TAP Into Technology Blog: Network Monitoring (4)
Monitor and Maintaining Your Zero Trust Environment
Cybercrime on local and state governments is continuing to rise, as cybercriminals understand the government possesses lots of data and information that are vital and highly classified. The risks to these federal IT systems are increasing,...
Debugging and Troubleshooting Performance Issues with the FieldTAP
With the launch of Garland Technology’s new FieldTAP, one of the perks I can boast about is getting to test and use new technology. Especially working remotely, I was excited to have such a versatile TAP to add to my gear. With the new...
SCADA Security Starts with Network Visibility
Supervisory control and data acquisition systems (SCADA), or industrial control systems (ICS), have been monitoring and controlling our industrial, power and refinery world since the 1960s. SCADA started out analog, focused on monitoring...
Building A Zero Trust Visibility Architecture
In response to rapidly evolving cybersecurity threats, Zero Trust, a concept that emerged over 15 years ago, is now a strategic priority for government network agencies. Following reports from the Defense Innovation Board (DIB) and the...
How to Troubleshoot the Network Part 2: Solving Network Forensics Problems
Part 1 in this two-part series on how to troubleshoot the network focused on the most common challenges you’ll face—connectivity, performance, and latency troubleshooting scenarios. And in a perfect world, these would be the most difficult...
TAP THE NETWORK, TAP A KEG
In today's IT environments, everything is interconnected, and here at ExtraHop, we believe that the best source for visibility into how those interconnected tools are functioning as a whole, is the network. We believe this—not because the...