We recently spoke with Andre Ludwig, Chief Product Officer of Bricata about the solution.  Can you...

Read More

Why Cybersecurity Relies on Redundancy to Ensure Network Availability

Today, 50% of large enterprises are spending over $1 million annually on cybersecurity.1 The worldwide information security market is forecast to reach over $170 billion by 2022, as enterprises are making huge investments when it comes to...

Read More

IDS vs IPS Go-to Tools for Modern Security Stacks

As new threats emerge every day, the risks companies face not properly securing network data is growing more widespread and costly than ever. 15% of data breaches involve Healthcare organizations, 10% in the Financial industry and 16% in...

Read More

Adapting to New Security Demands at the Edge

In Part 1 of this “Master the Edge of the Network” series, we talked about the key networking factors you have to consider managing the edge of the network to gain these edge computing benefits. But edge computing isn’t without challenges....

Read More

How Historical Look-back is Revolutionizing Network Forensics and Inline Deployment

As you can imagine, cyberattacks are now increasing year over year from a combination of cybercriminals, hackers, malicious insiders, unwitting insiders, nation-state attackers and hacktivists. Their attack methods include social...

Read More

The 101 Series: Out-of-Band vs Inline Network Security

Designing a modern cybersecurity strategy is no easy feat, as it must protect all components of a complex network, while having a limited effect on performance. As expected, we get a lot of questions about the differences between an inline...

Read More

Bridging the IT, OT and IOT Divide

Visibility and asset management has to be the cornerstone of modern Operational Technology (OT) security architecture and digital transformation. To secure Industrial Control Systems (ICS) and reap the productivity benefits of IT-OT...

Read More

How to Manage the Network Edge

The ability to detect and remediate cyber attacks pose an existential threat to IT organizations worldwide. A study from IBM and Ponemon found that companies that detect and contain data breaches within 30 days save, on average, more than...

Read More

Using Load Balancing to Improve Your Security Solution

Packet brokers play an essential role in creating a visibility fabric that spans your entire network. And as you evaluate the market for network packet brokers (NPB) or inline packet brokers, you’ll notice that many vendors offer a...

Read More

Packet Capture: You Can’t Protect What You Can't See

Packet capture is the ultimate tool for troubleshooting your network and protecting it from cyber threats. As important as your advanced security and monitoring tools are, there are two primary reasons why they make incident response and...

Read More

Reducing Network Complexity for an Oil & Gas Giant

With the digital revolution Oil & Gas (O&G) companies are facing, integrating their operations environments through AI, robotics, analytics, and the Internet of Things (IoT), with increasing connectivity chasing the ultimate goal of faster...

Read More

Monitor and Maintaining Your Zero Trust Environment

Cybercrime on local and state governments is continuing to rise, as cybercriminals understand the government possesses lots of data and information that are vital and highly classified. The risks to these federal IT systems are increasing,...

Read More

Debugging and Troubleshooting Performance Issues with the FieldTAP

With the launch of Garland Technology’s new FieldTAP, one of the perks I can boast about is getting to test and use new technology. Especially working remotely, I was excited to have such a versatile TAP to add to my gear. With the new...

Read More

SCADA Security Starts with Network Visibility

Supervisory control and data acquisition systems (SCADA), or industrial control systems (ICS), have been monitoring and controlling our industrial, power and refinery world since the 1960s. SCADA started out analog, focused on monitoring...

Read More

Building A Zero Trust Visibility Architecture

In response to rapidly evolving cybersecurity threats, Zero Trust, a concept that emerged over 15 years ago, is now a strategic priority for government network agencies. Following reports from the Defense Innovation Board (DIB) and the...

Read More

How an MDR Service Provider Selects the Best Visibility Vendors

As more organizations use managed detection and response (MDR) services, Garland Technology decided to find out how an MDR Service Provider selects the best vendors to partner with. Sherri Lloyd, Strategic Partner Manager at Garland...

Read More

How to Troubleshoot the Network Part 2: Solving Network Forensics Problems

Part 1 in this two-part series on how to troubleshoot the network focused on the most common challenges you’ll face—connectivity, performance, and latency troubleshooting scenarios. And in a perfect world, these would be the most difficult...

Read More

7 Common Visibility Challenges in Industrial Environments

The convergence of Operational Technology (OT) with Information Technology (IT), has exposed many challenges for the industrial space, including increased vulnerability to cyber attacks and network blindspots. Unfortunately, many companies...

Read More

How to Provide Visibility to the DoD’s Zero Trust Cloud Security Initiative

As the United States Department of Defense (DoD) undertakes the largest cloud migration in history, beginning with Microsoft’s winning bid for the Joint Enterprise Defense Infrastructure project, data security in the cloud is of paramount...

Read More

TAP THE NETWORK, TAP A KEG

In today's IT environments, everything is interconnected, and here at ExtraHop, we believe that the best source for visibility into how those interconnected tools are functioning as a whole, is the network. We believe this—not because the...

Read More

How to Troubleshoot the Network Part 1: Common Problems and the Tools to Solve Them

The availability of your network and IT services can make or break business performance. A full-blown outage costs 86% of companies more than $300,000 per hour with 34% saying the costs would exceed $1 million per hour. But it’s not just...

Read More

Providing Visibility to your Industrial SCADA Virtualization Environment

With ever-present and growing security threats from both foreign and domestic sources, safeguarding utility networks and communication infrastructure has become paramount to protecting utility grids from hacking and providing uninterrupted...

Read More

What is Network Visibility and How to Guarantee 100% Data Capture

Network visibility has never been more important to the success of a business, regardless of industry. Addressing increasingly demanding business requirements has led to highly complex IT environments. And unfortunately, blind spots have...

