TAP Into Technology Blog: Inline Security (5)
Optimize your Network Design for Intrusion Detection Systems
With today’s heightened threat levels, many companies are shoring up their defenses and adding an intrusion detection system (IDS) to their security stacks. By constantly monitoring network and system activities for malicious activity or...
What role does Link Failure Propagation play in the network?
When building a network, uptime and reliability are a major focus in the design of the network. To meet these reliability needs, redundant appliances and links are often put in place to provide high availability for the network. Network...
The 6 Levels Of Thwarting Network Security Issues
No matter what type of organization you have, you always run the risk of a network security issue. There are internal risks, of course, and every business has connections to outside vendors that introduce your network to the unknown. Any...
TAP One Link to Add Resiliency to Your Cisco Deployment
As part of the Cisco Solution Partner Program, Garland Technology helps provide visibility and access for Cisco security and performance monitoring solutions. The partnership provides value to companies deploying Cisco products including...
Design-IT Solutions: Remote Management for Inline Devices
Networks are becoming more and more distributed. We’re starting to see more customers deploying security tools at their remote locations, such as bank branches and retail outlets, or as managed services to clients.
How to Monitor Encrypted Traffic and Keep Your Network Secure
It wasn’t too long ago that IT security teams were talking about achieving 20% encrypted traffic. But encryption efforts are quickly gaining traction. Mozilla research found the average volume of encrypted web traffic finally surpassed the...