Blogheader image.png

TAP Into Technology

Leading the Way in Network Technology

Where TopN monitoring falls short

Back to Basics: Packet Capture & Analysis

TAP + Aggregation for Gigabit Copper Networks

Selecting the Right Packet Broker for Your Network

Cybersecurity Threat Breakdown [Cathay Pacific + Pentagon]

Optimize your Network Design for Intrusion Detection Systems

How to capture and analyze all your network traffic

Network Engineer’s Guide to Reducing Mean Time to Resolution

The 101 Series: Breakout Network TAPs

Ensure Digital Integrity to Comply with GDPR

Cybersecurity Threat Breakdown [Bristol Airport +SHEIN]

Using a Breakout Cable with a Breakout TAP

Tips for Security Appliance Migration & Deployment

Ensuring full data capture in harsh environments

When A Simple SPAN Port Is Enough

How to enable efficient and secure Industrial Control Systems

Cybersecurity Threat Breakdown [T-Mobile + UnityPoint Health]

Design-IT: How to TAP traffic in a virtual environment

How much is network downtime costing your company?

What role does Link Failure Propagation play in the network?

The 6 Levels Of Thwarting Network Security Issues

¿Y qué rayos es un Network Packet Broker (NPB)?

Detect The 5 Common Threats Of Network Downtime

Cybersecurity Threat Breakdown [TimeHop, Bithumb]

Improve Visibility to Enhance, Remediate and Resolve Vulnerability

TAP Test: Do you need a Network TAP?

Understanding Advanced Features in a Network Packet Broker

Challenges of Defending the Internet of Things

Back to the Basics: What is Network Monitoring?

Design-IT: Reverse Bypass Mode

Cybersecurity Threat Breakdown [MyHeritage, Coca-Cola]

A Brief History of Multi-mode Fiber; Are you ready for what’s next?

How to Gain Full Visibility During an Instant Response Data Breach

Ensuring Digital Experience Management with Riverbed SteelCentral and Garland Technology

Ensure Complete Network Visibility for Your Incident Response Plan

How to Connect your Inline Application Monitoring Tools in 5 Steps

TAP One Link to Add Resiliency to Your Cisco Deployment

7 reasons why you shouldn’t choose SPAN as a real visibility access device!

Design-IT Solutions: Remote Management for Inline Devices

Cybersecurity Threat Breakdown - April 2018

Key Tools and Tips for Successfully Identifying Security Breaches

The 101 Series: Network Packet Brokers

Garland TAPs at Work for the SECCDC

What Happens When a Healthcare Computer Network Goes Down?

The 101 Series: Fiber Polarity

Understanding the Visibility Limitations of SPAN Ports

Design-IT Solutions: How to TAP a Wireless Access Point

The Legacy Effect on Industrial Networks

3 Places to TAP Your Network

See Threats in Real Time with 100% Visibility

Fresco desde el grifo. Filtrado de información, El Bartender de datos

Network Visibility - The Rise of the Aggregation Layer

The State of Industrial Ethernet and Industrial Internet of Things in 2018

Design-IT Solutions: How to monitor your 100G network with incompatible tools

Fiber Optical Networking

5 Reasons to TAP your Network

Surprise—Copper Cables Still Dominate Industrial Networks

The 101 Series: Filtering TAPs

Tapping it in Barcelona

How to Identify and Prevent Phishing Attacks

Design-IT Solutions: Bypass TAPs add resiliency to the edge of the network

Leading the Future of Copper Network TAPs

What Is Network Functions Virtualization (NFV)?

La importancia de la visibilidad en la red

How to Defend Against TRITON Industrial Malware

[Video] Network Connectivity: Industrial Ethernet

Design-IT Solutions: Aggregation to One Tool

[Announcement] Garland Technology is a Cisco Preferred Solution Partner

Putting Network Monitoring Techniques in Place

2017 Best of Blog - TAP vs SPAN, IIoT Adopters, SDN and more

[Video] Network Connectivity: Cabling and Connectors

Happy Holidays from the Garland Team

Garland & ExtraHop Team Up To Provide Real-time Data Capture for End-to-End Visibility

Light Loss Through Fiber Optic TAPs

What White-Box and Brite-Box Mean for Your SDN Deployment

[Analysis] Full Duplex Capture in Industrial Networks

Garland Partners with Edgecore for End-to-End Visibility Solutions

How to Monitor Encrypted Traffic and Keep Your Network Secure

Group Packet Competition at Sharkfest Europe 2017

Halloween Hack: Should SCADA/ICS be Scared?

