Garland Technology ensures complete packet visibility by delivering a full platform of network TAP (test access point), inline bypass and packet broker products.
Garland Technology is committed to educating the benefits of having a strong foundation of network visibility and access. By providing this insight we protect the security of data across your network and beyond.
Garland Technology's resource library offers free use of white papers, eBooks, use cases, infographics, data sheets, video demos and more.
The TAP into Technology blog provides the latest news and insights on network access and visibility, including: network security, network monitoring and appliance connectivity and guest blogs from Industry experts and technology partners
Our extensive technology partnership ecosystem solves critical problems when it comes to network security, monitoring, application analysis, forensics and packet inspection.
Garland Technology is dedicated to high standards in quality and reliability, while delivering the greatest economical solutions for enterprise, service providers, and government agencies worldwide.
Whether you are ready to make a network TAP your foundation of visibility or just have questions, please contact us. Ask us about the Garland Difference!
Can you believe that we’re coming up on the two-year anniversary of the massive 2013 Target data breach? It may not feel that way because we’re still seeing news articles pop up regarding the aftermath of the incident, but it’s true. Comparing Target’s stock price before the breach ($62) and two years after it ($82), it might be tempting to think that the company is breezing through the effects of the one of the most publicized corporate cybersecurity disasters of the decade. However, it’s been a long road to recovery for Target and it’s not over yet. What can we learn from two years of Target’s data breach recovery?
The Target data breach has gained notoriety mostly because of the complete PR disaster it created for Target right around the holiday season. Famous security blogger Brian Krebs broke the breach news back in December 2013, revealing that Target had been hiding news from vulnerable customers. The breach was shrouded in mystery for some time before Target got its PR affairs in order and there has still been some confusion even two years later.
The results of a confidential investigation by Verizon into Target’s cyber security situation days after the breach were recently revealed, uncovering many of the data breach mysteries. In hindsight, here’s what happened when Target was attacked:
After two years, Target has finally settled its lawsuit with Visa and is working on settling with MasterCard—they are moving on and have become somewhat of a leader in cyber security. Target has bounced back from a brutal data breach that was only partially covered by cyber insurance and there are multiple things to learn from their recovery:
Target has spent a fortune updating their PoS registers and bolstering their cyber defenses—even going so far as to create a top-of-the-line cyber fusion center. If there’s one thing to learn from the Target breach, it’s that preparation is key. Preparation requires you to provide your security appliances with 100% network visibility, knowing your baseline traffic and being able to continuously spot deviations from the norm.
The only way to ensure 100% network visibility is to implement network TAPs when connecting security appliances. Learn from Target’s 2013 mistakes—invest in the right security appliances and enable them to see the traffic necessary to protect your network.
Chris Bihary, CEO and Co-founder of Garland Technology, has been in the network performance industry for over 20 years. Bihary has established collaborative partnerships with technology companies to complement product performance and security through the integration of network TAP visibility.