Blogheader image.png

TAP Into Technology

Leading the Way in Network Technology

Optimize your Network Design for Intrusion Detection Systems

on 10/25/18 8:00 AM By | Chris Bihary | 0 Comments | Network Design In Band Security Appliances
With today’s heightened threat levels, many companies are shoring up their defenses and adding an intrusion detection system (IDS) to their security stacks. By constantly monitoring network and system activities for malicious activity or policy violations, IDS applications can alert security administrators to breaches that may otherwise go undetected. Knowing that an IDS is only is good as the information it receives, how do you physically connect the IDS to the network to ensure that it receives 100% of the traffic?
Read More

What role does Link Failure Propagation play in the network?

on 8/16/18 8:00 AM By | Jonathan Devoy | 0 Comments | Network TAPs In Band Security Appliances
When building a network, uptime and reliability are a major focus in the design of the network. To meet these reliability needs, redundant appliances and links are often put in place to provide high availability for the network. Network visibility is still important in redundant networks and a Network TAP will provide the best source of visibility. If your network consists of gigabit copper links, then it is important to ensure your TAP supports the redundant environment with Link Failure Propagation.
Read More

The 6 Levels Of Thwarting Network Security Issues

No matter what type of organization you have, you always run the risk of a network security issue. There are internal risks, of course, and every business has connections to outside vendors that introduce your network to the unknown.
Read More

TAP One Link to Add Resiliency to Your Cisco Deployment

As part of the Cisco Solution Partner Program, Garland Technology helps provide visibility and access for Cisco security and performance monitoring solutions. The partnership provides value to companies deploying Cisco products including the ASA/Firepower NGFWs.
Read More

Design-IT Solutions: Remote Management for Inline Devices

on 5/22/18 8:00 AM By | Jonathan Devoy | 0 Comments | DesignIT Network Security In Band Security Appliances
Networks are becoming more and more distributed. We’re starting to see more customers deploying security tools at their remote locations, such as bank branches and retail outlets, or as managed services to clients.
Read More

How to Monitor Encrypted Traffic and Keep Your Network Secure

It wasn’t too long ago that the security community was talking about achieving 20% encrypted traffic. But encryption efforts are quickly gaining traction. In January 2017, Mozilla research found the average volume of encrypted web traffic finally surpassed the volume of unencrypted traffic. To the general public, this shift is proof of a transition to safer, more private internet experiences. However, the security community knows that encrypted traffic has other implications for corporate data protection.
Read More