TAP into Technology | Garland Technology Blog

Court Approved and Can't Be Hacked: The Network TAP

Written by Tim O'Neill | 1/3/17 1:00 PM

How trusted does your data have to be? In today's world of data breaches and hacks, it is best to be capturing 100% of your data. In the court of law, dropped packets equal unsubmittable evidence.

Learn what makes network TAPs approved for CALEA and Lawful Intercept cases.

The Network TAP (Network Test Access Point) transmits the send and receive data streams simultaneously on separate dedicated channels, ensuring all data arrives at the monitoring device in real time - 100% of the data.

And because of this, Network TAPs are approved for use in CALEA (The Commission on Accreditation for Law Enforcement Agencies, Inc.) and Lawful Intercept cases.

The SPAN or monitor port, unlike the TAP, will drop packets when ports when oversubscribed and can distort real time communication such as VoIP and video chats, making lawful intercept unacceptable.

Speaking of hacks, did you know a Network TAP cannot be hacked? If you are relying on the SPAN port, tell yourself, if it has an IP address, it can be hacked. The Network TAP has No IP address, No MAC address and is invisible to the network.

Today's network, security and management pros require 100% network uptime while maintaining full network visibility and access. You can't afford to not see every bit, byte and packet.®

Which do you use to feed your tools? Click below and take a look at the new TAP vs SPAN infographic and compare the difference.