Network Visibility Products
Garland Technology ensures complete packet visibility by delivering a full platform of network TAP (test access point), inline bypass and packet broker products.
Visibility Solutions
Garland Technology is committed to educating the benefits of having a strong foundation of network visibility and access. By providing this insight we protect the security of data across your network and beyond.
Resources
Garland Technology's resource library offers free use of white papers, eBooks, use cases, infographics, data sheets, video demos and more.
Blog
The TAP into Technology blog provides the latest news and insights on network access and visibility, including: network security, network monitoring and appliance connectivity and guest blogs from Industry experts and technology partners
Partners
Our extensive technology partnership ecosystem solves critical problems when it comes to network security, monitoring, application analysis, forensics and packet inspection.
Company
Garland Technology is dedicated to high standards in quality and reliability, while delivering the greatest economical solutions for enterprise, service providers, and government agencies worldwide.
Contact
Whether you are ready to make a network TAP your foundation of visibility or just have questions, please contact us. Ask us about the Garland Difference!
Tapping to the Music—Looking Back at the 1990s

In our new infographic, The Evolution of Network Visibility, we took a trip down melody lane to show readers the events and innovations that sparked the rise of network visibility.
Relax and rewind to some 1990s alternative rock and to the days when the cyber threat landscape emerged, beginning to shape the network visibility narrative.
The Internet as We Know It Emerged in the 1990s
By 1995, interconnected service providers were routing Internet traffic and the technology we now can’t live without was born. But even as companies like Amazon and Google emerged, hackers grew bolder and more threatening. In 1998, a group of hackers named L0pht was questioned by Congress and they testified that they could shut down the Internet in just 30 minutes—a horrific proposal.
As Pearl Jam contemplated their own coming Undone, it was clear that the Internet needed a better means of network security and visibility to avoid being pushed into everyone’s Rearviewmirror.
Firewalls and the New Focus on Network Connectivity
The 1990s was the era of the early firewall. Protecting networks at the edge made the most sense. If you could build an impenetrable castle and put a secure gate at the point of entry, you could do business in relative safety. Using SPAN ports for connectivity, visibility into the network at this phase helped fight cyber threats by protecting LANS.
While SPAN ports can provide network visibility, troubleshooting and maintenance meant the network had to come down because appliances were placed in the live wire. Also, any spike in traffic causes SPAN ports to drop packets and render firewalls useless. SPAN ports weren’t going to cut it for evolving visibility needs.
It didn’t seem like anything would be able to heal the Scar Tissue damaged by emerging cyber criminals, but hackers “couldn’t stop” the rise of network bypass TAPs as the leading option for network visibility and security appliance connectivity
The Evolution of Network Visibility Infographic—Tapping to the Music
In our Evolution of Network Visibility infographic, we cover the chain of events that have led us to the current state of network visibility. Just as the favorite rock bands of the decades have emerged and evolved, so too have network TAPs and security appliances.
Rock on and discover how each decade came to grips with the growing need for network visibility.
Tweet and tell us where your visibility story began #NetworkFlashback.
Written by Chris Bihary
Chris Bihary, CEO and Co-founder of Garland Technology, has been in the network performance industry for over 20 years. Bihary has established collaborative partnerships with technology companies to complement product performance and security through the integration of network TAP visibility.
Authors
Topics
- IT Security (200)
- Network TAPs (139)
- Network Monitoring (133)
- Hacks and Breaches (87)
- Network Management (81)
- Network Design (73)
- Industrial OT (71)
- Technology Partners (63)
- Network Infrastructure (59)
- Inline Security (49)
- TAPs vs SPAN (47)
- Network Packet Brokers (41)
- Data Center (37)
- Cloud Solutions (33)
- Software Defined Networking (SDN) (24)
- Events & News (20)
- The 101 Series (19)
- Federal (17)
- Cisco Solutions (16)
- Wireshark (14)
- DesignIT (13)
- Healthcare (11)
- MSP/MSSP (9)
- Palo Alto Networks (8)
- Finance (7)
- Troubleshooting (5)