TAP Into Technology Blog
Leading the Way in Network Technology
Cybersecurity Threat Breakdown [Marriott + HSBC]
With years of experience in the technology industry, headlines about cyber attacks and data breaches stand out to me. Here’s your monthly roundup of the latest hacks and data breaches around the world. In this monthly series, I’ll share...
Bypass vs Failsafe: What's the Difference?
Computer networking terminology can become overly fickle once vendor products get into the mix. To help alleviate some confusion, we’re going to go over some common terms that often throw customers for a loop and hopefully clear up some...
Foundation of Visibility: 6 Reasons to Choose TAPs instead of SPAN
Designing your network infrastructure, whether it’s for an upgrade or a new data center, is a complex project filled with many challenges. But one that should be easy to overcome is the decision to rely on Network TAPs as the foundation of...
What's the difference between BiDi and Bi-Directional?
Computer networking terminology can become overly fickle once vendor products get into the mix. To help alleviate the confusion, we’re going to go over how Garland Technology approaches terminology and hopefully clear up some understanding...
Advanced Persistent Threat Activity Exploiting Managed Service Providers
The National Cybersecurity and Communications Integration Center has been tracking attacks on global Managed Service Providers (MSP) from Advanced Persistent Threat actors since 2016. Targets of these attacks spread across Information...
The Smarter Things Network TAPs Do to Make Your Security Program Stronger
Make no mistake – securing your organization from outside cyber threats is one of the most difficult and challenging aspects of IT. In all likelihood, attackers are continually probing your network, seeking passwords, vulnerabilities or...