Visibility Solutions

Garland Technology is committed to educating the benefits of having a strong foundation of network visibility and access. By providing this insight we protect the security of data across your network and beyond.

Resources

Garland Technology's resource library offers free use of white papers, eBooks, use cases, infographics, data sheets, video demos and more.

Blog

The TAP into Technology blog provides the latest news and insights on network access and visibility, including: network security, network monitoring and appliance connectivity and guest blogs from Industry experts and technology partners

Partners

Our extensive technology partnership ecosystem solves critical problems when it comes to network security, monitoring, application analysis, forensics and packet inspection.

Company

Garland Technology is dedicated to high standards in quality and reliability, while delivering the greatest economical solutions for enterprise, service providers, and government agencies worldwide.

Contact

Whether you are ready to make a network TAP your foundation of visibility or just have questions, please contact us. Ask us about the Garland Difference!

Blogheader image.png

TAP Into Technology

Leading the Way in Network Technology

Jerry Dillard

Jerry Dillard leverages two decades in design and engineering to ensure maximum performance within today’s network environments. Dillard, as the inventor of the Bypass Network Test Access Point (TAP), has secured his legacy as he continues to provide network solutions for data centers worldwide.

Recent Posts

Failsafe Deployment of 100G Inline Security Tools with EdgeSafe Bypass TAPs

on 11/12/19 8:00 AM By | Jerry Dillard | 0 Comments | Network TAPs Network Security Inline Security Appliances
Today’s networks have become sophisticated defense mechanisms, architected with numerous inline security tools such as firewalls, intrusion prevention systems, web application firewalls, data loss prevention, SSL decryption and more. While the benefits of these active tools as part of your security strategy to protect your network are inherent, the simple fact that they are inline creates some problems if not addressed properly, as they are potential single points of failure (SPOF) in the network. The use of bypass TAPs, deployed with inline appliances provides failsafe and heartbeat technology to monitor the appliance’s health, eliminating the single point of failure, while providing complete network visibility. 
Read More

Microservices: What Are They and How Do They Impact Network Visibility and Security in the Cloud?

After decades of consistent investment in perimeter cybersecurity tools, cloud-based architectures have pushed IT leaders to reevaluate their strategies. There is still a place for perimeter defenses like firewalls, intrusion detection systems, and intrusion prevention systems. But adapting to cloud environments and mobility means creating a defense-in-depth strategy that goes beyond the network perimeter. However, there’s no one-size-fits-all approach to defense-in-depth cybersecurity. What worked in the earliest days of public cloud adoption won’t exactly fit with the latest trend in cloud-native architecture—microservices today. As important as it may be to embrace cloud-native architecture to support digital business initiatives, you should not dive in without taking these steps to solve security and visibility challenges.
Read More

Capture 100% Full Duplex Traffic with RegenTAPs

With the rise in the number of monitoring tools enterprises are using to analyze their network traffic, a new problem has arisen; how will you get network traffic to multiple out-of-band monitoring tools? Garland Technology recognized the need for a Network TAP that would allow traffic from a single network link to be sent to multiple monitoring appliances to analyze the network. 
Read More

Securing the Edge in Cisco ACI with Garland Technology's EdgeLens

I’ve previously provided an introduction to Cisco ACI in terms of facilitating a next-generation data center by taking advanced of software defined networking. So if you haven’t read that post, it’s a great place to start. Abstraction is Key:  End Point Groups, Contracts and Service Graphs Abstraction is a key concept in administration, scaling, and deployment automation within Cisco ACI.  This is accomplished by defining endpoints and policies that determine how data flows through the ACI fabric. 
Read More

Unleash the Power of Packet Slicing and Time Stamping in your Network

In today’s environments with significant investment in security and monitoring tools, Garland Technology recognizes the need for a cost-effective solution that provides the flexibility and performance that networks today require. We have chosen to take the approach to deconstruct our packet broker solutions. Through the use of separate and dedicated hardware appliances to perform specific tasks, there is no degradation of overall performance while performing CPU intensive tasks or additional licence fees. This ensures that our customers have solutions that are flexible and scalable for future on-demand growth, while ensuring excellent ROI today. To build on our current PacketMAX™ packet broker solutions, consisting of our Advanced Aggregators, and Advanced Features Dedup, Garland is excited to announce the launch of our new PacketMAX™: Advanced Features appliance, that adds time stamping and packet slicing capabilities to your network. 
Read More

Network Visibility - The Rise of the Aggregation Layer

on 8/22/19 8:00 AM By | Jerry Dillard | 0 Comments | Network Design Network Visibility/Monitoring
Sole reliance on SPAN ports for network visibility and monitoring has been on the decline for years. IT teams have realized the inherent limitations of SPAN ports and have shifted towards the traditional 3-tiered approach to network visibility, Physical Layer TAPs, Network Packet Brokers, and Tools.
Read More