Chris Bihary
Chris Bihary, CEO and Co-founder of Garland Technology, has been in the network performance industry for over 20 years. Bihary has established collaborative partnerships with technology companies to complement product performance and security through the integration of network TAP visibility.
2 Fundamental Challenges Facing Critical Infrastructure in 2021
With recent headline grabbing hacks and breaches, the possibility of disruptions in the energy and power, water distribution, manufacturing, and pharmaceutical infrastructure that society relies on everyday, is a reality. The SolarWinds...
10 Cybersecurity Visibility Best Practices
2020 was challenging in many ways, from a rapid influx of remote working, the maturity of 5G computing, IoT/OT infrastructure, Edge and Cloud environments to the threats that come with them. According to AT&T Cybersecurity Insights™ Report...
3 Visibility Tips to Improve your Monitoring and Security Tools
We have been speaking with more and more IT teams looking to stretch their budgets to meet tomorrow’s monitoring and security challenges. Speed and network complexity are outpacing tools they bought as recently as 5 years ago. On top of...
Why Cybersecurity Relies on Redundancy to Ensure Network Availability
Today, 50% of large enterprises are spending over $1 million annually on cybersecurity.1 The worldwide information security market is forecast to reach over $170 billion by 2022, as enterprises are making huge investments when it comes to...
Adapting to New Security Demands at the Edge
In Part 1 of this “Master the Edge of the Network” series, we talked about the key networking factors you have to consider managing the edge of the network to gain these edge computing benefits. But edge computing isn’t without challenges....
How Historical Look-back is Revolutionizing Network Forensics and Inline Deployment
As you can imagine, cyberattacks are now increasing year over year from a combination of cybercriminals, hackers, malicious insiders, unwitting insiders, nation-state attackers and hacktivists. Their attack methods include social...