Blog https://www.garlandtechnology.com/blog Technology expert blog on network security, monitoring, visibility and access with network TAPs and access points. en-us Thu, 10 Nov 2022 13:00:04 GMT 2022-11-10T13:00:04Z en-us Cybersecurity Anxiety Transcends Geographies https://www.garlandtechnology.com/blog/cybersecurity-anxiety-transcends-geographies <div class="hs-featured-image-wrapper"> <a href="https://www.garlandtechnology.com/blog/cybersecurity-anxiety-transcends-geographies" title="" class="hs-featured-image-link"> <img src="https://www.garlandtechnology.com/hubfs/2022/Website/Blog/blog.jpg" alt="Conference-trade-show" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>4,848 miles separate Nuremberg, Germany and Orlando, Florida. But surprisingly, their cybersecurity concerns are much closer than their physical distance.<br><br>I traveled to both cities in the past month to attend <a href="https://www.itsa365.de/en/it-sa-expo-congress"><span>it-sa Expo &amp; Congress</span></a>, October 10-12 and the <a href="https://www.flpublicpower.com/events/energy-connections-conference"><span>2022 FMEA Energy Connections Conference &amp; Trade Show</span></a>, November 3-4. (For those not familiar, it-sa is a major trade show for IT security in Europe and FMEA Energy Connections Conference is the Florida Municipal Energy Association’s event for electric utility management and operations professionals to come together to learn and share best practices.)<br><br>This blog is a brief summary of my observations from both events.</p> <h3><strong></strong></h3> <div class="hs-featured-image-wrapper"> <a href="https://www.garlandtechnology.com/blog/cybersecurity-anxiety-transcends-geographies" title="" class="hs-featured-image-link"> <img src="https://www.garlandtechnology.com/hubfs/2022/Website/Blog/blog.jpg" alt="Conference-trade-show" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>4,848 miles separate Nuremberg, Germany and Orlando, Florida. But surprisingly, their cybersecurity concerns are much closer than their physical distance.<br><br>I traveled to both cities in the past month to attend <a href="https://www.itsa365.de/en/it-sa-expo-congress"><span>it-sa Expo &amp; Congress</span></a>, October 10-12 and the <a href="https://www.flpublicpower.com/events/energy-connections-conference"><span>2022 FMEA Energy Connections Conference &amp; Trade Show</span></a>, November 3-4. (For those not familiar, it-sa is a major trade show for IT security in Europe and FMEA Energy Connections Conference is the Florida Municipal Energy Association’s event for electric utility management and operations professionals to come together to learn and share best practices.)<br><br>This blog is a brief summary of my observations from both events.</p> <h3><strong></strong></h3> <img src="https://track.hubspot.com/__ptq.gif?a=393566&amp;k=14&amp;r=https%3A%2F%2Fwww.garlandtechnology.com%2Fblog%2Fcybersecurity-anxiety-transcends-geographies&amp;bu=https%253A%252F%252Fwww.garlandtechnology.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Network TAPs Events & News Network Packet Brokers Thu, 10 Nov 2022 13:00:00 GMT chris.bihary@garlandtechnology.com (Chris Bihary) https://www.garlandtechnology.com/blog/cybersecurity-anxiety-transcends-geographies 2022-11-10T13:00:00Z Ensuring Success of New Federal Zero Trust Initiatives https://www.garlandtechnology.com/blog/ensuring-success-of-new-federal-zero-trust-initiatives-1 <div class="hs-featured-image-wrapper"> <a href="https://www.garlandtechnology.com/blog/ensuring-success-of-new-federal-zero-trust-initiatives-1" title="" class="hs-featured-image-link"> <img src="https://www.garlandtechnology.com/hubfs/2022/Website/Blog/zero-trust-blog.jpg" alt="zero trust" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <h3 style="font-size: 24px;">Making Progress with Federal Zero Trust Initiatives</h3> <p>President Biden designated October as “Cybersecurity Awareness Month,” and the White House released a fact sheet updating the progress made on his May 2021 executive order on national cybersecurity. Updates include:</p> <ul> <li>Educating stakeholders in transportation, banking, water, and healthcare sectors on the need to adopt minimum cybersecurity standards. Including new cyber requirements from the TSA for passenger and freight railroad carriers.