Hijacking Healthcare: Training the Treaters in Cyber Hacks

Garland Partners with Napatech: 100% Data Capture and Real-Time Delivery

The Controller Problem in Software-Defined Networking

The 101 Series: Passive Network TAPs

Hijacking Healthcare: Securing Your Smart Devices & Data

Dragonfly Power Grid Attacks Hit Home—Now What?

The Evolution from Monitoring to Software-Defined Networking

[SlideShare] Tech Talk 2017: Sucking Mud, EL15 and Wave a Dead Chicken

Data at Risk Series: Cyber Security Needs of the Healthcare Industry

The 101 Series: Active Network TAPs—Where, When and How

Hijacking Healthcare: Ransomware Attacks vs. Health Record Security

Fiber Facts—Yes, You Do Need to Read This

The 101 Series: Link Failure Propagation and High Availability

Understanding the Need for Link Speed Synchronization

Visibility by Design for Application/Network Performance Monitoring and Security

When QUIC isn't so Quick

Ready for SDN End-to-End Visibility?

Overcoming 100G Bandwidth Demands in Network Monitoring

Defining a True Data Center Rack TAP Solution

Purpose Built Network Packet Brokers

[Training] TAP Modes - Test Your Knowledge

Restaurants Taking Measure to Guard Against Hacks

7 Challenges for Industrial Internet of Things (IIoT) Adopters

[Demo] Deploying an Active, In-line Security Tool

Ways to Protect Against Phishing

Filtering + Aggregation = Never Oversubscribe Again

Beware Industrial Internet of Things (IIoT) Attacks—The Dark Side of Connectivity

What's the State of SDN?

Network TAPs for Critical Infrastructure

Historical Lookback - The Proof is in the Packet

Packet Challenge at Sharkfest - A Great Way to Test Your Skills!

MTP® Brand Connectors versus Generic MPO in Fiber Networks

Are my Packets Lying? - 4 Things to Look for in Packet Traces

Born in the USA: The Story of Garland Network TAPs

When Did Phishing Become a Social Problem?

[Get the Data You Want] How Education Can Avoid Being the Next Soft Hacking Target

Executive Order in Place to Boost Cybersecurity

[Demo] Protecting the Core with High Speed Load Balancing

Traveling this Summer? Don't Let Your Data Get Checked Out

[New Product] Garland Introduces Scalable Visibility with Passive Fiber Modular Chassis up to 100G

[Video] VLAN Analysis with Wireshark 2.0

Bad Bots, Bad Bots - They're Coming For You

Welcome to the Smart Grid—Time to Set Up Your Security Devices

Garland Technology's Continued Commitment to Buffalo, New York

Everything TAPs - In a Centralized Page

Network TAP vs SPAN Port: Putting Them to the Test

McAfee Resurrection - Can Real Collaboration Exist in the Security Ecosphere?

[Get the Data You Want] Simplify PCI DSS Compliance with an MSSP

[Infographic] What Security Tools are you Deploying in your Network?

­­­MSSPs: The Pros and Cons of Outsourcing Network Security

[Video] How To Determine DHCP Option 60 Value Using Wireshark

How to Choose the Right Cables for Your Industrial Ethernet

Garland Technology's Network TAPs are now Certified 'Cisco Compatible'

Espionage Barbie? Tech Toys Bring Whole New Meaning to Youth Privacy

The 101 Series: Bypass Network TAPs Keepers of the Critical Link

It’s Not Wiretapping—It’s Network Tapping

[Infographic] Are You Monitoring a 1G, 10G, 40G or 100G Network?

Taking the Pain Out of HIPAA Compliance [Get the Data You Want]

[Video] Weird by Works: Fixing Drag and Drop With VMware Workstation 12

Network TAPs or Packet Brokers for Software-Defined Networks?

Attacking the Cyber Security Skills Gap on the Ground Floor—Sponsoring the SECCDC

The 101 Series: Why Do We Need an Aggregating Network TAP?

2016 Security Breaches: The Reality from the Predictions

How Feasible is SDN in 2017?

[video] Observing The Impact Multiple Default Gateways With Wireshark

How to Make 40G Fiber More Accessible—A Primer on Cisco BiDi Technology

Network Functions Virtualization—What Is It and Why Should You Care?

