TAP Into Technology Blog: Inline Security (6)
How to Monitor Encrypted Traffic and Keep Your Network Secure
It wasn’t too long ago that IT security teams were talking about achieving 20% encrypted traffic. But encryption efforts are quickly gaining traction. Mozilla research found the average volume of encrypted web traffic finally surpassed the...
[Demo] Protecting the Core with High Speed Load Balancing
I recently presented a demonstration for Palo Alto Network's Fuel User Group on the importance of implementing high speed (10G/40G/100G) load balance at the Core of the Network. Prior to beginning the demo, we surveyed the group and asked,...
[Infographic] What Security Tools are you Deploying in your Network?
What tools are you deploying in your network? Are you securing your network with tools such as DDoS, NGFWs, Secure Sockets Layer or Data Loss Prevention? There’s a TAP for that.
[Demo] How to Deploy Your Palo Alto NGFW in Vwire Mode
Palo Alto Networks Next Generation Firewall has a flexible deployment, meaning different methods of deployment will work. Our partner, Cloud Harmonics recently authored a blog for us on this topic. In this demonstration video we dig a...
Is There A Difference? Bypass Switch vs. Bypass TAP
I love talking with engineers and CISOs and listening to how they describe situations, devices and challenges within networking. The IT world loves acronyms, tech terms and jargon, but what surprises me is that manufacturers, resellers,...
Are You Adding to Your Security Stack? Then Learn Chaining at the Edge
Back in the early days of the 90's, before cybercrime really took off, no one really anticipated a need for a network to run more than two security appliances at the same time. That was then. Here and now, cyber-threats are extremely...