</li> <li>Expanding the Nation’s network of electric-vehicle charging stations but also ensuring they include cyber protections as they are built.</li> <li>Encouraging adoption of multi-factor authentication.</li> <li>Announcing a 120-day Cybersecurity Apprenticeship Sprint to help train a cybersecurity workforce in the US.</li> </ul> <p>In light of the progress report, we re-read the “Executive Order on Improving the Nation’s Cybersecurity,” and how it directs the US Federal Government to move towards a Zero Trust cybersecurity architecture. What does this all mean?</p> <h3 style="font-size: 24px;"></h3> <div class="hs-featured-image-wrapper"> <a href="https://www.garlandtechnology.com/blog/ensuring-success-of-new-federal-zero-trust-initiatives-1" title="" class="hs-featured-image-link"> <img src="https://www.garlandtechnology.com/hubfs/2022/Website/Blog/zero-trust-blog.jpg" alt="zero trust" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <h3 style="font-size: 24px;">Making Progress with Federal Zero Trust Initiatives</h3> <p>President Biden designated October as “Cybersecurity Awareness Month,” and the White House released a fact sheet updating the progress made on his May 2021 executive order on national cybersecurity. Updates include:</p> <ul> <li>Educating stakeholders in transportation, banking, water, and healthcare sectors on the need to adopt minimum cybersecurity standards. Including new cyber requirements from the TSA for passenger and freight railroad carriers.</li> <li>Expanding the Nation’s network of electric-vehicle charging stations but also ensuring they include cyber protections as they are built.</li> <li>Encouraging adoption of multi-factor authentication.</li> <li>Announcing a 120-day Cybersecurity Apprenticeship Sprint to help train a cybersecurity workforce in the US.</li> </ul> <p>In light of the progress report, we re-read the “Executive Order on Improving the Nation’s Cybersecurity,” and how it directs the US Federal Government to move towards a Zero Trust cybersecurity architecture. What does this all mean?</p> <h3 style="font-size: 24px;"></h3> <img src="https://track.hubspot.com/__ptq.gif?a=393566&amp;k=14&amp;r=https%3A%2F%2Fwww.garlandtechnology.com%2Fblog%2Fensuring-success-of-new-federal-zero-trust-initiatives-1&amp;bu=https%253A%252F%252Fwww.garlandtechnology.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Network TAPs Thu, 27 Oct 2022 12:00:00 GMT https://www.garlandtechnology.com/blog/ensuring-success-of-new-federal-zero-trust-initiatives-1 2022-10-27T12:00:00Z Andy Colaianni 5 Reasons to TAP your Network https://www.garlandtechnology.com/blog/5-reasons-to-tap-your-network <div class="hs-featured-image-wrapper"> <a href="https://www.garlandtechnology.com/blog/5-reasons-to-tap-your-network" title="" class="hs-featured-image-link"> <img src="https://www.garlandtechnology.com/hubfs/2022/Website/Blog/5%20reasons%20to%20tap%20your%20network.jpg" alt="5 reasons to TAP your network Garland Technology network monitoring" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><span style="font-weight: 400;">Why do I need TAPs? &nbsp;That’s a question I hear a lot from people in the field. &nbsp;Either they aren’t familiar with TAPs, or even if they are, with a low utilization, they may think there isn’t an application that makes sense for them. <br><br></span><span style="font-weight: 400;">We’ll I’m here to tell you that there is an application for<a href="https://www.garlandtechnology.com/network-tap"> Network TAPs</a> for pretty much every network. Even if you have low utilization on your SPAN port, industry best practice is you should use a network TAP as the foundation of your visibility for today and the future. The 5 most popular applications for TAPs we see from customers are:<br><br></span></p> <div class="hs-featured-image-wrapper"> <a href="https://www.garlandtechnology.com/blog/5-reasons-to-tap-your-network" title="" class="hs-featured-image-link"> <img src="https://www.garlandtechnology.com/hubfs/2022/Website/Blog/5%20reasons%20to%20tap%20your%20network.jpg" alt="5 reasons to TAP your network Garland Technology network monitoring" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><span style="font-weight: 400;">Why do I need TAPs? &nbsp;That’s a question I hear a lot from people in the field. &nbsp;Either they aren’t familiar with