TAP Into Technology Blog
Leading the Way in Network Technology
The Smarter Things Network TAPs Do to Make Your Security Program Stronger
Make no mistake – securing your organization from outside cyber threats is one of the most difficult and challenging aspects of IT. In all likelihood, attackers are continually probing your network, seeking passwords, vulnerabilities or...
Cybersecurity Threat Breakdown [Ohio Hospital System + USPS]
With years of experience in the technology industry, headlines about cyber attacks and data breaches stand out to me. Here’s your monthly roundup of the latest hacks and data breaches around the world. In this monthly series, I’ll share...
Secure your Surveillance System from a DDos Attack
IP surveillance is quickly becoming a commodity. As the price of high definition network cameras continues to fall, it’s easier to find room in your budget for a basic system. Physical security hardware sales are expected to increase 8.9%...
Network Visibility Fabric Design: Starts with the Access Layer
Network visibility fabrics, a combination of network TAPs, network packet brokers, aggregation devices, and bypass devices, play a critical role for network performance management and security operations.
Where TopN monitoring falls short
A case for capturing all packets With the recent Garland Technology and TOYOTech technical partnership, there will literally be no packets left behind in the network world. Garland’s line of Network TAPs provides complete packet...
Back to Basics: Packet Capture & Analysis
Network monitoring and analysis tools aren’t new topics by any means, but as with everything, sometimes it’s great to go back to the basics and get a refresher. While security tools and trends tend to get all the attention, it’s important...