Visibility Solutions

Garland Technology is committed to educating the benefits of having a strong foundation of network visibility and access. By providing this insight we protect the security of data across your network and beyond.


Garland Technology's resource library offers free use of white papers, eBooks, use cases, infographics, data sheets, video demos and more.


The TAP into Technology blog provides the latest news and insights on network access and visibility, including: network security, network monitoring and appliance connectivity and guest blogs from Industry experts and technology partners


Our extensive technology partnership ecosystem solves critical problems when it comes to network security, monitoring, application analysis, forensics and packet inspection.


Garland Technology is dedicated to high standards in quality and reliability, while delivering the greatest economical solutions for enterprise, service providers, and government agencies worldwide.


Whether you are ready to make a network TAP your foundation of visibility or just have questions, please contact us. Ask us about the Garland Difference!

Blogheader image

TAP Into Technology

Leading the Way in Network Technology

Building A Zero Trust Visibility Architecture

on 5/21/20 8:00 AM By | Harry Berridge | 0 Comments | Network Security Network Visibility/Monitoring Federal
In response to rapidly evolving cybersecurity threats, Zero Trust, a concept that emerged over 15 years ago, is now a strategic priority for government network agencies. Following reports from the Defense Innovation Board (DIB) and the American Council for Technology - Industry Advisory Council, the federal government is now putting Zero Trust at the forefront of its increased cybersecurity spending. What is Zero Trust (ZT) exactly? The concept is a departure from perimeter-based cybersecurity as the focus shifts toward individual access and away from protecting wide segments of the network. By narrowing the scope of network defenses, and increasing protection for resources as they span across an increasingly distributed network. Sounds easy enough, right? While there are many facets of implementing a Zero Trust strategy, this blog will review a few main architecture concepts, including ZT Network Requirements, ZT Framework, and ZT Visibility fabric.
Read More

How to Provide Visibility to the DoD’s Zero Trust Cloud Security Initiative

on 4/23/20 8:00 AM By | Harry Berridge | 0 Comments | Cloud Solutions Federal
As the United States Department of Defense (DoD) undertakes the largest cloud migration in history, beginning with Microsoft’s winning bid for the Joint Enterprise Defense Infrastructure project, data security in the cloud is of paramount importance for this project. Aggressive cyber threats that aim to undermine the US Military’s efforts to keep America and its allies safe, become even more alarming with the DoD network moving to the cloud. 
Read More

Become a JEDI Master with Cloud Packet Visibility

on 12/3/19 8:00 AM By | Harry Berridge | 0 Comments | Cloud Solutions Federal
Have you noticed the word “Jedi” frequently pops up in news headlines lately? Star Wars fans around the world impatiently wonder how the famous conflict between the Jedi and the Sith will conclude when “Star Wars: Rise of Skywalker” hits theaters in December. In a battle closer to Earth, Microsoft triumphed over Amazon to win the 10-year, $10B JEDI contract from the United States Department of Defense (DoD). Amazon challenged the Pentagon’s JEDI decision faster than the Millennium Falcon’s alleged twelve parsecs timeframe makes the Kessel Run. Agree too many Star Wars references, do you? Hmmm?
Read More

Making a Case for Network TAPs to Provide Digital Legal Evidence

Sometimes we come across interesting requests from customers that are outside the normal security and monitoring applications within data centers or branch office locations. Recently, a law enforcement agency reached out to Garland Technology with a question as to whether our Network TAPs could assist them in obtaining sound digital evidence for a trial. This is a great example of lawful intercept, a scenario when a government law enforcement agency is granted legal means to obtain communications network data pursuant to lawful authority for the purpose of analysis or evidence. It’s a similar concept to the examples you see in movies or television shows where the FBI gets a warrant to tap the phone line of someone under a federal investigation, except in this instance, we’re tapping the network data. 
Read More

The Importance of Network TAPs when Packet Capture is Mission Critical

on 5/30/19 8:00 AM By | Harry Berridge | 0 Comments | Network TAPs TAPs vs SPAN Federal
The decision to use Network TAPs instead of relying on SPAN (mirror) ports can be the simplest, yet most important decision that must be answered for any network monitoring or security project. Case in point. The US Military knows the value Network TAPs provide, and that when it comes down to ensuring the effectiveness of a mission, TAPs are a must.
Read More

Ensuring Full Data Capture in Harsh Environments

on 9/13/18 8:00 AM By | Harry Berridge | 0 Comments | Network TAPs Network Visibility/Monitoring Federal
Network visibility is the foundation of all network activities.  Network visibility becomes even more important in mission-critical situations, however when these situations move outside the lab, it can be more challenging to ensure that visibility and collect all the traffic of interest.   A leading infrastructure contract for the Department of Defense (DoD) came to Garland Technology because they were looking for a way to effectively collect and analyze data related to communications, battlefield tactical deployments, and situational awareness.
Read More

Sign up for blog updates