TAPs, or even if they are, with a low utilization, they may think there isn’t an application that makes sense for them. <br><br></span><span style="font-weight: 400;">We’ll I’m here to tell you that there is an application for<a href="https://www.garlandtechnology.com/network-tap"> Network TAPs</a> for pretty much every network. Even if you have low utilization on your SPAN port, industry best practice is you should use a network TAP as the foundation of your visibility for today and the future. The 5 most popular applications for TAPs we see from customers are:<br><br></span></p> <img src="https://track.hubspot.com/__ptq.gif?a=393566&amp;k=14&amp;r=https%3A%2F%2Fwww.garlandtechnology.com%2Fblog%2F5-reasons-to-tap-your-network&amp;bu=https%253A%252F%252Fwww.garlandtechnology.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Network TAPs TAPs vs SPAN Wed, 12 Oct 2022 14:13:14 GMT jason.drewniak@garlandtechnology.com (Jason Drewniak) https://www.garlandtechnology.com/blog/5-reasons-to-tap-your-network 2022-10-12T14:13:14Z TAP + Aggregation for Gigabit Copper Networks https://www.garlandtechnology.com/blog/tap-aggregation-for-gigabit-copper-networks <div class="hs-featured-image-wrapper"> <a href="https://www.garlandtechnology.com/blog/tap-aggregation-for-gigabit-copper-networks" title="" class="hs-featured-image-link"> <img src="https://www.garlandtechnology.com/hubfs/Stock%20images/it%20engineer%20in%20network%20server%20room%20solving%20problems%20and%20give%20help%20and%20support-1.jpeg" alt="it engineer in network server room solving problems and give help and support-1" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <span></span> <p>While we keep hearing about network migrating to 40G or 100G, it's important to note that many networks still consist of 1 Gigabit copper network links, and will require network traffic visibility. Copper Network Taps are the best way to see traffic going over the network as they will neither affect production traffic nor become a point of failure in the network. <br><br></p> <div class="hs-featured-image-wrapper"> <a href="https://www.garlandtechnology.com/blog/tap-aggregation-for-gigabit-copper-networks" title="" class="hs-featured-image-link"> <img src="https://www.garlandtechnology.com/hubfs/Stock%20images/it%20engineer%20in%20network%20server%20room%20solving%20problems%20and%20give%20help%20and%20support-1.jpeg" alt="it engineer in network server room solving problems and give help and support-1" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <span></span> <p>While we keep hearing about network migrating to 40G or 100G, it's important to note that many networks still consist of 1 Gigabit copper network links, and will require network traffic visibility. Copper Network Taps are the best way to see traffic going over the network as they will neither affect production traffic nor become a point of failure in the network. <br><br></p> <img src="https://track.hubspot.com/__ptq.gif?a=393566&amp;k=14&amp;r=https%3A%2F%2Fwww.garlandtechnology.com%2Fblog%2Ftap-aggregation-for-gigabit-copper-networks&amp;bu=https%253A%252F%252Fwww.garlandtechnology.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Network Design Network Packet Brokers Wed, 21 Sep 2022 18:19:27 GMT jerry.dillard@garlandtechnology.com (Jerry Dillard) https://www.garlandtechnology.com/blog/tap-aggregation-for-gigabit-copper-networks 2022-09-21T18:19:27Z How to Protect Network Integrity with Unidirectional Data Diode TAPs https://www.garlandtechnology.com/blog/how-to-protect-network-integrity-with-unidirectional-data-diode-taps <div class="hs-featured-image-wrapper"> <a href="https://www.garlandtechnology.com/blog/how-to-protect-network-integrity-with-unidirectional-data-diode-taps" title="" class="hs-featured-image-link"> <img src="https://www.garlandtechnology.com/hubfs/shutterstock_231142564-LR.jpg" alt="Data Diode TAPs" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>Today’s <a href="https://www.garlandtechnology.com/it-security-and-visibility-solutions-for-industrial"><span>critical infrastructure</span></a> landscape makes up the fundamental building blocks of the connected world we live in. From the basic communication we enjoy through WiFi, internet and telephones to resources we may take for granted like energy, water, manufacturing, and transportation systems. Even our national security, such as The Department of Defense (DoD) and various Federal agencies, rely on similar operational technology (OT) environments. This critical infrastructure provides constant and reliable resources for our society, and it must be protected at all costs.