TAP Into Technology Blog: Network Monitoring
How to Improve Telco VoIP Troubleshooting – What every Field Engineer should know
I spent many years as a technical support engineer for a Telecommunications company that did voice and data services in third-tier markets. We would be called in to troubleshoot any performance issues with the equipment. Our customers were...
Part 1 – Passive Inspection of TLS 1.3 Within The Enterprise
This blog is the first in a series that looks at a NIST project “Addressing Visibility Challenges with TLS 1.3 within the Enterprise.” The home page for the project is here:...
3 Key Considerations When Building an Effective Cyber Fly-away Kit (FAK)
For professionals operating in cybersecurity or IT within the Department of Defense, cyber Fly-away Kits (FAKs) are mission-critical tools. When responding to remote deployments or securing on-the-ground environments, a well-equipped FAK...
Heartbeat Packets: Safeguarding Inline Appliances
Summary Discover the cutting-edge world of heartbeat packets, the soft detection technology that keeps inline security appliances in top shape. This blog post plunges into the significance of heartbeat packets, how they enhance proactive...
The Beacon of Cybersecurity Enlightenment: Illuminate Threats with Vigilant Vision
Summary Embark on a transformative journey through the cyber realm with Garland Technology's visibility solutions. Discover how Network TAPs, Network Packet Brokers, and Inline Bypass empower your security operations with insights,...
The Hidden Vulnerabilities: Unveiling the Enigma of Zero-Day Exploits
Summary In the intricate web of cybersecurity, lurking beneath the surface are zero-day exploits – enigmatic vulnerabilities that strike unexpectedly. Dive into this comprehensive blog post to unravel the mysteries of these digital...