<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2975524&amp;fmt=gif">
Skip to content

Visibility Solutions

Garland Technology is committed to educating the benefits of having a strong foundation of network visibility and access. By providing this insight we protect the security of data across your network and beyond.

Resources

Garland Technology's resource library offers free use of white papers, eBooks, use cases, infographics, data sheets, video demos and more.

Blog

The TAP into Technology blog provides the latest news and insights on network access and visibility, including: network security, network monitoring and appliance connectivity and guest blogs from Industry experts and technology partners

Partners

Our extensive technology partnership ecosystem solves critical problems when it comes to network security, monitoring, application analysis, forensics and packet inspection.

Company

Garland Technology is dedicated to high standards in quality and reliability, while delivering the greatest economical solutions for enterprise, service providers, and government agencies worldwide.

Contact

Whether you are ready to make a network TAP your foundation of visibility or just have questions, please contact us. Ask us about the Garland Difference!

Tim O'Neill

As the Senior Technology Consultant & Chief Editor at LoveMyTool, Tim O’Neill has over 45 years of technology experience at data/voice and video networking analysis companies, including successful senior roles in Sales, Product Design, Marketing Management, Business Development and Security.

Wireshark – From Ethereal to Today

The story about Wireshark is entwined with the story of Gerald Combs, the inventor, founder and heart behind Wireshark. It was always Gerald’s dream to build an open source, world class network analyzer, which is now the number one...

Read More

How Much is My Information Worth on the Dark Web?

In the April 5, 2016 report by the Identity Threat Resourse Center (ITRC) there have been 227 breaches which have compromised 6,214,514 records containing personally identifiable information (PII). The ITRC tracks data breaches involving...

Read More

SCADA/ICS – Are We Scared Yet?

Supervisory control and data acquisition systems (SCADA), or industrial control systems (ICS), have been monitoring and controlling our industrial, power and refinery world since the 1960s. Simply put, SCADA is the least protected and...

Read More

Data at Risk Series: Healthcare Cyber Security - is Now Life or Death

In our first Data at Risk post about healthcare, we discussed the current state of security in the industry. After highlighting the key vulnerabilities for healthcare providers—the move to digital patient records, aging electronic medical...

Read More

Making the Switch: Serial Bus to Ethernet

There’s a lot of talk these days about Industrial Ethernet. What it is and what it is not. Part of the misunderstanding is that the standards are very simple, yet stringent. The simple part of Industrial Ethernet is once you determine your...

Read More

Fractal Networks Require a Focused and Flexible Foundation

Focused and flexible are sometimes opposites but these are required in today’s higher, almost quantum network speeds. Is 100G the end? Absolutely not. Are Fractal Networks possible?

Read More

Authors

Topics

Sign Up for Blog Updates