<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2975524&amp;fmt=gif">

Visibility Solutions

Garland Technology is committed to educating the benefits of having a strong foundation of network visibility and access. By providing this insight we protect the security of data across your network and beyond.


Garland Technology's resource library offers free use of white papers, eBooks, use cases, infographics, data sheets, video demos and more.


The TAP into Technology blog provides the latest news and insights on network access and visibility, including: network security, network monitoring and appliance connectivity and guest blogs from Industry experts and technology partners


Our extensive technology partnership ecosystem solves critical problems when it comes to network security, monitoring, application analysis, forensics and packet inspection.


Garland Technology is dedicated to high standards in quality and reliability, while delivering the greatest economical solutions for enterprise, service providers, and government agencies worldwide.


Whether you are ready to make a network TAP your foundation of visibility or just have questions, please contact us. Ask us about the Garland Difference!

Tim O'Neill

As the Senior Technology Consultant & Chief Editor at LoveMyTool, Tim O’Neill has over 45 years of technology experience at data/voice and video networking analysis companies, including successful senior roles in Sales, Product Design, Marketing Management, Business Development and Security.

The Current State of Hacking—And What to Expect in 2017

Surprise! 2016 is on pace to break records in terms of data breach volume—a feat that seems to be accomplished on an annual basis now. Through August 30, the Identity Theft Resource Center (ITRC) has counted 638 total data breaches with...

Read More

Hacking Education - The Next Soft Target

When you send your precious 5 year old off to Kindergarten this year, not only do you need to worry about bullying, drugs and homework, now add hacking their personal identifiable information (PII) to the list. We’ve read or experienced...

Read More

[SlideShare] Tech Talk 2016: Crapplet, Cat Waxing, and CamelCase

Back by popular demand is my second edition of Tech Talk, were you can learn all about "Crapplets," "Cat Waxing" and other unusually interesting words from the cyber world. In our 2015 post I explained "Smurfing" and "Yak Shaving," and...

Read More

Why Are You Hiding Your Duplicate Packets?

Major consideration – If you have duplicate packets in your network: Find out if you have problems in your network Then solve the issues Duplicate Packets (DP) are there for a reason whether it be good or bad (usally bad though). Do NOT...

Read More

Ransomware, a Billion Dollar World Wide Threat

Every day I hear that a company has solved the network and file security war with a new security widget. Yet every day there are more announcements of breaches, stolen identities, etc. According to the Identity Theft Resource Center (ITRC)...

Read More

Director of National Intelligence Cautions Presidential Candidates on Cyber Attacks

As if presidential candidates didn’t have enough on their plates defending themselves against their opponent’s attack ads, James Clapper has warned that they should expect to deal with cyberattacks. The Director recently went on record...

Read More



Sign Up for Blog Updates