Visibility Solutions

Garland Technology is committed to educating the benefits of having a strong foundation of network visibility and access. By providing this insight we protect the security of data across your network and beyond.

Resources

Garland Technology's resource library offers free use of white papers, eBooks, use cases, infographics, data sheets, video demos and more.

Blog

The TAP into Technology blog provides the latest news and insights on network access and visibility, including: network security, network monitoring and appliance connectivity and guest blogs from Industry experts and technology partners

Partners

Our extensive technology partnership ecosystem solves critical problems when it comes to network security, monitoring, application analysis, forensics and packet inspection.

Company

Garland Technology is dedicated to high standards in quality and reliability, while delivering the greatest economical solutions for enterprise, service providers, and government agencies worldwide.

Contact

Whether you are ready to make a network TAP your foundation of visibility or just have questions, please contact us. Ask us about the Garland Difference!

Blogheader image.png

TAP Into Technology

Leading the Way in Network Technology

Networking News: IoT Risks + Network Monitoring in the Cloud Era

Posted by Chris Bihary | 6/4/19 8:00 AM

In this day and age, the networking world is constantly changing with discovered risks and issues from new technology, monitoring and security measures in new cloud environments and many more. With so much note-worthy news, here are snippets from interesting and important stories and updates in the industry this month, and what it could mean for the industry as a whole.

The risk of having bad IoT data

As the use of internet of things (IoT) devices grows, the data they generate continues to worm its way into more various areas of personal and private life. Customers of an insurance company for example can save big on cost when a smart device installed in their cars can track their safe driving. With this, a big question arises as to who should take responsibility when things go wrong.  Read more to find out the potential problems that arises, and the strict need for government regulations to determine data resilience and reliability. 
New Call-to-action

Network Monitoring in a Multi-cloud Era 

Traditional monitoring tools center around the health and performance of individual network elements. Today’s digital business era requires a more holistic view of networks with the ability to glean and correlate data from diverse cloud environments using big data analytics and machine learning. Most enterprises now use two or more cloud service providers, and 35% use up to 5 monitoring tools to keep tabs in hybrid cloud and multi-cloud environments. What’s the best approach to full network visibility? Read more.

Study: Most Enterprise IoT transactions are unencrypted

The research by cloud-based security provider Zscaler found that about 91.5% of transactions by IoT devices took place over plaintext, while 8.5% were encrypted with SSL. Traffic can be intercepted by attackers and data can be altered. While IoT devices are common in enterprises, many of the devices are employee owned and this is just one of the reasons they are a security concern. Read on to know some of the preventive measures that you can take to avoid attacks on unencrypted IoT transactions.


[Interested in learning more about the network monitoring industry? Download our whitepaper: The Ultimate Guide to Network Monitoring today.]

Topics: Network Management, Network Visibility/Monitoring, Technology Partners, Cloud Solutions

Written by Chris Bihary

Chris Bihary has been in the network performance industry for over 20 years. Bihary has established collaborative partnerships with technology companies to complement product performance through the integration of network test access points. Previously, Bihary was Managing Partner at Network Critical.