Garland Technology ensures complete packet visibility by delivering a full platform of network TAP (test access point), inline bypass and packet broker products.
Garland Technology is committed to educating the benefits of having a strong foundation of network visibility and access. By providing this insight we protect the security of data across your network and beyond.
Garland Technology's resource library offers free use of white papers, eBooks, use cases, infographics, data sheets, video demos and more.
The TAP into Technology blog provides the latest news and insights on network access and visibility, including: network security, network monitoring and appliance connectivity and guest blogs from Industry experts and technology partners
Our extensive technology partnership ecosystem solves critical problems when it comes to network security, monitoring, application analysis, forensics and packet inspection.
Garland Technology is dedicated to high standards in quality and reliability, while delivering the greatest economical solutions for enterprise, service providers, and government agencies worldwide.
Whether you are ready to make a network TAP your foundation of visibility or just have questions, please contact us. Ask us about the Garland Difference!
What is known as “CEO fraud” and “business email compromise” is costing companies and individuals millions. Just ask Ubiquiti Network’s Inc. who recently suffered a devasting $46,700,000.00 fraud.
This is a big one, one of the biggest employee impersonation frauds ever.
Ubiquiti Network’s Inc. reported via SEC Form 8-K, “employee impersonation and fraudulent requests from an outside entity targeting the Company’s finance department resulted in transfers of funds aggregating $46.7 million held by a Company subsidiary incorporated in Hong Kong to other overseas accounts held by third parties.”
What is known as “CEO fraud” and “business email compromise” is costing companies and individuals millions. This is a sophisticated cyber phishing approach that targets businesses working with foreign suppliers that regularly perform wire transfer payments.
Businesses have big bank accounts and mostly ineffective security and verification policies. When discussing better visibility, it not only refers to seeing 100% of the data, but also taking corrective action, checking and cross checking, and having protocols in place to deter criminals from stealing money, data, or anything else that would jeopardize businesses.
Following an investigation, “the Company, its Audit Committee and advisors have concluded that the Company’s internal control over financial reporting is ineffective due to one or more material weaknesses”.
Ubiquiti’s Chief Accounting Officer resigned.
As of today, there are no details on how this cyber crime occurred, but CEO fraud usually begins with the thieves either phishing an executive and gaining access to that individual’s inbox, or emailing employees from a look-alike domain name.
Would a full visibility plane have helped in detection in this case? Well, it would have shown what was 'normal' and what is not. By knowing the baseline traffic, companies can determine aberrant behavior and put safe guards in place. Full visibility should be part of an early alarm and used during the primary investigative process.
If you cannot see it, you will never be able to fix it!
Download, How to Determine Your Baseline Traffic, by Tim O'Neill, for a step-by-step guide with typical measurements and screen shots.
As the Senior Technology Consultant & Chief Editor at LoveMyTool, Tim O’Neill has over 45 years of technology experience at data/voice and video networking analysis companies, including successful senior roles in Sales, Product Design, Marketing Management, Business Development and Security.