TAP Into Technology Blog: Network Monitoring (20)
IDS vs. IPS: It’s More Than a Character Difference
In modern cybersecurity, there are two major types of devices for protecting the edge: intrusion detection systems (IDS) and intrusion prevention systems (IPS). An IPS sits in-line, in a network, and touches on each packet to and from the...
Beyond the Firewall: Smarter Network Security for the “Smart Grid”
Network-enabled sensors and devices, part of the Internet of Things (IoT), can be a boon to industrial operations. They help Supervisory Control and Data Acquisition (SCADA) systems automate processes and collect data such as humidity,...
Garland Unveils New 1G Modular Packet Broker System
On April 28th, Garland Technology revealed its new 1G Modular Packet Broker System, in either a 1U or 2U Chassis. This is Garland's first 1G chassis system capable of intelligent port-to-port data filtering and aggregation between TAPs,...
Is Your Bypass Showing?
I’ve titled this one “Your Bypass Is Showing,” because you just can’t make this stuff up. As we conduct analysis on major problems we look for the ordinary first, always with the thought in the back of your mind, "have we seen this one...
Anonymous Targets Trump, Renewing Attention To Greater Network Visibility
Over the last twelve months, the sprawling hacktivist collective known as Anonymous has marshalled its resources against ISIS, the Klu Klux Klan, and now Donald Trump. Although these campaigns appear to position the group as a crusader in...
[Webinar] Find Your Network Blind Spots Sponsored by Palo Alto's Fuel User Group
At last year’s Ignite Conference and the 6 Spark User Summits we attended, we were surprised to find just how many network professionals are still relying on SPAN ports. Even though SPAN ports seemed to serve network architects well in the...