TAP Into Technology Blog: Network Management (4)
Don’t let snags unravel IT network deployments
Maximizing the merriment in December requires Santa-like scheduling superpowers. There are friends and family to visit, gifts to buy, cookies to bake, and Hallmark movies to binge. Likely, there’s also a holiday sweater to dig out and dust...
3 Benefits of a TAP Fabric in OT Networks
Every week, I hear from industrial companies about their cybersecurity tools needing access to the data flowing through their OT networks. In a previous post, I shared why companies are constantly looking to improve their OT network...
Upgrade Cabling without Blowing the Budget
It never fails. You’re in a hurry, running late. You’re driving too fast when, suddenly, a speed bump. What was designed for safety has now created fury, as your not-so-decaf coffee instantly repaints the car’s interior an unflattering...
Why Do Inline Security Tools Rely on External Bypass TAPs?
As the modern cybersecurity stack grows with an array of threat detection and response tools critical to protecting IT data, active blocking tools like Intrusion prevention systems (IPS), Web Application Firewalls (WAF), and next...
Firewalls vs. Data Diode — Why OT Security Teams Turn to Data Diode TAPs
Air gaps and segmentation are common concepts to secure OT networks, with the goal of minimizing the harm of a breach and threats by isolating it to a limited part of the network. Unless an attacker obtains physical access to an air-gapped...
Why OT Security Relies on Threat Detection and Response
As the names imply, operational technology (OT) and information technology (IT) have different origins. OT exists to manage operations – specifically, physical operations in various sectors of industry that have benefited from automation...