TAP Into Technology Blog: Network Infrastructure (2)
The Deployment Defender: Ensuring Network Uptime with Bypass TAPs
Summary In this comprehensive blog post, we explore the critical role of bypass TAPs in inline security deployments. By providing a fail-safe mechanism, bypass TAPs protect networks from costly downtime during maintenance or upgrades of...
Passive vs. Active Monitoring: Insights on OT Visibility Solutions from the Experts
Summary In a recent roundtable discussion hosted by ICS Village, various industry experts, including Garland Technology's very own CEO Chris Bihary, sat on a panel to discuss passive and active monitoring, their functional differences, how...
Increase Zero Trust Effectiveness by Simplifying Your Security Stack
The US government is rapidly transitioning to Zero Trust security architecture. This includes new guidance, reference architectures, and mandates from the administration and CISA for agencies to develop and meet the five “specific zero...
Choosing the Right Pluggables and Cables for Your IT or OT Network
Pluggables and cables in IT and OT networks. They’re a necessity. You wouldn’t drive an automobile without windshield wipers. You can’t fish for large mouth bass without a good monofilament line in that fishing pole. Selecting the right...
Supporting the SOC Visibility Triad with Network TAPs
To put it bluntly, organizational IT and security teams have never been in a more difficult position than they are today. The non-stop need for businesses to adopt any-and-all devices has significantly expanded the size of enterprise...
Combining the Power of the Purdue Model with Network TAPs
Years back, companies within our critical infrastructure sectors realized that if they wanted to improve their strategic planning and scale their operation, they needed to remove silos between their production and business operations. This...