TAP Into Technology Blog: Network Monitoring (19)
Ransomware, a Billion Dollar World Wide Threat
Every day I hear that a company has solved the network and file security war with a new security widget. Yet every day there are more announcements of breaches, stolen identities, etc. According to the Identity Theft Resource Center (ITRC)...
Sustaining Full Duplex Line Rate Capture to Disk on 100G Connections
Guest blog by Andrew Watters, Raellic CEO/Director Advances in hardware in recent years have made it possible for anyone with a reasonable level of experience to build a device that captures all traffic on gigabit-level networks without...
Utilizing Garland’s TAPs in Flow-Based Network Traffic Monitoring
by Pavel Minarik, CTO of Flowmon Networks In this technology-driven world, computer networks serve as the nervous system, ensuring delivery of business critical applications and services. This is why IT professionals need to know what is...
Sharkfest 2016 – Feeding Wireshark Every Bit, Byte and Packet®
Insights from a first-timer by Randy Clark. Garland Technology and our CEO/Co-Founder Chris Bihary have been attending and presenting at Sharkfest since its inception in 2008, this was my first dive into Sharkfest and the Wireshark...
Wireshark – From Ethereal to Today
The story about Wireshark is entwined with the story of Gerald Combs, the inventor, founder and heart behind Wireshark. It was always Gerald’s dream to build an open source, world class network analyzer, which is now the number one...
IDS vs. IPS: It’s More Than a Character Difference
In modern cybersecurity, there are two major types of devices for protecting the edge: intrusion detection systems (IDS) and intrusion prevention systems (IPS). An IPS sits in-line, in a network, and touches on each packet to and from the...