TAP Into Technology Blog: Network Management (4)
“Not another installation setback”
As my daughter approaches her 3rd birthday, we've loosened up the rules on watching cartoons. Now, we all look forward to Saturday morning cartoons … and pancakes. Personally, I haven’t watched cartoons in 30 years. Surprisingly, it seems...
Fewer Surprises Make Better Deployments
I remember it clearly. Christmas 1982. I was 6 years old. I wanted only one gift from my parents that year: Masters of the Universe Castle Grayskull As the big day grew closer, I knew exactly what was in that large box under the tree. I...
Don’t let snags unravel IT network deployments
Maximizing the merriment in December requires Santa-like scheduling superpowers. There are friends and family to visit, gifts to buy, cookies to bake, and Hallmark movies to binge. Likely, there’s also a holiday sweater to dig out and dust...
Why Do Inline Security Tools Rely on External Bypass TAPs?
As the modern cybersecurity stack grows with an array of threat detection and response tools critical to protecting IT data, active blocking tools like Intrusion prevention systems (IPS), Web Application Firewalls (WAF), and next...
Firewalls vs. Data Diode — Why OT Security Teams Turn to Data Diode TAPs
Air gaps and segmentation are common concepts to secure OT networks, with the goal of minimizing the harm of a breach and threats by isolating it to a limited part of the network. Unless an attacker obtains physical access to an air-gapped...
Why OT Security Relies on Threat Detection and Response
As the names imply, operational technology (OT) and information technology (IT) have different origins. OT exists to manage operations – specifically, physical operations in various sectors of industry that have benefited from automation...