TAP Into Technology Blog
Leading the Way in Network Technology
Ensure Complete Network Visibility for Your Incident Response Plan
Cyber threats are quickly becoming more sophisticated with Advanced Persistent Threats (APTs) creating a new level of security risk. That’s why it’s now more important than ever before to use next generation threat intelligence combined...
How to Connect your Inline Application Monitoring Tools in 5 Steps
It goes without saying, but proper application monitoring is a critical component of sound network management. Let the following example show you: Say you have two critical 10G links that you need to monitor with a few inline network...
TAP One Link to Add Resiliency to Your Cisco Deployment
As part of the Cisco Solution Partner Program, Garland Technology helps provide visibility and access for Cisco security and performance monitoring solutions. The partnership provides value to companies deploying Cisco products including...
7 reasons why you shouldn’t choose SPAN as a real visibility access device
Every day I come across network techs who continue to rely on SPAN ports for their network access method. This blows my mind as its been proven time and again why you shouldn’t rely on SPAN ports. Let me share with you some of those...
Design-IT Solutions: Remote Management for Inline Devices
Networks are becoming more and more distributed. We’re starting to see more customers deploying security tools at their remote locations, such as bank branches and retail outlets, or as managed services to clients.
Cybersecurity Threat Breakdown - April 2018
Here’s your monthly roundup of the latest hacks and data breaches around the world. In this new monthly series, we’ll share information and updates on the most recent hacks that have made headlines, including causes, resolutions, and what...