Top 7 Security Predictions for 2017

The 101 Series: A Primer On Network TAPs

What Is A Network TAP, Anyway?

How Will SDN Impact the Future of Network Security?

[eBook] The 101 on Network TAPs - the Definitive Guide

Russian Hackers Eyeing Germany’s Election—Lessons Learned from America’s Struggles

­­The SDN Story Arc—Hype Is (Slowly) Becoming Reality

[Demo] How to Deploy Your Palo Alto NGFW in Vwire Mode

New Year, New Products & New Catalog

2016's Winner Best of Blog - Born in the USA, Tech Talk, SPAN vs TAP and more

Court Approved and Can't Be Hacked: The Network TAP

Russia’s 2016 Election Hacks—Major Implications for an Age-Old Problem

Protect Your Network: Know Your Baseline Traffic

Happy Holidays From Your Friends at Garland

TAP Toons: In a Network Far, Far Away

The Buffering Bluff on Aggregation TAPs

Fake News Is More than Just Misinformation—What to Do About Malvertising

Detecting Fake SSL Sessions as Part of C&C Activity

Follow the History and Added Function of the Network TAP

[Demo] Chaining the Edge of your Network

Inside Splunk, a New SIEM Solution for MSSPs

SharkFest Europe: A Common Interest to Better Learn How to Analyze Captured Network Traffic

Don’t be a Target this Holiday Shopping Season

What Is Data Loss Prevention And Why Is It Important To Your Business?

Network Monitoring with Differentiated Services (DiffServ or SDCP)

The 101 Series: Quick Connect Tips for Out-of-Band Monitoring Appliances

[Vote] 2016's Best of Blog - Born in the USA, Tech Talk, SPAN vs TAP and more

[Infographic] The 101 Series: TAP vs SPAN

[Video] It-sa - IT Security Expo and Congress 2016 Post Show Recap

Industrial Ethernet Basics—What the Convergence of IT and OT Really Means

[Demo] Advanced Load Balancing for Multiple Active, In-line Security Tools

Network Nightmares - ARP Attacks, VoIP Echos and Scary Servers

From Selling Solutions to Managing Security—Becoming a MSSP

[SlideShare] TAP Toons: The Student has Become the Network Master - Part 2

[SlideShare] TAP Toons: The Student has become the Network Master - Part 1

Election Threat Series: The Danger is Officially Real

Should You Be Worried About Bending A Fiber Cable?

Lawful Intercept: Ensuring the Credibility of Wiretap Evidence

What's the 2020 on Application Performance Management (APM)?

The Current State of Hacking—And What to Expect in 2017

Is Your Industrial Control System Secure? Probably Not

Mr. Robot Revisited - Season 2

Hijacking Healthcare: Is DTSec Regulation the Solution for IoT enabled devices?

Hacking Education - The Next Soft Target

Is There A Difference? Bypass Switch vs. Bypass TAP

[SlideShare] Tech Talk 2016: Crapplet, Cat Waxing, and CamelCase

[Vote] How will InfoSec Prioritize its $1 Trillion Spending?

Why Are You Hiding Your Duplicate Packets?

The 7 Things You Need to Know About MSSP Utilization

Load Balancing at the Edge – Saves Budget While Keeping Up with Network Speed

Network TAP Split Ratios & Loss Budget

[SlideShare] TAP Toons: Network v. Security - How to End the Finger Pointing

What’s the 2020 on the Cloud?

The Cost of Network Outages

A Glimmer of Hope for Industrial Security in 2016

One Link, Multiple In-Line Security Appliances—What Can Security Architects Do?

What’s the 2020 on SDN?

Ransomware, a Billion Dollar World Wide Threat

Sustaining Full Duplex Line Rate Capture to Disk on 100G Connections

[Video] Where Would You TAP?

Are You Adding to Your Security Stack? Then Learn Chaining at the Edge

Director of National Intelligence Cautions Presidential Candidates on Cyber Attacks

Four Roadblocks to Deploying a Full Stack of In-Line Security Appliances

Utilizing Garland’s TAPs in Flow-Based Network Traffic Monitoring

Planning for Visibility at Cisco Live! U.S. 2016

Real Time Passive Monitoring is the Smarter Solution

Sharkfest 2016 – Feeding Wireshark Every Bit, Byte and Packet®

What’s Your Palo Alto NGFW Deployment Plan?

