Blogheader image.png

TAP Into Technology

Leading the Way in Network Technology

What role does Link Failure Propagation play in the network?

on 8/16/18 8:00 AM By | Jonathan Devoy | 0 Comments | Network TAPs In Band Security Appliances
When building a network, uptime and reliability are a major focus in the design of the network. To meet these reliability needs, redundant appliances and links are often put in place to provide high availability for the network. Network visibility is still important in redundant networks and a Network TAP will provide the best source of visibility. If your network consists of gigabit copper links, then it is important to ensure your TAP supports the redundant environment with Link Failure Propagation.
Read More

The 6 Levels Of Thwarting Network Security Issues

No matter what type of organization you have, you always run the risk of a network security issue. There are internal risks, of course, and every business has connections to outside vendors that introduce your network to the unknown.
Read More

TAP One Link to Add Resiliency to Your Cisco Deployment

As part of the Cisco Solution Partner Program, Garland Technology helps provide visibility and access for Cisco security and performance monitoring solutions. The partnership provides value to companies deploying Cisco products including the ASA/Firepower NGFWs.
Read More

Design-IT Solutions: Remote Management for Inline Devices

on 5/22/18 8:00 AM By | Jonathan Devoy | 0 Comments | DesignIT Network Security In Band Security Appliances
Networks are becoming more and more distributed. We’re starting to see more customers deploying security tools at their remote locations, such as bank branches and retail outlets, or as managed services to clients.
Read More

How to Monitor Encrypted Traffic and Keep Your Network Secure

It wasn’t too long ago that the security community was talking about achieving 20% encrypted traffic. But encryption efforts are quickly gaining traction. In January 2017, Mozilla research found the average volume of encrypted web traffic finally surpassed the volume of unencrypted traffic. To the general public, this shift is proof of a transition to safer, more private internet experiences. However, the security community knows that encrypted traffic has other implications for corporate data protection.
Read More

[Demo] Protecting the Core with High Speed Load Balancing

I recently presented a demonstration for Palo Alto Network's Fuel User Group on the importance of implementing high speed (10G/40G/100G) load balance at the Core of the Network. Prior to beginning the demo, we surveyed the group and asked, "What speeds are you running at the core of your network today?" The majority of the group is running at 10G, which is what I hear from our customers as well. So while 40G and 100G are exciting to discuss, we are going to keep this demo for a 10G network circuit.  Watch and see how simple load balancing can be at the network core.
Read More