Read More

Why You Need Cloud Performance Monitoring For Network Visibility

By moving workloads to a cloud IaaS (Infrastructure-as-a-Service) platform, you may think your infrastructure layers are completely outsourced, including the network side, and don’t need cloud performance monitoring.  You might also assume...

Read More

Using Packet Capture to Enhance Public Cloud Confidence

When moving to the cloud, application data security remains a chief concern among CIOs, DevOps, NetOps and SecOps teams. While the advantages of moving apps to the cloud is clear, well-run IT organizations refuse to risk a security slip in...

Read More

Single Points of Failure: Understanding and Eliminating Them from Your Network

With so many mission-critical processes relying on network connectivity, data center outages simply can’t be tolerated. And yet, nearly one-third of all data centers experience an outage annually. According to an ITIC survey, 86% of...

Read More

Provide Visibility and Improved Operational Efficiency for Banking Cloud Endpoints

With the migration to cloud networks underway, companies are focused on the long term benefits of lowering their costs, utilizing faster innovation and improving customer satisfaction. Many industries have been taking a wait and see...

Read More

How Does Garland Prisms work with Azure?

By now, we all know due to the rapidly evolving digital transformation, Amazon, Microsoft and Google have all created environments where infrastructure and networking is elastic, on-demand and extremely fast. As part of this three part...

Read More

Building a Modern Observability Stack with Garland, Corelight, and Humio

From Packets to Logs to Dashboards   Beginning with packets In its most basic form, data travels across the internet in packets — each carrying a maximum of 1,500 bytes — until they reach a pre-determined destination. As packets arrive,...

Read More

Air Gapping: An Added Layer of Security for Industrial Cloud Environments

Despite ever-increasing cybersecurity budgets, attackers continue to find ways around network defenses and are on track to cause over $6 trillion in damages annually by 2021. As cloud adoption continues to grow, attackers are taking...

Read More

How does Garland Prisms work with AWS?

The advantages of public cloud computing can’t be beat. Companies around the world are taking advantage of the cost-saving measures associated with public cloud to help scale their infrastructure, provide disaster recovery services,...

Read More

Network Packet Visibility for Hybrid Cloud Environment

Nearly all cyber attacks must cross the network, so extracting security-relevant data from network traffic is essential across a wide range of security operations. As teams are moving to the cloud, they lose physical access to applications...

Read More

What is SSL and TLS and How it Works in Today’s Security

As today’s enterprises deploy more software to the cloud, while integrating software-as-a-service (SaaS) applications into their critical business infrastructure, the need for security and monitoring is obvious. With this need, SSL/TLS...

Read More

Monitoring Business Critical Application in the Cloud with Garland Prisms and Flowmon

When you’re driving on a foggy day, how can you stay safe when you can’t even see the road in front of you?  Blind spots in the car are similar to blind spots within your cloud-based data center if not properly monitored.  Securing your...

Read More

How to Mirror Packets to your Monitoring Tools in AWS and Public Cloud Environments

Traffic visibility is a crucial component in securing a business and keeping systems operational. Organizations have made significant investments in specialized tools that ingest and analyze packet-level data for on-premise data centers....

Read More

Networking News [2019 Recap]

The networking world is ever-changing, with new monitoring and security tools entering the market, companies introducing exciting new technology, partnerships being formed to create disruptive solutions, and more. With so much noteworthy...

Read More

Don’t Choose The Wrong Network TAP

If you’ve previously read the Garland Technology blog, you know the importance that network TAPs have with regard to guaranteeing your network security and visibility. These devices provide a complete copy of traffic, passing data to your...

Read More

Considerations to Building a Test Lab Environment [Part 1]

Today’s increasing needs in the digital world require us to not live in the present, but look towards the future. Not just in technology, but in the way we do business. Hyper cloud, hybrid cloud, the cloud, the cold front without clouds,...

Read More

Cyber Security Threat Breakdown [2019 Recap]

Over the past year, we have seen way too many hacks and data breaches in the headlines. Here is your roundup of the largest cyber attacks from 2019, including causes, resolutions, and what you can do to protect your data. 

Read More

What’s Your Palo Alto NGFW Deployment Plan?

A firewall is a network security device that monitors both incoming and outgoing network traffic, and based on a set of rules, decides whether to allow or block that traffic, protecting the network. Whether you are replacing a legacy...

Read More

Top 10 Security Challenges of 2019

In 2019 our team was at dozens of trade shows and conferences around the world. While we were out in the field, we surveyed thousands of people at events like CiscoLive, InfoSec, RSA, Cyber Security Summits, and FutureCons, asking them,...

Read More

Become a JEDI Master with Cloud Packet Visibility

Have you noticed the word “Jedi” frequently pops up in news headlines lately? Star Wars fans around the world impatiently wonder how the famous conflict between the Jedi and the Sith will conclude when “Star Wars: Rise of Skywalker” hits...

Read More

Cyber Security Threat Breakdown [Louisiana + Disney+]

Here’s your monthly roundup of the latest hacks and data breaches around the world. In this monthly series, I’ll share information and updates on the most recent hacks that I saw in the news, including causes, resolutions, and what you can...

Read More

How can your company become a leader in cloud security?

As companies continue to migrate workloads to the cloud, it’s quickly becoming clear that security strategies need to be re-evaluated and redesigned with these new tools and resources at the forefront. When you’re in planning mode to...

Read More

Networking News [Hospital Breaches Prove Fatal + California Privacy Laws]

Here are some snippets of news and stories happening around the technological world and how it can affect the industry as a whole. For the month of November,  we will be focusing on effects on hospital breaches, tips to avoid network...

Read More

4 Ways to Achieve Reliable Security in an Enterprise Network

How do you bring more security and reliability to your own network in a responsible manner? Garland Technology partnered with Flowmon to address the ongoing challenges that defy these exact questions. Together, we have identified a...

