TAP Into Technology Blog: IT Security (8)
Building A Zero Trust Visibility Architecture
In response to rapidly evolving cybersecurity threats, Zero Trust, a concept that emerged over 15 years ago, is now a strategic priority for government network agencies. Following reports from the Defense Innovation Board (DIB) and the...
How an MDR Service Provider Selects the Best Visibility Vendors
As more organizations use managed detection and response (MDR) services, Garland Technology decided to find out how an MDR Service Provider selects the best vendors to partner with. Sherri Lloyd, Strategic Partner Manager at Garland...
How to Troubleshoot the Network Part 2: Solving Network Forensics Problems
Part 1 in this two-part series on how to troubleshoot the network focused on the most common challenges you’ll face—connectivity, performance, and latency troubleshooting scenarios. And in a perfect world, these would be the most difficult...
Building a Modern Observability Stack with Garland, Corelight, and Humio
From Packets to Logs to Dashboards Beginning with packets In its most basic form, data travels across the internet in packets — each carrying a maximum of 1,500 bytes — until they reach a pre-determined destination. As packets arrive, the...
What is SSL and TLS and How it Works in Today’s Security
As today’s enterprises deploy more software to the cloud, while integrating software-as-a-service (SaaS) applications into their critical business infrastructure, the need for security and monitoring is obvious. With this need, SSL/TLS...
Monitoring Business Critical Application in the Cloud with Garland Prisms and Flowmon
When you’re driving on a foggy day, how can you stay safe when you can’t even see the road in front of you? Blind spots in the car are similar to blind spots within your cloud-based data center if not properly monitored. Securing your...