<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2975524&amp;fmt=gif">
BLOG

Complete Network Visibility: Your First Line of Defense

March 21, 2019

My Post (4) copy 2

Cyber attacks have become more persistent and sophisticated, leaving security professionals tasked with bolstering the network’s edge with a layer of complex security devices; each responsible for detecting, stopping, and analyzing specific types of threats.

With such complex networks and highly sophisticated attacks becoming the norm, companies no longer rely on a single tool to protect their network. Instead they rely on a combination of inline and out-of-band tools to handle firewall monitoring, bandwidth monitoring, protocol analysis, data leak prevention, traffic trending probes, packet analysis, and intrusion detection and prevention.

Intrusion Detection Service - Deployed out-of-band, an IDS detects malicious traffic on the network through either signature-based or anomaly-based techniques, logs the events, and alerts network administrators about the intrusion.

Intrusion Prevention Service - Deployed inline, an IPS is a proactive form of network defense; providing real-time inspection of each packet. Any suspicious or malicious packets are then dropped from the live network stream. There are more advanced methods of detection with an IPS over an IDS, including the addition of policy-based and protocol analysis-based methods.


What Your Network Is Missing 7 Tools To TAP

 

SIEM - Deployed out-of-band, SIEMs collect data that is generated from network tools’ event  logs based on the traffic flowing through the tool and how it reacted. For devices that can’t generate event logs, the packet decoder on the SIEM can evaluate packet headers, identify errors, and create logs from locations logs are missing.

Next-Gen Firewall - Deployed inline, NGFWs have additional features beyond a traditional firewall, such as IPS, Anti-virus, and URL filtering capabilities.

Data Loss Prevention - Deployed inline, DLP is a solution consisting of hardware and/or software appliances designed to make sure that the files accessed by only those authorized. DLP can generate reports on what data is being used, drop connections if sensitive files are being shared incorrectly, and some can even actively remove sensitive information from the document in real time.

Web Application Firewall - While a firewall protects the network a WAF will protect servers running web applications by applying rules to HTTP traffic to protect against attacks like cross-site scripting and SQL injections.

SSL Decryption - SSL encrypts packets so that sensitive information cannot be gathered as it travels over the network or internet, protecting information like passwords, credit card information, bank account information, etc. In order for security tools to do their job, they need access to traffic in an unencrypted state.

These tools all need access to data in order to do their job effectively and that’s the role Garland Technology plays in defending a network from a malicious threat. Unlike SPAN ports, Bypass TAPs provide complete network visibility by passing all live wire data to active, inline security tools, while monitoring the device’s health. If your security tool goes off-line for any reason, the bypass TAP automatically switches to bypass mode, keeping your network link up while you resolve the issue.

We’re experts at security here at Garland Technology. In fact, my co-founder and Garland's CTO, Jerry Dillard, invented the original Bypass TAP, which led to our EdgeSafe™ Bypass TAP and EdgeLens® Inline Security Packet Broker. The failsafe technology that is part of every bypass product guarantees 100% network uptime, and lets your security tools see every bit, byte, and packet.®

[Interested in learning more? Download our whitepaper: What your network is missing? 7 Tools to TAP today!]

See Everything. Secure Everything.

Contact us now to secure and optimized your network operations

Heartbeats Packets Inside the Bypass TAP

If the inline security tool goes off-line, the TAP will bypass the tool and automatically keep the link flowing. The Bypass TAP does this by sending heartbeat packets to the inline security tool. As long as the inline security tool is on-line, the heartbeat packets will be returned to the TAP, and the link traffic will continue to flow through the inline security tool.

If the heartbeat packets are not returned to the TAP (indicating that the inline security tool has gone off-line), the TAP will automatically 'bypass' the inline security tool and keep the link traffic flowing. The TAP also removes the heartbeat packets before sending the network traffic back onto the critical link.

While the TAP is in bypass mode, it continues to send heartbeat packets out to the inline security tool so that once the tool is back on-line, it will begin returning the heartbeat packets back to the TAP indicating that the tool is ready to go back to work. The TAP will then direct the network traffic back through the inline security tool along with the heartbeat packets placing the tool back inline.

Some of you may have noticed a flaw in the logic behind this solution!  You say, “What if the TAP should fail because it is also in-line? Then the link will also fail!” The TAP would now be considered a point of failure. That is a good catch – but in our blog on Bypass vs. Failsafe, I explained that if a TAP were to fail or lose power, it must provide failsafe protection to the link it is attached to. So our network TAP will go into Failsafe mode keeping the link flowing.

Glossary

  1. Single point of failure: a risk to an IT network if one part of the system brings down a larger part of the entire system.

  2. Heartbeat packet: a soft detection technology that monitors the health of inline appliances. Read the heartbeat packet blog here.

  3. Critical link: the connection between two or more network devices or appliances that if the connection fails then the network is disrupted.

NETWORK MANAGEMENT | THE 101 SERIES