Read More

Failsafe Deployment of 100G Inline Security Tools with EdgeSafe Bypass TAPs

Today’s networks have become sophisticated defense mechanisms, architected with numerous inline security tools such as firewalls, intrusion prevention systems, web application firewalls, data loss prevention, SSL decryption and more. While...

Read More

­­­MSSPs: The Pros and Cons of Outsourcing Network Security

 When firewalls emerged to protect networks in the early 1990s, outsourcing cyber security to a Managed Security Service Provider (MSSP) wasn’t even a consideration. However, defending your network from sophisticated cyber attackers today...

Read More

Making a Case for Network TAPs to Provide Digital Legal Evidence

Sometimes we come across interesting requests from customers that are outside the normal security and monitoring applications within data centers or branch office locations. Recently, a law enforcement agency reached out to Garland...

Read More

Cybersecurity Threat Breakdown [Spooky Edition]

There’s nothing spookier than an unknown hacker accessing your data. Here’s your monthly roundup of the latest hacks and data breaches around the world. In this series, I’ll share information and updates on the most recent hacks that I saw...

Read More

Why is the cost of network downtime so high in the banking industry?

The banking industry has changed. Today’s retail banks are actually in the customer service industry. This is due to the fact that there is very little differentiation in product offerings from one bank to another. A checking account, CD,...

Read More

Lights, Camera, Security! Cisco Shines a Spotlight on Garland Technology With Threatwise TV

The strong relationship with Cisco and Garland Technology encompasses a host of supported products. At this year’s CiscoLive in San Diego, our alliance laid the foundation for an interview with Jason Wright on Cisco’s Threatwise TV....

Read More

Improve Network Packet Broker ROI with an Aggregation Layer

The aggregation layer, and thus the four-tiered approach to network visibility grew out of the need to maximize the ROI of NPBs and monitoring and security tools. Before we talk about the aggregation layer and the benefits it brings, let’s...

Read More

Networking News [Tool Sprawl + MSP Credibility]

Here are some snippets of news and stories happening around the technological world and how it can affect the industry as a whole. For the month of October,  we will be focusing on what is a tool sprawl,  questioning an MSP provider's...

Read More

Microservices: What Are They and How Do They Impact Network Visibility and Security in the Cloud?

After decades of consistent investment in perimeter cybersecurity tools, cloud-based architectures have pushed IT leaders to reevaluate their strategies. There is still a place for perimeter defenses like firewalls, intrusion detection...

Read More

Garland Prisms: A New Cloud Visibility Solution

The cloud is the future of networking. Over the last few years, we’ve heard from more and more of our customers that they are considering public or private cloud as an option to either supplement or replace some of their traditional data...

Read More

Cyber Security Threat Breakdown [Simjacker + Ecuador]

Here’s your monthly roundup of the latest hacks and data breaches around the world. In this monthly series, I’ll share information and updates on the most recent hacks that I saw in the news, including causes, resolutions, and what you can...

Read More

3 Challenges to Consider When Building Your Cloud Security Strategy

As a result of the widespread adoption of public and private cloud, companies must rethink their network security strategies. While it’s tempting to think that you can just leave cloud security to your cloud provider, it’s too important...

Read More

Capture 100% Full Duplex Traffic with RegenTAPs

With the rise in the number of monitoring tools enterprises are using to analyze their network traffic, a new problem has arisen; how will you get network traffic to multiple out-of-band monitoring tools? Garland Technology recognized the...

Read More

Network Visibility: 4 Reasons it Matters for Financial Institutions

How has your financial institution responded to digital disruption in recent years? If you have struggled to truly unlock the value of technologies like hybrid cloud, API platforms, artificial intelligence, block-chain, instant payments,...

Read More

Networking News [Cloud Security Doubts + Importance of NGFWs]

Here are some snippets of news and stories happening around the technological world and how it can affect the industry as a whole. For the month of September,  we will be focusing on MSSP providers, cloud security, and also updates and...

Read More

Securing the Edge in Cisco ACI with Garland Technology's EdgeLens

I’ve previously provided an introduction to Cisco ACI in terms of facilitating a next-generation data center by taking advanced of software defined networking. So if you haven’t read that post, it’s a great place to start. Abstraction is...

Read More

Decoding the User Experience with Accedian Network Monitoring

You’re the network IT person at a large firm on a Monday morning locked in a prison of unopened emails. You’ve barely taken a sip of coffee when your phone rings. It’s your boss, “My network isn’t working. It takes 40 extra seconds to open...

Read More

What is Driving the Need for Additional Network Monitoring?

Enterprise networks are evolving. They face different challenges today than just two or three years ago. Today’s IT teams must find a way to deal with more data, more connected devices, networks distributed over a greater geographic area,...

Read More

Unleash the Power of Packet Slicing and Time Stamping in your Network

In today’s environments with significant investment in security and monitoring tools, Garland Technology recognizes the need for a cost-effective solution that provides the flexibility and performance that networks today require. We have...

Read More

Cyber Security Threat Breakdown [MoviePass + Poshmark]

Here’s your monthly roundup of the latest hacks and data breaches around the world. In this monthly series, I’ll share information and updates on the most recent hacks that I saw in the news, including causes, resolutions, and what you can...

Read More

Network Visibility - The Rise of the Aggregation Layer

Sole reliance on SPAN ports for network visibility and monitoring has been on the decline for years. IT teams have realized the inherent limitations of SPAN ports and have shifted towards the traditional 3-tiered approach to network...

Read More

Do's and Dont's of Packet Acquisition

In a previous post I wrote about the basics of packet data acquisition, why they are the foundation to network performance management tools. Most networks require their NPM tools to analyze packets from multiple network segments....

Read More

If You Build It (An Infrastructure), They Will Come (Malicious Data)

Garland Technology and BluVector® are dedicated to sharing network connectivity best practices and inline security management, propagating why having reliable data in your network is incredibly important for security.  BluVector, recently...

