TAP Into Technology Blog: Network Management (9)
[Demo] Deploying an Active, In-line Security Tool
In our recent Fuel User Group Webinar, Protecting the Core, we gave a demonstration on the ease of deployment and benefits of using a bypass network TAP with an active, inline device. With a click of a mouse, you can very simply bypass the...
Filtering + Aggregation = Never Oversubscribe Again
For network IT managers that send data to monitoring tools, the concern about oversubscribed ports is a continual battle. You can’t always predict your network traffic, and as you probably know - problems arise at the worst times possible....
The 101 Series: Bypass Network TAPs Keepers of the Critical Link
There are some great network tools on the market that provide protection for your organization's operations on the Internet. The problem with using them is that they can do the unthinkable by introducing a potential “point of failure” when...
The Buffering Bluff on Aggregation TAPs
In a world of shrinking IT budgets, many are turning to network aggregating TAPs to reduce costs within their security and network monitoring programs. Because aggregating TAPs integrate multiple traffic flows into a single stream, IT can...
Inside Splunk, a New SIEM Solution for MSSPs
Splunk. The name is not very descriptive, but if you drop it in front of IT professional, they’ll know what you mean. This cloud-based platform for operational intelligence is a new and sophisticated big data tool, which gives even novice...
From Selling Solutions to Managing Security—Becoming a MSSP
We’ve discussed choosing the right managed security service provider (MSSP) in the past. However, understanding the inherent value of shifting to a hybrid approach to security with an MSSP is only half the battle. The reality is that the...