<br><br></p> <h3><strong>OT is the New Frontier for Cybersecurity Threats</strong></h3> <p>According to Gartner’s <span>OT Security Best Practices</span>, “By 2021, 25% of asset-centric enterprises will adopt a hybrid model to secure operational technology (OT) environments with traditional security deployed alongside specialist OT security technology, up from 10% in 2018.”<br></p> <div class="hs-featured-image-wrapper"> <a href="https://www.garlandtechnology.com/blog/how-to-protect-network-integrity-with-unidirectional-data-diode-taps" title="" class="hs-featured-image-link"> <img src="https://www.garlandtechnology.com/hubfs/shutterstock_231142564-LR.jpg" alt="Data Diode TAPs" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>Today’s <a href="https://www.garlandtechnology.com/it-security-and-visibility-solutions-for-industrial"><span>critical infrastructure</span></a> landscape makes up the fundamental building blocks of the connected world we live in. From the basic communication we enjoy through WiFi, internet and telephones to resources we may take for granted like energy, water, manufacturing, and transportation systems. Even our national security, such as The Department of Defense (DoD) and various Federal agencies, rely on similar operational technology (OT) environments. This critical infrastructure provides constant and reliable resources for our society, and it must be protected at all costs.<br><br></p> <h3><strong>OT is the New Frontier for Cybersecurity Threats</strong></h3> <p>According to Gartner’s <span>OT Security Best Practices</span>, “By 2021, 25% of asset-centric enterprises will adopt a hybrid model to secure operational technology (OT) environments with traditional security deployed alongside specialist OT security technology, up from 10% in 2018.”<br></p> <img src="https://track.hubspot.com/__ptq.gif?a=393566&amp;k=14&amp;r=https%3A%2F%2Fwww.garlandtechnology.com%2Fblog%2Fhow-to-protect-network-integrity-with-unidirectional-data-diode-taps&amp;bu=https%253A%252F%252Fwww.garlandtechnology.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Network Monitoring Industrial OT Wed, 07 Sep 2022 15:32:17 GMT jerry.dillard@garlandtechnology.com (Jerry Dillard) https://www.garlandtechnology.com/blog/how-to-protect-network-integrity-with-unidirectional-data-diode-taps 2022-09-07T15:32:17Z Ensuring Federal Cybersecurity Success with Flexible, Compact Flyaway CyberKit Visibility https://www.garlandtechnology.com/blog/ensuring-federal-cybersecurity-success-with-flexible-compact-flyaway-cyberkit-visibility-1 <div class="hs-featured-image-wrapper"> <a href="https://www.garlandtechnology.com/blog/ensuring-federal-cybersecurity-success-with-flexible-compact-flyaway-cyberkit-visibility-1" title="" class="hs-featured-image-link"> <img src="https://www.garlandtechnology.com/hubfs/Blog-img.jpg" alt="Fly-away Kits (FAK) mobile IT" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p style="background-color: #fafafa;">Recent U.S. Federal <a href="https://www.garlandtechnology.com/blog/u.s.-government-response-to-cybersecurity-threats-expose-need-for-visibility" style="color: #39b54a;"><span>cybersecurity initiatives</span></a> have been put in place to ensure critical infrastructure, whether it's a pipeline, food processor, or water treatment facilities are protected from modern cyber threats and vulnerabilities. The new ‘<a href="https://homeland.house.gov/imo/media/doc/Clarke-Discussion-Draft-082621.pdf" style="color: #39b54a;"><span>Cyber Incident Reporting for Critical Infrastructure Act of 2021</span></a>’ establishes a mandatory cyber incident reporting framework for critical infrastructure companies.<br><br>The Cybersecurity and Infrastructure Security Agency (CISA) is now expanding cybersecurity assessments. Congress is currently considering giving the Agency the ability to fine or even subpoena organizations that they believe have cybersecurity vulnerability in their critical networks.