TAP Into Technology Blog
Leading the Way in Network Technology
[Vote] How will InfoSec Prioritize its $1 Trillion Spending?
With organizations like Bank of America publicly stating that they have an unlimited budget to fight cybercrime, it no surprise in the recent Cybersecurity Market Report by Cybersecurity Ventures they are predicting worldwide spending on...
Why Are You Hiding Your Duplicate Packets?
Major consideration – If you have duplicate packets in your network: Find out if you have problems in your network Then solve the issues Duplicate Packets (DP) are there for a reason whether it be good or bad (usally bad though). Do NOT...
The 7 Things You Need to Know About MSSP Utilization
Why do so many of the world’s businesses wait to engage a managed security services provider (MSSP) until after they’ve experienced a data breach? A new study by the Ponemon Institute consists an in-depth survey of almost 2,000 IT...
Load Balancing at the Edge – Saves Budget While Keeping Up with Network Speed
Every security architect is facing the same problem today—pack more in-line security appliances into the stack on a limited budget. However, the challenge goes deeper than simply adding DDoS protection to your existing intrusion prevention...
Network TAP Split Ratios & Loss Budget
Do you know what a Split Ratio is on a fiber network TAP? Well there was a time when I didn't, either. But I know what a seven-ten split is in bowling and I know what it means to “split hairs,” but I didn’t know what a “Split Ratio” was...
[SlideShare] TAP Toons: Network v. Security - How to End the Finger Pointing
Now that security and networking operations have become so complex, it’s not surprising that administrators are quick to blame the other party when things go wrong – and they always do. It’s vital to build solutions into your network...