Read More

Aggregation in a High Density Fiber Network

High density networks can create infrastructure challenges related to figuring out how to ensure all network links are being analyzed by security and monitoring tools. This was the case with one major European telecommunications company....

Read More

Networking News: Cloud Monitoring + IoT Security

In this day and age, the networking world is constantly changing with discovered risks and issues from new technologies, monitoring and security measures in new cloud environments, and many more. With so much note-worthy news, here are...

Read More

An Introduction to Securing the Edge in Cisco ACI

Cisco ACI is a game changing approach to managing networks across major disruptions including virtualization, multiple active data centers, hybrid data centers, and private and public cloud.  Cisco ACI enables significant advantages in...

Read More

Cyber Security Threat Breakdown [Slack + Bulgaria]

Here’s your monthly roundup of the latest hacks and data breaches around the world. In this monthly series, I’ll share information and updates on the most recent hacks that I saw in the news, including causes, resolutions, and what you can...

Read More

What is a Network TAP, Anyway?

Despite being in the technology industry, there are some things system security pros (or their bosses) just aren't familiar with.  One of the questions we get at Garland is, "What is a network TAP, anyway?" The next question is typically,...

Read More

Is your Network Security Slowing you Down?

Measuring the Latency impact Created by NextGen Security Solutions   As an IT professional, you are well aware of the challenges posed by network latency. Applications like audio and video delivery, bandwidth-sensitive mobile applications,...

Read More

Networking News: 5 Cybersecurity Basics + Cisco AI

In this day and age, the networking world is constantly changing with discovered risks and issues from new technologies, monitoring and security measures in new cloud environments, and many more. With so much note-worthy news, here are...

Read More

Understanding the Basics of Packet Data Acquisition

Packets are an essential source of data for network performance management (NPM) tools. They are the foundation of data truth that all network monitoring and security tools rely upon for analytics, forensics, threat detection, and...

Read More

Born in the USA: The Story of Garland Network TAPs

The network TAP is essential for network visibility within the data center, ensuring your network monitoring and security tools are getting 100% complete packet data. With the fourth of July among us, I thought it was a good time to share...

Read More

Network Visibility in Public Cloud Environments

By now everyone is aware of the importance of visibility into their production network. Without network visibility, it’s impossible to have a true understanding of what’s going on in your network, optimize your security and monitoring...

Read More

The Kryptonite of Network Latency

Aukua and Garland Technology have joined forces to combat the villainous issues connected with network latency! Garland’s Superpower: Supersonic Duplication  Aukua’s Superpower: Telepathic Monitoring Their mission: To secure your network...

Read More

Cybersecurity Threat Breakdown [CBP + Evite]

With years of experience in the technology industry, headlines about cyber attacks and data breaches stand out to me. Here’s your monthly roundup of the latest hacks and data breaches around the world. In this monthly series, I’ll share...

Read More

Cisco Live 2019: Thoughts from Garland Technology

Cisco Live. San Diego, California. 30th anniversary. Sure boss, I’ll go! Last week I was part of the Garland Technology crew that attended Cisco Live 2019. Garland exhibited in the World of Solutions to talk to attendees about why Garland...

Read More

Network Visibility Fabric Design - Focus on the Core

We’ve previously talked about the importance of the access layer, aggregation layer and edge to a well-designed network visibility fabric. Tapped traffic from the access layer flows to the aggregation layer, where it’s collected,...

Read More

The Battle Of The Bandwidth

After an epic 15 year reign at number one, 10G tools begin their descent down the charts of network infrastructure, making way for the rise of “hot” 100G technology.  Iconic sensations like big data infrastructure and the explosion of...

Read More

Network TAPs: The Ultimate Draft Pick for Your Security Defense Team

In every draft – whether it's fantasy or pro – the first pick is the most important. Often, it’s the foundation upon which the entire rest of the team is built. The same can be said for your security defense team. Firewalls, intrusion...

Read More

Networking News: IoT Risks + Network Monitoring in the Cloud Era

In this day and age, the networking world is constantly changing with discovered risks and issues from new technology, monitoring and security measures in new cloud environments and many more. With so much note-worthy news, here are...

Read More

The Importance of Network TAPs when Packet Capture is Mission Critical

The decision to use Network TAPs instead of relying on SPAN (mirror) ports can be the simplest, yet most important decision that must be answered for any network monitoring or security project. Case in point. The US Military knows the...

Read More

Cybersecurity Threat Breakdown [Trump Hotels + WhatsApp]

With years of experience in the technology industry, headlines about cyber attacks and data breaches stand out to me. Here’s your monthly roundup of the latest hacks and data breaches around the world. In this monthly series, I’ll share...

Read More

Solving Critical Network Security Problems

I wanted to try something fun for our new joint solution with Corelight. We all know joint solutions aren't the most exciting to read, right? But in our defense, we need them for a technology alliance to move forward. We need them to...

Read More

Solutions to Effectively Monitor Multi-Cloud Environments

Our experts provide answers to five common challenges enterprise IT leaders face when monitoring multi-cloud environments. These problems include: constant change, siloed cloud vendor tools, no support with legacy tools, difficulty in...

Read More

Networking News: Security Spring Cleaning + Public Cloud

The networking world is ever changing, with new monitoring and security tools entering the market, companies introducing exciting new technology, partnerships being formed to create disruptive solutions, and more. With so much note-worthy...

Read More

3 Places to TAP Your Network

Now that we’ve gone over some reasons why you want to utilize network TAPs in your network, the next logical question that comes to mind is, Where do you TAP your network?

Read More

Where in the World is Garland Technology?

Where in the world is Garland Technology? It seems like we are everywhere! Here at Garland Technology, we think it is important to be out in the field educating the network security and monitoring community about network TAPs and packet...

