Visibility Solutions

Garland Technology is committed to educating the benefits of having a strong foundation of network visibility and access. By providing this insight we protect the security of data across your network and beyond.

Resources

Garland Technology's resource library offers free use of white papers, eBooks, use cases, infographics, data sheets, video demos and more.

Blog

The TAP into Technology blog provides the latest news and insights on network access and visibility, including: network security, network monitoring and appliance connectivity and guest blogs from Industry experts and technology partners

Partners

Our extensive technology partnership ecosystem solves critical problems when it comes to network security, monitoring, application analysis, forensics and packet inspection.

Company

Garland Technology is dedicated to high standards in quality and reliability, while delivering the greatest economical solutions for enterprise, service providers, and government agencies worldwide.

Contact

Whether you are ready to make a network TAP your foundation of visibility or just have questions, please contact us. Ask us about the Garland Difference!

Blogheader image.png

TAP Into Technology

Leading the Way in Network Technology

Court Approved and Can't Be Hacked: The Network TAP

Posted by Tim O'Neill | 1/3/17 8:00 AM

How trusted does your data have to be? In today's world of data breaches and hacks, it is best to be capturing 100% of your data. In the court of law, dropped packets equal unsubmittable evidence.

Learn what makes network TAPs approved for CALEA and Lawful Intercept cases.

The Network TAP (Network Test Access Point) transmits the send and receive data streams simultaneously on separate dedicated channels, ensuring all data arrives at the monitoring device in real time - 100% of the data.

And because of this, Network TAPs are approved for use in CALEA (The Commission on Accreditation for Law Enforcement Agencies, Inc.) and Lawful Intercept cases.

The SPAN or monitor port, unlike the TAP, will drop packets when ports when oversubscribed and can distort real time communication such as VoIP and video chats, making lawful intercept unacceptable.

Speaking of hacks, did you know a Network TAP cannot be hacked? If you are relying on the SPAN port, tell yourself, if it has an IP address, it can be hacked. The Network TAP has No IP address, No MAC address and is invisible to the network.

Today's network, security and management pros require 100% network uptime while maintaining full network visibility and access. You can't afford to not see every bit, byte and packet.®

Which do you use to feed your tools? Click below and take a look at the new TAP vs SPAN infographic and compare the difference. 

TAP vs SPAN

 

Topics: TAPs vs SPAN

Written by Tim O'Neill

As the Senior Technology Consultant & Chief Editor at LoveMyTool, Tim O’Neill has over 45 years of technology experience at data/voice and video networking analysis companies, including successful senior roles in Sales, Product Design, Marketing Management, Business Development and Security.