Garland Technology ensures complete packet visibility by delivering a full platform of network TAP (test access point), inline bypass and packet broker products.
Garland Technology is committed to educating the benefits of having a strong foundation of network visibility and access. By providing this insight we protect the security of data across your network and beyond.
Garland Technology's resource library offers free use of white papers, eBooks, use cases, infographics, data sheets, video demos and more.
The TAP into Technology blog provides the latest news and insights on network access and visibility, including: network security, network monitoring and appliance connectivity and guest blogs from Industry experts and technology partners
Our extensive technology partnership ecosystem solves critical problems when it comes to network security, monitoring, application analysis, forensics and packet inspection.
Garland Technology is dedicated to high standards in quality and reliability, while delivering the greatest economical solutions for enterprise, service providers, and government agencies worldwide.
Whether you are ready to make a network TAP your foundation of visibility or just have questions, please contact us. Ask us about the Garland Difference!
In our new infographic, The Evolution of Network Visibility we took a trip down melody lane to show readers the events and innovations that sparked the rise of network visibility.
Relax and rewind to some 1970s and 80s classic rock and to a simpler time in networking and let’s remember the pivotal events, like Watergate that set the TAP story in motion.
When plumbers were sent to put wiretaps on the phones at the Democratic National Convention, the nation learned something—that their phone conversations could be monitored by a third party. Richard Nixon resigned in the wake of Watergate and people began associating taps with malicious activity.
Luckily, we’re here to set the story straight!
TAPs are neither good nor evil. TAPs (on phones or on networks) do one simple thing—they provide a copy of the data.
In the 1970s, hacking was limited to “American punks who toyed with the nation’s telephone system.” These “phreakers” used high-pitched whistles to confuse telecom frequencies and gain access to long-distance switch systems. Network TAPs and the idea of visibility weren’t even on the horizon yet—but it’s important to understand how the Watergate scandal educated the public on tapping the wire.
The 1980s, when bands like AC/DC and Van Halen really took off and network connectivity was all about the live wire. Computers were becoming a mainstay in the business world and people began to buy personal computers for their homes as well.
The live wire is the physical connection between computers that enables them to communicate on a LAN network. No one knew what network visibility was; but in hindsight, hackers made it clear that a visibility plan would soon be essential.
As Van Halen “jumped” in the 1980s, so did hackers. People started hacking into any computer system they could find. But when the US government’s “internet”—the ARPAnet—was attacked in 1988, people started to invent security solutions and visibility talks were set to begin in the 1990s.
In our Evolution of Network Visibility infographic, we cover the chain of events that have led us to the current state of network visibility. Just as the favorite rock bands of the decades have emerged and evolved, so too have network TAPs and security appliances.
Rock on and discover how each decade came to grips with the growing need for network visibility.
Tweet and tell us where your visibility story began #NetworkFlashback. View Garland Technology's free infographic, The Evolution of Visibility Through the Ages.
Chris Bihary, CEO and Co-founder of Garland Technology, has been in the network performance industry for over 20 years. Bihary has established collaborative partnerships with technology companies to complement product performance and security through the integration of network TAP visibility.