TAP Into Technology Blog
Leading the Way in Network Technology
5 Steps for Tagging Packets in Port Channel Architecture
Antiquated infrastructure, slow technology migrations, and limited bandwidth can’t keep pace with the traffic demands of increasingly advanced communications software, real-time data backup solutions, and other high-bandwidth applications....
SCADA/ICS – Are We Scared Yet?
Supervisory control and data acquisition systems (SCADA), or industrial control systems (ICS), have been monitoring and controlling our industrial, power and refinery world since the 1960s. Simply put, SCADA is the least protected and...
[Webinar] Find Your Network Blind Spots Sponsored by Palo Alto's Fuel User Group
At last year’s Ignite Conference and the 6 Spark User Summits we attended, we were surprised to find just how many network professionals are still relying on SPAN ports. Even though SPAN ports seemed to serve network architects well in the...
Tapping to the Music, Looking Back at 2000’s
In our new infographic, The Evolution of Network Visibility, we took a trip down melody lane to show readers the events and innovations that sparked the rise of network visibility. Relax and rewind to some rock from the 2000’s, when...
Not Ready for the 10G to 40G Transition? Consider Cisco's EtherChannel
Large enterprises know they will eventually have to make the transition from 10G networking to 40G if they want to overcome the challenges of big data and bandwidth-hogging applications. But boosting bandwidth quickly would require...
Data at Risk Series: Cyber Attacks a Burden and a Blessing for the Insurance Industry
In our first insurance installment in the Data at Risk series, we took a fairly narrow approach to cyber attack analysis in the industry. While major breaches at health insurance companies such as Anthem and Blue Cross Blue Shield make it...