TAP Into Technology | Blog

Historical Lookback - The Proof is in the Packet

Posted by Chris Bihary on 6/22/17 8:00 AM

"It's the Unicorn we've been looking for!"

This was the response I got the other day when I was explaining to a customer the benefits of looking back at packets before and after they pass through an active, inline device and a packet capture or forensics tool.

Simply put, how else will enterprise networks have real-time knowledge of an attempted attack, as well as the ability to look back and see how the packets were altered or dropped?

Historical lookback aka before & after, is solution that uses hybrid bypass TAPs with monitoring ports that allow both security tools, such as next-gen firewalls and intrusion prevention systems to share packets with multiple monitoring tools such as network packet capture, forensics, deep packet inspection, etc.

Read More

Topics: Network Security, Network Visibility/Monitoring

When Did Phishing Become a Social Problem?

Posted by Chris Bihary on 6/6/17 8:00 AM

In the world of technology, social media is starting to become king. Just think about this for a minute, 15 years ago, there was no Twitter, Facebook, Instagram or Snapchat.

Now, it seems every American is on one or all of these devices. Social media has become such a fabric in our culture that there isn’t a time when you don’t see someone walking with their head down looking at their phones.

Learn how social engineering is the new gold mine.

Read More

Topics: Network Security, Hacks and Data Breaches

[Get the Data You Want] How Education Can Avoid Being the Next Soft Hacking Target

Posted by Darrick Kristich on 6/1/17 8:00 AM

It’s hard to believe it’s been two years since we experienced the year of the healthcare hack. But now that attention has shifted to that industry, hackers are doing their best to identify the next soft target.

Over the last year or two, attacks against the education sector have been on the rise. The problem is that there are a few unique challenges that make cyber security difficult for institutions from K-12 all the way through higher education.

Whether you’re worried about ransomware threats or advanced data breaches, it’s time to reinforce your security and compliance efforts with the help of an MSSP.

Read More

Topics: Network Security, Hacks and Data Breaches

Executive Order in Place to Boost Cybersecurity

Posted by Chris Bihary on 5/30/17 8:00 AM

If we have learned anything from the massive cyber hack, entitled WannaCry, that hit 150 countries recently, there needs to be more measures taken to upgrade the defense against those that are trying to extort countries for money, or cripple the world through cyber warfare.

President Donald Trump heard the request loud and clear and recently signed an executive order (EO) to beef up the cyber defense in the United States - to help continue the fight against cyber hacking.

Read More

Topics: Network Security

[Demo] Protecting the Core with High Speed Load Balancing

Posted by Mike Heiberger on 5/25/17 8:00 AM

I recently presented a demonstration for Palo Alto Network's Fuel User Group on the importance of implementing high speed (10G/40G/100G) load balance at the Core of the Network.

Prior to beginning the demo, we surveyed the group and asked, "What speeds are you running at the core of your network today?" The majority of the group is running at 10G, which is what I hear from our customers as well.

So while 40G and 100G are exciting to discuss, we are going to keep this demo for a 10G network circuit. 

Watch and see how simple load balancing can be at the network core.

Read More

Topics: Network Security, In Band Security Appliances, Technology Partners, Palo Alto Networks, Network Packet Brokers

Traveling this Summer? Don't Let Your Data Get Checked Out

Posted by Tim O'Neill on 5/23/17 8:00 AM

You probably really never think too much about it. You are on a trip and check into your hotel. After you get settled, you want to check your Facebook, email, Instagram and Twitter accounts. So, you will do what you have been doing every other time you check into a hotel, you click on the wifi that is given you to.

But, have you really ever thought about the information you are giving out over the web?


Read More

Topics: Network Security, Hacks and Data Breaches