Read More

SPAN WARS: Dropping packets in a network near you

You’ve been tasked with implementing a new performance monitoring tool in your network for advanced application layer visibility. After extensive research you’ve decided a Flowmon Probe is the best solution for your needs, allowing the...

Read More

Using Out-of-Band Tools to Improve Inline Effectiveness

When introducing new monitoring equipment to your network, there are two ways it can be deployed: out-of- band or inline. The latter, inline deployment, places the equipment to interact, manage and/or analyze actual network traffic. On the...

Read More

Cybersecurity Threat Breakdown [Georgia Tech + Toyota]

With years of experience in the technology industry, headlines about cyber attacks and data breaches stand out to me. Here’s your monthly roundup of the latest hacks and data breaches around the world. In this monthly series, I’ll share...

Read More

Using Application Programming Interfaces (API) to Manage Multiple Devices

Garland Technology's PacketMAX™ Advanced Aggregators are very popular with customers that have a lot of tapped network links or a lot of tools to distribute monitor traffic to. In large environments, multiple aggregators may be needed to...

Read More

The 101 Series: Quick Connect Tips for Inline Security Appliances

You just bought a brand new inline security appliance—a next-gen firewall, intrusion prevention system (IPS), data leakage prevention (DLP) system or web application firewall—and you’re ready to deploy it in your network. But then it sits...

Read More

Networking News: Data Center Outages, IoT Security and SD-WAN

The networking world is ever changing, with new monitoring and security tools entering the market, companies introducing exciting new technology, partnerships being formed to create disruptive solutions, and more. With so much note-worthy...

Read More

The Role of Bypass Solutions in a Network Visibility Fabric

Designing complete network visibility solutions takes more than just Network TAPs and Network Packet Brokers at key points in the access and aggregation layers of the network. With network security being more important than ever before,...

Read More

The Essential Network Visibility Triad

Today’s hybrid networks challenge complete network visibility. Traditional data centers, virtual machines, and the Cloud serve to obscure and leave networks vulnerable to operational inefficiency and security risks. The critical triad of...

Read More

Cybersecurity Threat Breakdown [March Madness + Google Photos]

With years of experience in the technology industry, headlines about cyber attacks and data breaches stand out to me. Here’s your monthly roundup of the latest hacks and data breaches around the world. In this monthly series, I’ll share...

Read More

Complete Network Visibility: Your First Line of Defense

Cyber attacks have become more persistent and sophisticated, leaving security professionals tasked with bolstering the network’s edge with a layer of complex security devices; each responsible for detecting, stopping, and analyzing...

Read More

3 Cloud Computing Trends to Watch For

Three cloud computing trends we'll see next year are new public hybrid cloud options like AWS outposts, acceleration of a cloud-first posture, and the rise of serverless architectures as containerization continues to grow.  Concurrent with...

Read More

How to Analyze Traffic Before and After Your Inline Device

It’s a well known fact that financial institutions are the biggest target of data breaches, with that single sector comprising 35% of all data breaches worldwide.  With billions of dollars at stake, companies are realizing that they must...

Read More

Securing Data from Data Center to the Cloud

In 2019, it’s understood that threats are everywhere, both from external sources (think hackers) and internal employees (accidental or not).  Securing the network against these threats is the biggest challenge for CISOs and network...

Read More

Network Security Starts with EdgeLens®

Designed to redefine how you secure the edge of your network, Garland Technology is excited to announce the launch of our new, high density EdgeLens®, an inline security packet broker that is purpose-built to manage the network’s edge.

Read More

Cybersecurity Threat Breakdown [Virtual Reality + Payroll Provider]

With years of experience in the technology industry, headlines about cyber attacks and data breaches stand out to me. Here’s your monthly roundup of the latest hacks and data breaches around the world. In this monthly series, I’ll share...

Read More

How to Make 40G Fiber More Accessible—A Primer on Cisco BiDi Technology

Just as large enterprises settle into 10G networking, bandwidth intensive applications and big data demands are forcing companies to adopt 40G network speeds. However, the shift from 10G to 40G requires a major investment in a new cabling...

Read More

Does packet loss really matter?

Packet loss is defined as the failure of one or more transmitted packets to arrive at their destination. While every network can expect to encounter some packet loss from time to time, significant or sustained packet loss does require...

Read More

What is your Heart Beat telling you?

One of the key vital signs medical professionals routinely check to determine the health state of your body’s inline device (heart) is to measure blood pressure. During each heartbeat, blood pressure varies between a maximum (systolic) and...

Read More

Using Mighty Mouse Connectors to Ensure Network Access for Mission-Critical Operations

On August 6th, 2012, at midnight on the east coast, the Curiosity rover landed in the Gale Crater on the surface of Mars. For the next two years, Curiosity would be at the forefront of the human scientific endeavor. The strides made across...

Read More

Cybersecurity Threat Breakdown [LA Times + Collection #1]

With years of experience in the technology industry, headlines about cyber attacks and data breaches stand out to me. Here’s your monthly roundup of the latest hacks and data breaches around the world. In this monthly series, I’ll share...

Read More

When and why to use BiDi Transceivers?

As network speeds increase, the means to support these speeds change. For example, when multimode fiber speeds increased from 10Gbps to 40Gpbs, the SFP+ transceiver had to be upgraded to the QSFP+ transceiver. In addition, the cabling...

Read More

PacketMAX: Find your visibility truth

Designed to redefine how you approach your network, Garland Technology is excited to announce the launch of two new products to our purpose-built packet broker line. These products were specifically created to address critical needs of our...

Read More

How to Maintain Network Visibility During an Infrastructure Upgrade to 40G

Major speed upgrades demand major infrastructure upgrades. These infrastructure upgrades can include new cabling, new transceivers, or new hardware altogether. It’s an involved process, that can require tearing down your network to the...

