The days when firewalls alone could defend corporate networks are long gone. Today, security architects are realizing that the most productive way to protect enterprise networks is to deploy active, in-line security appliances at the edge...
Back in the early days of the 90's, before cybercrime really took off, no one really anticipated a need for a network to run more than two security appliances at the same time. That was then. Here and now, cyber-threats are extremely...
It's hard to remember that the commercial firewall, as we know it today, has only been around since 1994. This was the first firewall that could monitor every layer of the OSI stack—a formidable obstacle to hackers. With more and more...
Even if you’ve already realized the inferiority of SPAN ports and started moving to network TAPs, you still have to make sure your network design is set up for visibility into every bit, byte and packet® of traffic. However, the increasing...
Industries such as finance and retail are accustomed to dealing with the common challenges of remote site management. However, while virtual network computing (VNC) has made IT systems administration easier from a desktop interface,...
On April 28th, Garland Technology revealed its new 1G Modular Packet Broker System, in either a 1U or 2U Chassis. This is Garland's first 1G chassis system capable of intelligent port-to-port data filtering and aggregation between TAPs,...