Blogheader image.png

TAP Into Technology

Leading the Way in Network Technology

Foundation of Visibility: 6 Reasons to Choose TAPs instead of SPAN

on 12/18/18 8:00 AM By | Timothy Schmidt | 0 Comments | TAPs vs SPAN Network TAPs
Designing your network infrastructure, whether it’s for an upgrade or a new data center, is a complex project filled with many challenges. But one that should be easy to overcome is the decision to rely on Network TAPs as the foundation of visibility, rather than using SPAN or Mirror Ports. Today’s networks demand complete visibility by passing all live wire data, guaranteed 100% uptime for active, inline security tools, and no packet loss for out-of-band tools.
Read More

What's the difference between BiDi and Bi-Directional?

on 12/13/18 8:00 AM By | Jonathan Devoy | 0 Comments | Network Design Network TAPs
Computer networking terminology can become overly fickle once vendor products get into the mix. To help alleviate the confusion, we’re going to go over how Garland Technology approaches terminology and hopefully clear up some understanding about Network TAPs.
Read More

Advanced Persistent Threat Activity Exploiting Managed Service Providers

on 12/11/18 8:00 AM By | Jonathan Devoy | 0 Comments | Network Security Network Management
The National Cybersecurity and Communications Integration Center has been tracking attacks on global Managed Service Providers (MSP) from Advanced Persistent Threat actors since 2016. Targets of these attacks spread across Information Technology (IT), Energy, Healthcare, Public Health, Communications, and Manufacturing industries.
Read More

The Smarter Things Network TAPs Do to Make Your Security Program Stronger

on 12/6/18 8:00 AM By | Chris Bihary | 0 Comments | Network TAPs Network Design Network Security
Make no mistake – securing your organization from outside cyber threats is one of the most difficult and challenging aspects of IT. In all likelihood, attackers are continually probing your network, seeking passwords, vulnerabilities or unprotected ports to gain entrance and privileges. Today it seems as if you need an army of appliances – firewalls, intrusion detection, forensics and more – to properly protect your organization.
Read More

Cybersecurity Threat Breakdown [Ohio Hospital System + USPS]

on 11/29/18 8:00 AM By | Erica Tank | 0 Comments | Hacks and Data Breaches Network Security
With years of experience in the technology industry, headlines about cyber attacks and data breaches stand out to me. Here’s your monthly roundup of the latest hacks and data breaches around the world. In this monthly series, I’ll share information and updates on the most recent hacks that I saw in the news, including causes, resolutions, and what you can do to protect your data.
Read More

Secure your Surveillance System from a DDos Attack

on 11/27/18 8:00 AM By | Vince Black | 0 Comments |
IP surveillance is quickly becoming a commodity. As the price of high definition network cameras continues to fall, it’s easier to find room in your budget for a basic system. Physical security hardware sales are expected to increase 8.9% by 2025 according to Grand View Research, with the physical security segment market reaching $133.9 billion as of 2016.
Read More