<br></p> <div class="hs-featured-image-wrapper"> <a href="https://www.garlandtechnology.com/blog/ensuring-federal-cybersecurity-success-with-flexible-compact-flyaway-cyberkit-visibility-1" title="" class="hs-featured-image-link"> <img src="https://www.garlandtechnology.com/hubfs/Blog-img.jpg" alt="Fly-away Kits (FAK) mobile IT" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p style="background-color: #fafafa;">Recent U.S. Federal <a href="https://www.garlandtechnology.com/blog/u.s.-government-response-to-cybersecurity-threats-expose-need-for-visibility" style="color: #39b54a;"><span>cybersecurity initiatives</span></a> have been put in place to ensure critical infrastructure, whether it's a pipeline, food processor, or water treatment facilities are protected from modern cyber threats and vulnerabilities. The new ‘<a href="https://homeland.house.gov/imo/media/doc/Clarke-Discussion-Draft-082621.pdf" style="color: #39b54a;"><span>Cyber Incident Reporting for Critical Infrastructure Act of 2021</span></a>’ establishes a mandatory cyber incident reporting framework for critical infrastructure companies.<br><br>The Cybersecurity and Infrastructure Security Agency (CISA) is now expanding cybersecurity assessments. Congress is currently considering giving the Agency the ability to fine or even subpoena organizations that they believe have cybersecurity vulnerability in their critical networks.<br></p> <img src="https://track.hubspot.com/__ptq.gif?a=393566&amp;k=14&amp;r=https%3A%2F%2Fwww.garlandtechnology.com%2Fblog%2Fensuring-federal-cybersecurity-success-with-flexible-compact-flyaway-cyberkit-visibility-1&amp;bu=https%253A%252F%252Fwww.garlandtechnology.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Federal Thu, 25 Aug 2022 12:00:00 GMT chris.bihary@garlandtechnology.com (Chris Bihary) https://www.garlandtechnology.com/blog/ensuring-federal-cybersecurity-success-with-flexible-compact-flyaway-cyberkit-visibility-1 2022-08-25T12:00:00Z 3 Uses of Complete Visibility in OT Environments https://www.garlandtechnology.com/blog/3-uses-of-complete-visibility-in-ot-environments <div class="hs-featured-image-wrapper"> <a href="https://www.garlandtechnology.com/blog/3-uses-of-complete-visibility-in-ot-environments" title="" class="hs-featured-image-link"> <img src="https://www.garlandtechnology.com/hubfs/blog-2.jpg" alt="tap vs span ot" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>In part three of my OT visibility series, we’ll review what next steps OT and ICS organizations are taking once they have a foundation of visibility with a TAP and aggregation fabric. If you haven’t read my <a href="https://www.garlandtechnology.com/blog/3-benefits-of-leveraging-a-tap-fabric-in-industrial-environments">previous posts</a>, I suggest starting there for some background.<br><br>It really is industry best practice to utilize a TAP and aggregation fabric as your access method for network traffic. Once you have the necessary TAPs in place, it becomes easier to start working on improving monitoring, operations, and cybersecurity practices.&nbsp;<br><br></p> <div class="hs-featured-image-wrapper"> <a href="https://www.garlandtechnology.com/blog/3-uses-of-complete-visibility-in-ot-environments" title="" class="hs-featured-image-link"> <img src="https://www.garlandtechnology.com/hubfs/blog-2.jpg" alt="tap vs span ot" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>In part three of my OT visibility series, we’ll review what next steps OT and ICS organizations are taking once they have a foundation of visibility with a TAP and aggregation fabric. If you haven’t read my <a href="https://www.garlandtechnology.com/blog/3-benefits-of-leveraging-a-tap-fabric-in-industrial-environments">previous posts</a>, I suggest starting there for some background.<br><br>It really is industry best practice to utilize a TAP and aggregation fabric as your access method for network traffic. Once you have the necessary TAPs in place, it becomes easier to start working on improving monitoring, operations, and cybersecurity practices.&nbsp;<br><br></p> <img src="https://track.hubspot.com/__ptq.gif?a=393566&amp;k=14&amp;r=https%3A%2F%2Fwww.garlandtechnology.com%2Fblog%2F3-uses-of-complete-visibility-in-ot-environments&amp;bu=https%253A%252F%252Fwww.garlandtechnology.