<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2975524&amp;fmt=gif">
Skip to content

Visibility Solutions

Garland Technology is committed to educating the benefits of having a strong foundation of network visibility and access. By providing this insight we protect the security of data across your network and beyond.

Resources

Garland Technology's resource library offers free use of white papers, eBooks, use cases, infographics, data sheets, video demos and more.

Blog

The TAP into Technology blog provides the latest news and insights on network access and visibility, including: network security, network monitoring and appliance connectivity and guest blogs from Industry experts and technology partners

Partners

Our extensive technology partnership ecosystem solves critical problems when it comes to network security, monitoring, application analysis, forensics and packet inspection.

Company

Garland Technology is dedicated to high standards in quality and reliability, while delivering the greatest economical solutions for enterprise, service providers, and government agencies worldwide.

Contact

Whether you are ready to make a network TAP your foundation of visibility or just have questions, please contact us. Ask us about the Garland Difference!

Visibility Solutions

Garland Technology is committed to educating the benefits of having a strong foundation of network visibility and access. By providing this insight we protect the security of data across your network and beyond.

Resources

Garland Technology's resource library offers free use of white papers, eBooks, use cases, infographics, data sheets, video demos and more.

Blog

The TAP into Technology blog provides the latest news and insights on network access and visibility, including: network security, network monitoring and appliance connectivity and guest blogs from Industry experts and technology partners

Partners

Our extensive technology partnership ecosystem solves critical problems when it comes to network security, monitoring, application analysis, forensics and packet inspection.

Company

Garland Technology is dedicated to high standards in quality and reliability, while delivering the greatest economical solutions for enterprise, service providers, and government agencies worldwide.

Contact

Whether you are ready to make a network TAP your foundation of visibility or just have questions, please contact us. Ask us about the Garland Difference!

Historical Lookback - The Proof is in the Packet

"It's the Unicorn we've been looking for!"

This was the response I got the other day when I was explaining to a customer the benefits of looking back at packets before and after they pass through an active, inline device and a packet capture or forensics tool.

Simply put, how else will enterprise networks have real-time knowledge of an attempted attack, as well as the ability to look back and see how the packets were altered or dropped?

Historical lookback aka before & after, is solution that uses hybrid bypass TAPs with monitoring ports that allow both security tools, such as next-gen firewalls and intrusion prevention systems to share packets with multiple monitoring tools such as network packet capture, forensics, deep packet inspection, etc.

>> Download now: Learn how to improve your IT security with better threat detection and prevention tool deployment.

EdgeLens® Garland Technology's hybrid bypass TAP and In-line Security Packet Broker provides identical network traffic streams, both through the active, inline security tools (IPS/NGFW/WAF), and to the network packet capture, forensics, deep packet inspection and/or lawful intercept tools.

Because all devices see the same traffic, it is easy to correlate events generated by the active, in-line device with the PCAP data which is captured and indexed within the out-of-band packet analysis tools.

Historical Lookback - SecurityMonitoringTools.png

Historical Lookback (before/after) Benefits

  • Real time events correlation
  • Change verification
  • Root cause analysis

Once a breach or critical event is detected, it's imperative to facilitate a real-time security incidence response, including retrieval of full sessions and other detailed context around those critical events. Extracted PCAP files may be further analyzed by a variety of out-of-band tools for security forensics.

This solution can be deployed with most vendors network analyzer tools and security tools, the tools are independently managed through the EdgeLen's interface - the key here is that all the tools share the same packets via the identical network stream.

Looking to add IT Security solution to your security deployment, but not sure where to start? Join us for a brief network Design-IT consultation or demo. No obligation - it’s what we love to do!

IT security garland Technology tool deployment

Written by Chris Bihary

Chris Bihary, CEO and Co-founder of Garland Technology, has been in the network performance industry for over 20 years. Bihary has established collaborative partnerships with technology companies to complement product performance and security through the integration of network TAP visibility.

Authors

Topics

Sign Up for Blog Updates