Read More

Network Visibility Fabric Design: Add an Aggregation Layer

“A well-designed network visibility fabric will help enterprises assure network and application performance and reduce security and compliance risk.” We’ve previously explored the importance of the access layer in a well-designed network...

Read More

DIN Rails: Versatility from telecom towers to industrial networks.

Picture this; it’s 4 in the morning, you’re still chewing the grounds from your second cup of instant coffee as you begin your ascent up a 150ft telecom tower. At the end of your 10-minute climb, you can start to get to work on some...

Read More

TAP into Complete Visibility for SDN

Centralized control of traffic flows is critical for monitoring 10G, 25G, 40G and 100G networks. But before implementing SDN, network architects must ensure that they have a solid visibility plane that ensures 100% of packets will be seen...

Read More

Maximize the value of NPBs with Garland Technology’s PacketMAX™

Today’s complex networks require hardware and software vendors to work well together to provide solutions that meet the customers’ needs. As a manufacturer of network TAPs and packet broker solutions, Garland Technology knows that...

Read More

Cybersecurity Threat Breakdown [Marriott + HSBC]

With years of experience in the technology industry, headlines about cyber attacks and data breaches stand out to me. Here’s your monthly roundup of the latest hacks and data breaches around the world. In this monthly series, I’ll share...

Read More

Bypass vs Failsafe: What's the Difference?

Computer networking terminology can become overly fickle once vendor products get into the mix. To help alleviate some confusion, we’re going to go over some common terms that often throw customers for a loop and hopefully clear up some...

Read More

Foundation of Visibility: 6 Reasons to Choose TAPs instead of SPAN

Designing your network infrastructure, whether it’s for an upgrade or a new data center, is a complex project filled with many challenges. But one that should be easy to overcome is the decision to rely on Network TAPs as the foundation of...

Read More

What's the difference between BiDi and Bi-Directional?

Computer networking terminology can become overly fickle once vendor products get into the mix. To help alleviate the confusion, we’re going to go over how Garland Technology approaches terminology and hopefully clear up some understanding...

Read More

Advanced Persistent Threat Activity Exploiting Managed Service Providers

The National Cybersecurity and Communications Integration Center has been tracking attacks on global Managed Service Providers (MSP) from Advanced Persistent Threat actors since 2016. Targets of these attacks spread across Information...

Read More

The Smarter Things Network TAPs Do to Make Your Security Program Stronger

Make no mistake – securing your organization from outside cyber threats is one of the most difficult and challenging aspects of IT. In all likelihood, attackers are continually probing your network, seeking passwords, vulnerabilities or...

Read More

Cybersecurity Threat Breakdown [Ohio Hospital System + USPS]

With years of experience in the technology industry, headlines about cyber attacks and data breaches stand out to me. Here’s your monthly roundup of the latest hacks and data breaches around the world. In this monthly series, I’ll share...

Read More

Secure your Surveillance System from a DDos Attack

IP surveillance is quickly becoming a commodity. As the price of high definition network cameras continues to fall, it’s easier to find room in your budget for a basic system. Physical security hardware sales are expected to increase 8.9%...

Read More

Network Visibility Fabric Design: Starts with the Access Layer

Network visibility fabrics, a combination of network TAPs, network packet brokers, aggregation devices, and bypass devices, play a critical role for network performance management and security operations.

Read More

Where TopN monitoring falls short

A case for capturing all packets With the recent Garland Technology and TOYOTech technical partnership, there will literally be no packets left behind in the network world.  Garland’s line of Network TAPs provides complete packet...

Read More

Back to Basics: Packet Capture & Analysis

Network monitoring and analysis tools aren’t new topics by any means, but as with everything, sometimes it’s great to go back to the basics and get a refresher.  While security tools and trends tend to get all the attention, it’s important...

Read More

TAP + Aggregation for Gigabit Copper Networks

While we keep hearing about network migrating to 40G or 100G, it's important to note that many networks still consist of 1 Gigabit copper network links, and will require network traffic visibility. Copper Network Taps are the best way to...

Read More

Selecting the Right Packet Broker for Your Network

The Network Packet Broker (NPB) has become a critical component to any network.  They offer numerous benefits to both network operations and network security teams. With an increasing number of vendors offering these products, selecting...

Read More

Cybersecurity Threat Breakdown [Cathay Pacific + Pentagon]

Here’s your monthly roundup of the latest hacks and data breaches around the world. In this monthly series, I’ll share information and updates on the most recent hacks that I saw in the news, including causes, resolutions, and what you can...

Read More

Optimize your Network Design for Intrusion Detection Systems

With today’s heightened threat levels, many companies are shoring up their defenses and adding an intrusion detection system (IDS) to their security stacks. By constantly monitoring network and system activities for malicious activity or...

Read More

How to capture and analyze all your network traffic

Since virtually all attacks cross the network, security professionals need to make fast sense of what’s actually happening with their traffic. Easier said than done, however, given the challenges associated with: Reliably and...

Read More

Network Engineer’s Guide to Reducing Mean Time to Resolution

The days of siloed IT infrastructures are quickly ending as services, applications and network components become more interdependent. IT infrastructures are becoming more complex and it’s falling on your shoulders to keep mean time to...

Read More

The 101 Series: Breakout Network TAPs

I recently wrote a blog about the six different types of network TAPs with a brief overview of each TAPs functionality. In this blog, I’m going to explain in detail more about how the breakout or commonly referred to tap mode operates....

Read More

Ensure Digital Integrity to Comply with GDPR

General Data Protection Regulation (GDPR) is a mandated regulatory standard designed to unify data privacy and security requirements. This regulation affects companies that provide services within the European Union; however, any company...