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Network TAPs Network Infrastructure Industrial OT Thu, 11 Aug 2022 12:00:00 GMT neil.wilkins@garlandtechnology.com (Neil Wilkins) https://www.garlandtechnology.com/blog/3-uses-of-complete-visibility-in-ot-environments 2022-08-11T12:00:00Z Life saving benefits of using a Network TAP https://www.garlandtechnology.com/blog/life-saving-benefits-of-using-a-network-tap <div class="hs-featured-image-wrapper"> <a href="https://www.garlandtechnology.com/blog/life-saving-benefits-of-using-a-network-tap" title="" class="hs-featured-image-link"> <img src="https://www.garlandtechnology.com/hubfs/2022/Video/Blog/Case%20Study.00_00_04_10.Still004.jpg" alt="Garland Technology Network TAPs" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>At RSAC 2022, Garland Technology had the privilege of working inside the ICS Village booth in the Sandbox. It was a great opportunity to teach RSAC attendees about industrial control systems and OT networks. For example, Garland’s Systems Engineer Todd Cain used an interactive exhibit of an electric utility to highlight the benefit of full visibility into the equipment in the network. Power line technicians can stay safe by viewing packet-level data to understand the truth and avoid serious injury. Check out the below video for a demo from RSAC.</p> <div class="hs-featured-image-wrapper"> <a href="https://www.garlandtechnology.com/blog/life-saving-benefits-of-using-a-network-tap" title="" class="hs-featured-image-link"> <img src="https://www.garlandtechnology.com/hubfs/2022/Video/Blog/Case%20Study.00_00_04_10.Still004.jpg" alt="Garland Technology Network TAPs" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>At RSAC 2022, Garland Technology had the privilege of working inside the ICS Village booth in the Sandbox. It was a great opportunity to teach RSAC attendees about industrial control systems and OT networks. For example, Garland’s Systems Engineer Todd Cain used an interactive exhibit of an electric utility to highlight the benefit of full visibility into the equipment in the network. Power line technicians can stay safe by viewing packet-level data to understand the truth and avoid serious injury. Check out the below video for a demo from RSAC.</p> <img src="https://track.hubspot.com/__ptq.gif?a=393566&amp;k=14&amp;r=https%3A%2F%2Fwww.garlandtechnology.com%2Fblog%2Flife-saving-benefits-of-using-a-network-tap&amp;bu=https%253A%252F%252Fwww.garlandtechnology.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Network TAPs Industrial OT Thu, 28 Jul 2022 12:00:00 GMT todd.cain@garlandtechnology.com (Todd Cain) https://www.garlandtechnology.com/blog/life-saving-benefits-of-using-a-network-tap 2022-07-28T12:00:00Z How to Improve Telco VoIP Troubleshooting – What every Field Engineer should know https://www.garlandtechnology.com/blog/how-to-improve-telco-voip-troubleshooting-what-every-field-engineer-should-know <div class="hs-featured-image-wrapper"> <a href="https://www.garlandtechnology.com/blog/how-to-improve-telco-voip-troubleshooting-what-every-field-engineer-should-know" title="" class="hs-featured-image-link"> <img src="https://www.garlandtechnology.com/hubfs/Current/Blogs/blog-images/telecommunication-technician.jpg" alt="telecommunication technician field tap" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>I spent many years as a technical support engineer for a Telecommunications company that did voice and data services in third-tier markets. We would be called in to troubleshoot any <a href="https://www.garlandtechnology.com/monitoring-solutions"><span>performance issues</span></a> with the equipment.<br><br>Our customers were small and medium-sized businesses in small towns scattered around the east coast, like insurance and doctor offices. Typically, their IT set-up consisted of a home router and our modem and VoIP phones. Some of the businesses would manage the data side of their networks but outsource their IT for firewalls and routers. Most of these companies were running on a shoestring budget and relied on our support for their success.<br><br></p> <div class="hs-featured-image-wrapper"> <a href="https://www.garlandtechnology.com/blog/how-to-improve-telco-voip-troubleshooting-what-every-field-engineer-should-know" title="" class="hs-featured-image-link"> <img src="https://www.garlandtechnology.com/hubfs/Current/Blogs/blog-images/telecommunication-technician.jpg" alt="telecommunication technician field tap" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>I spent many years as a technical support engineer for a Telecommunications company that did voice and data services in third-tier markets. We would be called in to troubleshoot any <a href="https://www.garlandtechnology.com/monitoring-solutions"><span>performance issues</span></a> with the equipment.