TAP Into Technology Blog
Leading the Way in Network Technology
Key Tools and Tips for Successfully Identifying Security Breaches
When a company is breached, every second counts in the race to mitigate damages. But most aren’t prepared – today it takes most companies more than 200 days to even detect a breach in the first place. Data breaches have finally slowed down...
The 101 Series: Network Packet Brokers
Understanding and maintain control of your network is a constant, uphill battle. With the increase in network virtualization, BYOD, and growing number of security threats, network monitoring is more important than ever. It’s well...
Garland TAPs at Work for the SECCDC
"You have just been hired as the network and security administrators at a small company and will be taking administrative control of all information systems. You know very little about the network, what security level has been maintained,...
What Happens When a Healthcare Computer Network Goes Down?
I hear it in the news every couple days or so, another major organization was hacked and one of two things likely happened; their network went down, or customer information was stolen. At this point we’ve all become so used to hearing...
Understanding the Visibility Limitations of SPAN Ports
Visibility is key for today’s Network Engineers and Managers. Visibility is a MUST when thinking about network security and compliance requirements and soon GDPR. I want to focus on the need for real visibility that only TAPs provide...
Design-IT Solutions: How to TAP a Wireless Access Point
The addition of wireless connections or “Wi-Fi” to networks has provided a cost-effective way to allow endpoints to communicate with both back-end resources and each other. Traditionally, copper cabling would need to be run throughout a...