A Practical Example: 1G In-Line and Out-of-Band Connectivity

­­A Hybrid Approach Is the Future of MSSPs

Bringing Remote Management to Network Architecture

Wireshark – From Ethereal to Today

How Much is My Information Worth on the Dark Web?

IDS vs. IPS: It’s More Than a Character Difference

Beyond the Firewall: Smarter Network Security for the “Smart Grid”

What’s the 2020 on Firewalls?

2020 Vision: What's the Future for Firewalls, SDN and the Cloud?

Garland Unveils New 1G Modular Packet Broker System

Is Your Bypass Showing?

How to Choose an MSSP That Provides Real Value

[Video] “May the 4th Be with You” Promotion - A BB-8 Could be Yours

MTP® Brand Connectors—An Integral Part of the Move to 40G/100G Networking

[Infographic]Tapping to the Music—The Current State of Network TAPs and Beyond

[Video] SPAN vs TAP Comparison

[Video] Ignite 2016—How We Network TAP IT in Vegas

Data at Risk: Targeting Financial Institutions Through the Retail Back Door

Solving the Network Security Skills Shortage, Today and Tomorrow

[Partnership Announcement] Garland Technology and Cloud Harmonics Launch Partnership at Ignite 2016

3 Protocols You Need to Know Before Increasing Network Speeds

Anonymous Targets Trump, Renewing Attention To Greater Network Visibility

5 Steps for Tagging Packets in Port Channel Architecture

SCADA/ICS – Are We Scared Yet?

[Webinar] Find Your Network Blind Spots Sponsored by Palo Alto's Fuel User Group

Tapping to the Music, Looking Back at 2000’s

Breaking News - Palo Alto finds new OS X Ransomware

Not Ready for the 10G to 40G Transition? Consider Cisco's EtherChannel

Data at Risk Series: Cyber Attacks Are a Burden and a Blessing for the Insurance Industry

U.S. Presidential Elections are Prime for 2016 Hacks

"Are You Still Using SPAN Ports?”—[Video] A Recap of Cisco Live! Berlin

Avoiding the Critical OM3/OM4 Fiber Pitfall—Micron Mismatching

Data at Risk Series: Healthcare Cyber Security - is Now Life or Death

Tapping to the Music—Looking Back at the 1990s

Making the Switch: Serial Bus to Ethernet

On TAP at the Cisco Berlin Expo—Ensuring Network Visibility as Network Speeds Increase

Fractal Networks Require a Focused and Flexible Foundation

The 101 Series: Media Conversion—What the SX?

Looking at the Ukraine Power Grid Hack: Why Defending the Industrial Ethernet Is No Longer a Precautionary Tale

Jumbo Frames—Are You Sure Your Network TAPs Support Them?

Top Network Security Challenges/Concerns for 2016

Rhebo Leading the Way to Creating a More Secure Industrial Ethernet

Tapping to the Music, Looking Back at ’70s and ’80s

Think Mac’s are Safe? Meet MacKeeper.

Network TAPs are Not Toys, No Batteries Included!

Data at Risk: Corporate Confidentiality and VTech’s Data Breach

Maintaining Visibility Amidst 2016 Software-Defined Networking Trends

QUICK TIPS: Installing Multiple Cisco Switches

Spark Boston...and an Epic Star Wars Battle

The 101 Series: Quick Connect Tips for In-Band Security Appliances

Cyber Security Year in Review: Major Data Breaches of 2015

Network Architect’s Guide to Ensuring Network Monitoring Visibility

Anonymous vs. ISIS—A New Dimension of Cyber Warfare

The Network Architect’s Guide to Scaling Security Programs

The Challenges of Data Protection: Can Cyber Insurance Save You?

The Target Data Breach—What Two Years Can Teach Us

2015 Cyber Security Report: How the Biggest Threats and Breaches Affect Businesses Processes

Data at Risk Series: Corporate Confidentiality Cyber Attacks

4SICS Conference Recap on Industrial Control Systems

Lessons Learned from Mr. Robot: Understanding Advanced Persistent Threats

Data at Risk Series: How Is the Insurance Industry Stacking Up to Cyber Attacks?