<br><br>Our customers were small and medium-sized businesses in small towns scattered around the east coast, like insurance and doctor offices. Typically, their IT set-up consisted of a home router and our modem and VoIP phones. Some of the businesses would manage the data side of their networks but outsource their IT for firewalls and routers. Most of these companies were running on a shoestring budget and relied on our support for their success.<br><br></p> <img src="https://track.hubspot.com/__ptq.gif?a=393566&amp;k=14&amp;r=https%3A%2F%2Fwww.garlandtechnology.com%2Fblog%2Fhow-to-improve-telco-voip-troubleshooting-what-every-field-engineer-should-know&amp;bu=https%253A%252F%252Fwww.garlandtechnology.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Network TAPs Network Monitoring Wireshark Troubleshooting Wed, 13 Jul 2022 20:38:32 GMT https://www.garlandtechnology.com/blog/how-to-improve-telco-voip-troubleshooting-what-every-field-engineer-should-know 2022-07-13T20:38:32Z Michael Walker Network Packet Brokers Explained https://www.garlandtechnology.com/blog/network-packet-brokers-explained <div class="hs-featured-image-wrapper"> <a href="https://www.garlandtechnology.com/blog/network-packet-brokers-explained" title="" class="hs-featured-image-link"> <img src="https://www.garlandtechnology.com/hubfs/Current/Blogs/blog-images/1920x1080-NPB%20blog.png" alt="Network Packet Broker" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>We all know traffic across the data center is increasing. The migration towards 100G ethernet is well underway, with <span style="color: #45a142;"><a href="https://www.cablinginstall.com/home/article/16468591/migration-from-40g-to-100g" style="color: #45a142;">28% of data centers</a></span> undergoing the upgrade as of 2018. Meanwhile, <span style="color: #45a142;"><a href="https://www.datacenterdynamics.com/en/opinions/rise-400g-changing-data-center-landscape/" style="color: #45a142;">400G ethernet</a></span> is available and creeping towards widespread adoption. With more and more data passing through data centers, operators need granular information about what form the data may take. Network Packet Brokers (NPBs) are designed to make it easier for administrators and their tools to analyze this traffic, allowing for smoother and more functional data center operations.<br><br></p> <div class="hs-featured-image-wrapper"> <a href="https://www.garlandtechnology.com/blog/network-packet-brokers-explained" title="" class="hs-featured-image-link"> <img src="https://www.garlandtechnology.com/hubfs/Current/Blogs/blog-images/1920x1080-NPB%20blog.png" alt="Network Packet Broker" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>We all know traffic across the data center is increasing. The migration towards 100G ethernet is well underway, with <span style="color: #45a142;"><a href="https://www.cablinginstall.com/home/article/16468591/migration-from-40g-to-100g" style="color: #45a142;">28% of data centers</a></span> undergoing the upgrade as of 2018. Meanwhile, <span style="color: #45a142;"><a href="https://www.datacenterdynamics.com/en/opinions/rise-400g-changing-data-center-landscape/" style="color: #45a142;">400G ethernet</a></span> is available and creeping towards widespread adoption. With more and more data passing through data centers, operators need granular information about what form the data may take. Network Packet Brokers (NPBs) are designed to make it easier for administrators and their tools to analyze this traffic, allowing for smoother and more functional data center operations.<br><br></p> <img src="https://track.hubspot.com/__ptq.gif?a=393566&amp;k=14&amp;r=https%3A%2F%2Fwww.garlandtechnology.com%2Fblog%2Fnetwork-packet-brokers-explained&amp;bu=https%253A%252F%252Fwww.garlandtechnology.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Network Packet Brokers Wed, 29 Jun 2022 20:54:23 GMT https://www.garlandtechnology.com/blog/network-packet-brokers-explained 2022-06-29T20:54:23Z Ross Green