Visibility Solutions

Garland Technology is committed to educating the benefits of having a strong foundation of network visibility and access. By providing this insight we protect the security of data across your network and beyond.

Resources

Garland Technology's resource library offers free use of white papers, eBooks, use cases, infographics, data sheets, video demos and more.

Blog

The TAP into Technology blog provides the latest news and insights on network access and visibility, including: network security, network monitoring and appliance connectivity and guest blogs from Industry experts and technology partners

Partners

Our extensive technology partnership ecosystem solves critical problems when it comes to network security, monitoring, application analysis, forensics and packet inspection.

Company

Garland Technology is dedicated to high standards in quality and reliability, while delivering the greatest economical solutions for enterprise, service providers, and government agencies worldwide.

Contact

Whether you are ready to make a network TAP your foundation of visibility or just have questions, please contact us. Ask us about the Garland Difference!

Blogheader image

TAP Into Technology

Leading the Way in Network Technology

TAP THE NETWORK, TAP A KEG

Posted by John Matthews | 4/16/20 8:00 AM

In today's IT environments, everything is interconnected, and here at ExtraHop, we believe that the best source for visibility into how those interconnected tools are functioning as a whole, is the network. We believe this—not because the network is the first thing everyone blames when there's a problem, even though it is—but because it's the single common denominator for every digital interaction. No matter what tools—third-party or otherwise—are being used in your environment, they all traverse the network at some point. Anytime you, as a user, interact with technology, it has to traverse the network.

That's why I'm fond of saying "If you can TAP a Network, you can TAP a keg."

The concept here is that if I can get some sort of an overview of how things are working in concert to deliver a service or capability, I can understand how it's truly performing. So, if you have good network TAPs in place and you have solid technologies observing all that traffic traversing the network, you have an understanding of how things are operating in your environment that is unparalleled. And maybe, if everything goes as planned, you have the freedom to relax and grab a beer.

When we speak in terms of network TAPs, the Garland Technology and ExtraHop Reveal(x) integration grants network visibility with an end-to-end infrastructure that helps you see into your network blind spots. When you deploy a Garland network TAP, you will get full live wire packet capture, securing the data at the physical layer. By integrating with Garland’s reliable network TAPs, Reveal(x) provides real-time application visibility, monitoring, and analysis for real-time threat detection and intelligent response. Think of your network TAP like a tap on a keg, allowing beer to flow into the glass for the customer—just like your network TAP allows data to flow into Reveal(x). 

The App Changed…And Everything Else Followed

I've been around long enough to remember when interconnection in IT environments was not the norm. The big shift was with the iPhone and the surge in applications. As more and more services and media were delivered across these devices, it changed the nature of what an application is. It used to just be applications, now the app is the transport, the storage, the server functionality, the front-end application piece, and even possibly the OS of the device you're viewing it from. All of those impact the performance and the usability of whatever technology it is you're trying to use. That merging of disparate technologies to deliver that user experience is where this current inflection point has been created for IT.

>> Download Now: Network TAPs 101 [Free eBook]


I distinctly remember troubleshooting a problem—and this was years ago—where customers were reporting application problems. The first step was to speak with the application folks. From their perspective, the app is working just fine. Next, we ask the network folks—because, as I said earlier, everybody blames the network. Of course, the network is running fine. We then turn to the server folks—because the application that users are complaining about is running on their servers. Everything looks fine on their end as well. It took us a long time to realize that the application was sourcing data that was stored on a storage array. That storage array is running fine overall, but the areas where data for the application is needed are not.

The way I frame it is that the application is all of those things working in concert. If any one of those things is not working properly, you will only see it with the specific tools used to look at that specific technology stack. Also, if it's performing poorly, you won't be able to trap it very easily.

Problems, D.O.A.

There are a lot of tools out there in the market that let you know how your web server is functioning, but they are pretty old-school solutions. I call them "old-school" because they approach IT the way we did 15 years ago. Solutions that span the entire scope of the network—i.e. Reveal(x)—set you up with a far superior perspective for viewing what's going on inside your environment and for discovering dependencies you didn't realize were there, enabling you to analyze results faster and make better decisions.

Our marketing team at Extrahop dubbed our three-tiered solution approach "Discover. Observe. Analyze." As I like to joke, the acronym for this is D.O.A.—more commonly known as "Dead On Arrival". And with ExtraHop, that's exactly what IT problems are—dead on arrival. We can isolate and resolve problems so much faster than was traditionally possible. 

When Extrahop and Garland Technology work together, IT leaders can make faster, better-informed decisions that improve performance, security, and digital experience. Now, I'm not going to say that tapping the network ushers in a golden age of leisure for IT. But it certainly makes what we do as IT professionals a heck of a lot easier, and maybe—just maybe—we'll have time to step away and have a beer.

Network TAPS 101 Basics for IT Security engineers

Topics: Network Visibility/Monitoring, Technology Partners

Written by John Matthews

John Matthews is the Chief Information Officer at ExtraHop Networks, where he oversees the continuous expansion of the ExtraHop IT environment and counsels the company's enterprise customers as they evolve their IT operations. Before joining ExtraHop, John led IT strategy at F5 Networks, where he was CIO for nearly a decade. While at F5, John provided strategic technology and management assessments, as well as a common-sense approach to IT operations that provided the best capabilities to the business with the least risk. John guided F5 to the early adoption of new technologies, such as SaaS and cloud computing, to drive costs down while raising overall quality. Previously, John served as an IT leader for MSN Operations at Microsoft, as CIO at Towne Exploration Company, and as Director of IT Operations at Adobe.

Sign up for blog updates