101 Series: SPAN Mode On A Network TAP – What Is The Point?

CISA is Coming, But It’s Useless Without Visibility

[Recorded Webinar]: The In’s and Out’s of Internal and External Network TAPs

Data at Risk Series: Diving Into the Finance Industry Cyber Security Threats

it-sa 2015 Security Expo and Conference Wrap-Up

Be Prepared: What to Bring when Troubleshooting a Network

The 6 Things to Consider When Choosing a Cyber Insurance Policy

Planes, Trains and Automobiles: Transportation Hacking Headaches

September: Cyber Security Alert

Gearbit Insights on IT Performance Analysis in Complex Environments

Intrusion Detection 101: Rinse and Repeat

Cyber Phishing- $46.7M Stolen from One Company

Hacktivism: Should it Really be on Your Radar in 2015?

How to Report a Data Breach

Cyphort Pushes the Boundaries of Advanced Threat Detection

Why Risk Traffic Overload? Anchor Firewalls with a Network TAP

Smurfing and Other Mysterious Words in the Cyber World

The Cans and Cannots about Network TAPs

Cyber Security Alert

The Visibility Test: How to Give Security Devices a 360 View of Network Traffic

Security Connectivity Report: Optimizing Network Design for Forensic Analysis

The Smarter Things Network TAPs Do to Make Your Security Program Stronger

Your Solution for PCI Data Compliance

Network TAPs: The Ultimate Draft Pick for Your Security Defense Team

Plan Smartly: Map Your Network Design With Data In Mind

Your 10/40/100G Network Is More Susceptible To Data Breaches

Security Connectivity Report: Optimizing Network Design for Next‐gen Firewalls

[Video] Enable SNMP on Windows 8

SPAN Ports Have Always Been A Disaster To Your Network Security

Arm Your Critical Apps To Combat Network Security Issues

Thwart Hackers By Fortifying Your Network Design & Security

Network Design 101: TAP Your Network To Ensure Data Security

The Big Reason You’re Susceptible To Network Security Issues

Cost of Flawed Network Infrastructure Design Rising in 2015

Slash The Cost Of A Security Breach Within Your Network

Garland Technology at Ignite Conference 2015

How Hackers Stole Millions from Banks All Over the World

Fight Data Breaches In 2015 With Proactive Network Security

[Video] Cisco IP DNS Configuration Command and How it Can Improve Your Performance

Breaches Are a Question of "When" Not "If"

A Visibility Plane Can Lower Cyber Insurance Costs

What is the future of SDN?

Looking Into ICMP Redirects

Unveiling The True Cost Of Software-Defined Networking

Network Monitoring 101: Are SDN & Monitoring Tools The Same?

Getting Network Visibility a Bit at a Time

Don’t Kill Your Network Visibility When Implementing SDN

SDN Is Useless Without The Proper Connection

Software Defined Networking - What's The Hype?

Lacking APM Deprives You Of 90% Faster Troubleshooting

The Newest Technology Partner Of CISCO Solutions

Stop Misusing SPAN Ports Or Risk Losing Network Traffic Data

10M To 100G: Don’t Choose The Wrong Network TAP

Network Intruders On The Loose 24/7: Are You Protected?

Surprising Blind Spots In Your Network Visibility

Is Network Downtime & Failure Costing You $50,000 Per Hour?

Chinese Cyber Attacks – For Economic Gain or Cyber Invasion

Flawed Intrusion Detection = A 46% Gash In Your Profits

Edge Devices Perform More Tasks Than Any Other Layer

Protect Against Bleeding Data At Your Network Edge

Implement Data Loss Prevention To Run A Safer Business

What Must You Know About Lawful Interception?

The Changing Landscape Of Application Performance Monitoring

What Is Computer Forensics Analysis And How Does It Help Your Business?

Next-Generation Firewall: Changing The Threat Landscape

The Network Analyzer: Sniffing Out The Sniffer

Garland Technology at Sharkfest - Win a TAP!

Hitting The Network Management Jackpot At Interop 2014

A Bypass Network TAP That Multitasks

Connecting The Dots: Multimode Fiber Connectors

The Network TAP – Using In-Line Appliances Without Fear

Why TAPs Are The Clear Winner In Network Visibility

Bigger Is Rarely Better In Network Management

That Glamorous GUI

What is your Heart Beat telling you?

Put Your IPS into the Game

Show floor at the RSA Conference!

Garland Technology at RSA Conference USA 2013