Read More

Cybersecurity Threat Breakdown [Bristol Airport +SHEIN]

With years of experience in the technology industry, headlines about cyber attacks and data breaches stand out to me. Here’s your monthly roundup of the latest hacks and data breaches around the world. In this monthly series, I’ll share...

Read More

Using a Breakout Cable with a Breakout TAP

A term that is often used when discussing the advantages of using an aggregation appliance is "Speed Conversion." Speed conversion enables communication between Multimode 40Gb or 100Gb connections, using MTP/MPO connectors, and with 10Gb...

Read More

Tips for Security Appliance Migration & Deployment

Complete network visibility starts by using a network visibility fabric comprised of network TAPs and packet brokers, rather than relying on SPAN ports as your access method. Your monitoring and security tools like an APM or IDS are a...

Read More

Ensuring Full Data Capture in Harsh Environments

Network visibility is the foundation of all network activities.  Network visibility becomes even more important in mission-critical situations, however when these situations move outside the lab, it can be more challenging to ensure that...

Read More

When A Simple SPAN Port Is Enough

The two most common ways to access and replicate data within your network are TAP and SPAN technology. A Test Access Point (TAP) is a hardware device that copies all of your network data. SPAN or Switch Port Analyzer are mirroring ports...

Read More

How to enable efficient and secure Industrial Control Systems

The factory of the future is digital and networked.  The Industrial Internet of Things (IIoT) and Industry 4.0 are a further optimization of processes and faster production cycles for production companies and critical infrastructures....

Read More

Cybersecurity Threat Breakdown [T-Mobile + UnityPoint Health]

Here’s your monthly roundup of the latest hacks and data breaches around the world. In this monthly series, we’ll share information and updates on the most recent hacks that have made headlines, including causes, resolutions, and what you...

Read More

Design-IT: How to TAP traffic in a virtual environment

Network TAPs provide the best and easiest way to see network traffic going over the network. Simply plugging the tap into the physical cables between two networked devices will capture each packet sent across that wire. By strategically...

Read More

How much is network downtime costing your company?

If your website is down, your organization is losing money. It’s as simple as that.  And if your company website is down, it’s likely part of a larger issue affecting the network. So whether the lost revenue comes from lost sales if you’re...

Read More

What role does Link Failure Propagation play in the network?

When building a network, uptime and reliability are a major focus in the design of the network. To meet these reliability needs, redundant appliances and links are often put in place to provide high availability for the network. Network...

Read More

The 6 Levels Of Thwarting Network Security Issues

No matter what type of organization you have, you always run the risk of a network security issue. There are internal risks, of course, and every business has connections to outside vendors that introduce your network to the unknown. Any...

Read More

¿Y qué rayos es un Network Packet Broker (NPB)?

Las ventajas de visibilidad de los Network Packet Brokers English version Los Network Packet Brokers (NPB) es la manera más eficiente para extender la vida útil de sus herramientas de monitoreo y seguridad fundamentalmente de dos formas:...

Read More

Detect The 5 Common Threats Of Network Downtime

Network downtime is a costly reality of running a business, and unfortunately, it’s more likely to happen to you than not. If Google, Amazon and the United States Government have dealt with such issues, it’s a safe bet that you’re going to...

Read More

Cybersecurity Threat Breakdown [TimeHop, Bithumb]

Here’s your monthly roundup of the latest hacks and data breaches around the world. In this monthly series, we’ll share information and updates on the most recent hacks that have made headlines, including causes, resolutions, and what you...

Read More

Improve Visibility to Enhance, Remediate and Resolve Vulnerability

Network visibility is the base of all network activities, whether they be for security or monitoring purposes. After all, if you don’t have visibility, you lack an understanding of what’s going on in the network.

Read More

TAP Test: Do you need a Network TAP?

Whether you are proactively designing a network for a new office or data center location, or looking to make changes to your current infrastructure, there are a lot of questions to ask during the initial design phase.

Read More

Understanding Advanced Features in a Network Packet Broker

Network Packet Brokers (NPBs) have come a long way from their modest roots as data monitoring switches, though their intended application remains nearly the same.  The NPB is still primarily used as a device to maximize the performance of...

Read More

Challenges of Defending the Internet of Things

Do you remember what you were doing on October 21, 2016? Probably not, but I can tell you what you weren’t doing. You weren’t on Twitter, Spotify, Netflix, Reddit, Tumblr, or visiting so many other major websites.

Read More

Back to the Basics: What is Network Monitoring?

Network monitoring is part of the broader function of Network management, which manages computer networks, ensuring performance management, provisioning of networks, analysis and maintaining quality of service. Network monitoring is the...

Read More

Design-IT: Reverse Bypass Mode

There have been quite a few posts about the benefits of Bypass TAPs and how they can keep the network up and running in the event an inline appliance fails. But what about situations where the inline appliance is the main source of...

Read More

Cybersecurity Threat Breakdown [MyHeritage, Coca-Cola]

Here’s your monthly roundup of the latest hacks and data breaches around the world. In this monthly series, we’ll share information and updates on the most recent hacks that have made headlines, including causes, resolutions, and what you...

Read More

A Brief History of Multi-mode Fiber; Are you ready for what’s next?

The magnitude of what we can do on any given mobile device has grown exponentially over the past few decades; our productivity is no longer dependent upon the ability to commute to work, but rather our connectivity to those we work with,...

Read More

How to Gain Full Visibility During an Instant Response Data Breach

As an instant response firm, the Cyber Defense Group focuses on two critical aspects of cyber security, the proactive side, which they call a virtual CISO, and the reactive side, which is the instant response to some sort of cyber attack.

Read More

Ensuring Digital Experience Management with Riverbed SteelCentral and Garland Technology

We are now living in a world of digital business.  Digital technology is a top priority for business leaders, and investing in digital initiatives will continue to grow at an aggressive pace, doubling within three years.  Although Digital...

