Blogheader image.png

TAP Into Technology

Leading the Way in Network Technology

Chris Bihary

Chris Bihary has been in the network performance industry for over 20 years. Bihary has established collaborative partnerships with technology companies to complement product performance through the integration of network test access points. Previously, Bihary was Managing Partner at Network Critical.

Recent Posts

The 6 Levels Of Thwarting Network Security Issues

No matter what type of organization you have, you always run the risk of a network security issue. There are internal risks, of course, and every business has connections to outside vendors that introduce your network to the unknown.
Read More

Detect The 5 Common Threats Of Network Downtime

Network downtime is a costly reality of running a business, and unfortunately, it’s more likely to happen to you than not. If Google, Amazon and the United States Government have dealt with such issues, it’s a safe bet that you’re going to run into them as well.
Read More

Challenges of Defending the Internet of Things

on 7/10/18 8:00 AM By | Chris Bihary | 0 Comments | Network Security
Do you remember what you were doing on October 21, 2016? Probably not, but I can tell you what you weren’t doing. You weren’t on Twitter, Spotify, Netflix, Reddit, Tumblr, or visiting so many other major websites.
Read More

Back to the Basics: What is Network Monitoring?

on 7/5/18 8:00 AM By | Chris Bihary | 0 Comments | Network Visibility/Monitoring
Network monitoring is far from a new topic. However, with so many new networking trends and applications demanding attention, it’s easy to lose focus on network monitoring despite the fact that it’s so critical to long-term business success.
Read More

Ensure Complete Network Visibility for Your Incident Response Plan

on 6/7/18 8:00 AM By | Chris Bihary | 0 Comments | Network Security Hacks and Data Breaches
Cyber threats are quickly becoming more sophisticated with Advanced Persistent Threats (APTs) creating a new level of security risk. That’s why it’s now more important than ever before to use next generation threat intelligence combined with network visibility to add an additional layer of security to your network.
Read More

How to Connect your Inline Application Monitoring Tools in 5 Steps

It goes without saying, but proper application monitoring is a critical component of sound network management. Let the following example show you:
Read More