Have you noticed the word “Jedi” frequently pops up in news headlines lately? Star Wars fans around the world impatiently wonder how the famous conflict between the Jedi and the Sith will conclude when “Star Wars: Rise of Skywalker” hits...
Sometimes we come across interesting requests from customers that are outside the normal security and monitoring applications within data centers or branch office locations. Recently, a law enforcement agency reached out to Garland...
The decision to use Network TAPs instead of relying on SPAN (mirror) ports can be the simplest, yet most important decision that must be answered for any network monitoring or security project. Case in point. The US Military knows the...
On August 6th, 2012, at midnight on the east coast, the Curiosity rover landed in the Gale Crater on the surface of Mars. For the next two years, Curiosity would be at the forefront of the human scientific endeavor. The strides made across...
Network visibility is the foundation of all network activities. Network visibility becomes even more important in mission-critical situations, however when these situations move outside the lab, it can be more challenging to ensure that...