Visibility Solutions

Garland Technology is committed to educating the benefits of having a strong foundation of network visibility and access. By providing this insight we protect the security of data across your network and beyond.

Resources

Garland Technology's resource library offers free use of white papers, eBooks, use cases, infographics, data sheets, video demos and more.

Blog

The TAP into Technology blog provides the latest news and insights on network access and visibility, including: network security, network monitoring and appliance connectivity and guest blogs from Industry experts and technology partners

Partners

Our extensive technology partnership ecosystem solves critical problems when it comes to network security, monitoring, application analysis, forensics and packet inspection.

Company

Garland Technology is dedicated to high standards in quality and reliability, while delivering the greatest economical solutions for enterprise, service providers, and government agencies worldwide.

Contact

Whether you are ready to make a network TAP your foundation of visibility or just have questions, please contact us. Ask us about the Garland Difference!

Blogheader image.png

TAP Into Technology

Leading the Way in Network Technology

Complete Network Visibility: Your First Line of Defense

Posted by Chris Bihary | 3/21/19 8:00 AM

Cyber attacks have become more persistent and sophisticated, leaving security professionals tasked with bolstering the network’s edge with a layer of complex security devices; each responsible for detecting, stopping, and analyzing specific types of threats.

With such complex networks and highly sophisticated attacks becoming the norm, companies no longer rely on a single tool to protect their network. Instead they rely on a combination of inline and out-of-band tools to handle firewall monitoring, bandwidth monitoring, protocol analysis, data leak prevention, traffic trending probes, packet analysis, and intrusion detection and prevention.

Intrusion Detection Service - Deployed out-of-band, an IDS detects malicious traffic on the network through either signature-based or anomaly-based techniques, logs the events, and alerts network administrators about the intrusion.

Intrusion Prevention Service - Deployed inline, an IPS is a proactive form of network defense; providing real-time inspection of each packet. Any suspicious or malicious packets are then dropped from the live network stream. There are more advanced methods of detection with an IPS over an IDS, including the addition of policy-based and protocol analysis-based methods.


What Your Network Is Missing 7 Tools To TAP

 

SIEM - Deployed out-of-band, SIEMs collect data that is generated from network tools’ event  logs based on the traffic flowing through the tool and how it reacted. For devices that can’t generate event logs, the packet decoder on the SIEM can evaluate packet headers, identify errors, and create logs from locations logs are missing.

Next-Gen Firewall - Deployed inline, NGFWs have additional features beyond a traditional firewall, such as IPS, Anti-virus, and URL filtering capabilities.

Data Loss Prevention - Deployed inline, DLP is a solution consisting of hardware and/or software appliances designed to make sure that the files accessed by only those authorized. DLP can generate reports on what data is being used, drop connections if sensitive files are being shared incorrectly, and some can even actively remove sensitive information from the document in real time.

Web Application Firewall - While a firewall protects the network a WAF will protect servers running web applications by applying rules to HTTP traffic to protect against attacks like cross-site scripting and SQL injections.

SSL Decryption - SSL encrypts packets so that sensitive information cannot be gathered as it travels over the network or internet, protecting information like passwords, credit card information, bank account information, etc. In order for security tools to do their job, they need access to traffic in an unencrypted state.

These tools all need access to data in order to do their job effectively and that’s the role Garland Technology plays in defending a network from a malicious threat. Unlike SPAN ports, Bypass TAPs provide complete network visibility by passing all live wire data to active, inline security tools, while monitoring the device’s health. If your security tool goes off-line for any reason, the bypass TAP automatically switches to bypass mode, keeping your network link up while you resolve the issue.

We’re experts at security here at Garland Technology. In fact, my co-founder and Garland's CTO, Jerry Dillard, invented the original Bypass TAP, which led to our EdgeSafe™ Bypass TAP and EdgeLens® Inline Security Packet Broker. The failsafe technology that is part of every bypass product guarantees 100% network uptime, and lets your security tools see every bit, byte, and packet.®

[Interested in learning more? Download our whitepaper: What your network is missing? 7 Tools to TAP today!]

Topics: Network Management, Network Security, Hacks and Data Breaches, In Band Security Appliances

Written by Chris Bihary

Chris Bihary has been in the network performance industry for over 20 years. Bihary has established collaborative partnerships with technology companies to complement product performance through the integration of network test access points. Previously, Bihary was Managing Partner at Network Critical.