TAP Into Technology | Blog

[Demo] Protecting the Core with High Speed Load Balancing

Posted by Mike Heiberger on 5/25/17 8:00 AM

I recently presented a demonstration for Palo Alto Network's Fuel User Group on the importance of implementing high speed (10G/40G/100G) load balance at the Core of the Network.

Prior to beginning the demo, we surveyed the group and asked, "What speeds are you running at the core of your network today?" The majority of the group is running at 10G, which is what I hear from our customers as well.

So while 40G and 100G are exciting to discuss, we are going to keep this demo for a 10G network circuit. 

Watch and see how simple load balancing can be at the network core.

Read More

Topics: Network Security, In Band Security Appliances, Technology Partners, Palo Alto Networks, Network Packet Brokers

[Infographic] What Security Tools are you Deploying in your Network?

Posted by Chris Bihary on 4/18/17 8:00 AM

What tools are you deploying in your network? Are you securing your network with tools such as DDoS, NGFWs, Secure Sockets Layer or Data Loss Prevention?

There’s a TAP for that.


Read More

Topics: Network TAPs, In Band Security Appliances

[Demo] How to Deploy Your Palo Alto NGFW in Vwire Mode

Posted by Mike Heiberger on 1/12/17 8:00 AM

Palo Alto Networks Next Generation Firewall has a flexible deployment, meaning different methods of deployment will work. Our partner, Cloud Harmonics recently authored a blog for us on this topic.

In this demonstration video we dig a little deeper and show you how to deploy your NGFW in Vwire mode, which allows it to be active, in-line, while still invisible to the network. 

Watch now...

Read More

Topics: Network TAPs, In Band Security Appliances, Palo Alto Networks

Is There A Difference? Bypass Switch vs. Bypass TAP

Posted by Randy Clark on 9/7/16 8:00 AM

I love talking with people and listening to what they say and how they say it. The IT world loves acronyms, tech terms and jargon, but what surprises me is that manufacturer’s, resellers, technology partners and end users all define terms a little differently.

For example, let’s dig into the difference between a Bypass Switch - and a Bypass TAP.

Read More

Topics: Network TAPs, Network Security, In Band Security Appliances

Director of National Intelligence Cautions Presidential Candidates on Cyber Attacks

Posted by Tim O'Neill on 7/18/16 8:30 AM

As if presidential candidates didn’t have enough on their plates defending themselves against their opponent’s attack ads, James Clapper has warned that they should expect to deal with cyberattacks. 

The Director recently went on record saying that intelligence agencies “have already seen an indication” of threats and “as the campaigns intensify, we will probably have more of them.”

These predicted cyberattacks for the 2016 president election are now a network security fact. Besides the recent attacks of the DNC and Anonymous doxing attack on Donald Trump, who and what motives are behind this recent announcement?

Read More

Topics: Network Security, Hacks and Data Breaches, In Band Security Appliances

Four Roadblocks to Deploying a Full Stack of In-Line Security Appliances

Posted by Chris Bihary on 7/12/16 8:00 AM

It's hard to remember that the commercial firewall, as we know it today, has only been around since 1994. This was the first firewall that could monitor every layer of the OSI stack—a formidable obstacle to hackers.

With more and more network traffic moving towards the edge, as with cloud-based services and ever-expanding in-house app platforms, administrators must be prepared to introduce additional in-line devices to their security operations centers. Today, networks are shouldering far more traffic than the application firewall was first thought up.

Read More

Topics: Network Security, In Band Security Appliances, Network Packet Brokers