Read More

Ensure Complete Network Visibility for Your Incident Response Plan

Cyber threats are quickly becoming more sophisticated with Advanced Persistent Threats (APTs) creating a new level of security risk. That’s why it’s now more important than ever before to use next generation threat intelligence combined...

Read More

How to Connect your Inline Application Monitoring Tools in 5 Steps

It goes without saying, but proper application monitoring is a critical component of sound network management. Let the following example show you: Say you have two critical 10G links that you need to monitor with a few inline network...

Read More

TAP One Link to Add Resiliency to Your Cisco Deployment

As part of the Cisco Solution Partner Program, Garland Technology helps provide visibility and access for Cisco security and performance monitoring solutions. The partnership provides value to companies deploying Cisco products including...

Read More

7 reasons why you shouldn’t choose SPAN as a real visibility access device

Every day I come across network techs who continue to rely on SPAN ports for their network access method.  This blows my mind as its been proven time and again why you shouldn’t rely on SPAN ports. Let me share with you some of those...

Read More

Design-IT Solutions: Remote Management for Inline Devices

Networks are becoming more and more distributed. We’re starting to see more customers deploying security tools at their remote locations, such as bank branches and retail outlets, or as managed services to clients.

Read More

Cybersecurity Threat Breakdown - April 2018

Here’s your monthly roundup of the latest hacks and data breaches around the world. In this new monthly series, we’ll share information and updates on the most recent hacks that have made headlines, including causes, resolutions, and what...

Read More

Key Tools and Tips for Successfully Identifying Security Breaches

When a company is breached, every second counts in the race to mitigate damages.  But most aren’t prepared – today it takes most companies more than 200 days to even detect a breach in the first place. Data breaches have finally slowed...

Read More

The 101 Series: Network Packet Brokers

Understanding and maintain control of your network is a constant, uphill battle. With the increase in network virtualization, BYOD, and growing number of security threats, network monitoring is more important than ever.  It’s well...

Read More

Garland TAPs at Work for the SECCDC

"You have just been hired as the network and security administrators at a small company and will be taking administrative control of all information systems. You know very little about the network, what security level has been maintained,...

Read More

What Happens When a Healthcare Computer Network Goes Down?

I hear it in the news every couple days or so, another major organization was hacked and one of two things likely happened; their network went down, or customer information was stolen. At this point we’ve all become so used to hearing...

Read More

The 101 Series: Fiber Polarity

In our 101 network TAP series, we have explained the functionality of the various different types of network TAPs as well as some key features.  Now we’re going to take a closer look at fiber optics with a focus on fiber polarity.

Read More

Understanding the Visibility Limitations of SPAN Ports

Visibility is key for today’s Network Engineers and Managers. Visibility is a MUST when thinking about network security and compliance requirements and soon GDPR. I want to focus on the need for real visibility that only TAPs provide...

Read More

Design-IT Solutions: How to TAP a Wireless Access Point

The addition of wireless connections or “Wi-Fi” to networks has provided a cost-effective way to allow endpoints to communicate with both back-end resources and each other. Traditionally, copper cabling would need to be run throughout a...

Read More

The Legacy Effect on Industrial Networks

If you read enough articles about the evolution of industrial networks, you might think the Industrial Internet of Things (IIoT) is set to take over the world. And while it’s important to plan ahead for the significant changes that IIoT...

Read More

See Threats in Real Time with 100% Visibility

Network security becomes increasingly complex with each passing day, making it critical that busy security teams have full visibility and threat detection capabilities. These resource-constrained teams already support a wide range of...

Read More

Fresco desde el grifo. Filtrado de información, El Bartender de datos

English version Es un hecho, las herramientas de seguridad y monitoreo se expanden como hiedra dentro de los centros de datos en los clientes, de hecho, algunas veces hay decenas en algunas organizaciones y hasta a veces replicadas...

Read More

The State of Industrial Ethernet and Industrial Internet of Things in 2018

Lack of budget, unclear path to ROI, imperfect strategic vision, interoperability problems. These are just a few of the reasons why the shift to Industrial Ethernet has been slow. But while industrial leaders could make do without...

Read More

Design-IT Solutions: How to monitor your 100G network with incompatible tools

As networks continue to grow and threats become more pervasive, the need to react quickly to changes in the state of your network is higher than ever.  One way of making your control over your network more agile is through Software Defined...

Read More

Fiber Optical Networking

Greater Data Speeds but New Challenges to Consider As we begin seeing much higher bandwidth speeds for data communications using fiber optical connections and enter into the non-linear world of photonic communications, many things will...

Read More

5 Reasons to TAP your Network

Why do I need TAPs?  That’s a question I hear a lot from people in the field.  Either they aren’t familiar with TAPs, or even if they are, with a low utilization, they may think there isn’t an application that makes sense for them. We’ll...

Read More

Surprise—Copper Cables Still Dominate Industrial Networks

We’ve been talking a lot about the security implications of the Industrial Ethernet as traditionally closed networks adapt to demands for improved bandwidth and open connectivity. However, cyber attacks aren’t the only things that can...

Read More

The 101 Series: Filtering TAPs

In our 101 network TAP series, we have explained the functionality of the various network TAPs that are available to gain access to the traffic that is typically found in a network. We have reviewed passive fiber TAPs, copper network TAPs,...

Read More

Tapping it in Barcelona

When it was announced that CiscoLive! EMEA would take place in Barcelona, Spain for the 2018 show, the Garland Technology team didn’t wait a minute to sign up.  After all, getting out of cold and snowy Buffalo in January/February for sunny...

Read More

How to Identify and Prevent Phishing Attacks

“Garland Technology triumphs in highly-volatile and critical environments, allowing us to provide visibility into our customers information, and help enterprises take proactive action against cyber-attacks.”

Read More