TAP Into Technology Blog: TAPs vs SPAN (5)
Network TAPs for Critical Infrastructure
Securing critical infrastructure such as Smart Grid and industrial control systems continues to be an ongoing challenge for IT Managers and Security Architects. State based agents, terrorists and organized crime are increasing their...
Are my Packets Lying? 4 Things to Look for in Packet Traces
Packets don’t lie – well, most of the time. They tell the truth unless they have been captured incorrectly. In those cases, packets can tell bold-faced lies. When digging through trace files, we can come upon symptoms in the packets that...
Network TAP vs SPAN Port: Putting Them to the Test
For years now we all have read about the difference between data capture off a span/mirror port and a network TAP. Packet Pioneer, Chris Greer was interested to see the difference between a data stream captured on a network TAP versus a...
2016's Winner Best of Blog - Born in the USA, Tech Talk, SPAN vs TAP and more
Thank you networking community! You voted and we are pleased to announce the top 'Tap into Technology ' blog posts of 2016. Below are the top 3 posts from 2016. Thank you for being a part of the Garland community and we look forward to the...
Court Approved and Can't Be Hacked: The Network TAP
How trusted does your data have to be? In today's world of data breaches and hacks, it is best to be capturing 100% of your data. In the court of law, dropped packets equal unsubmittable evidence. Learn what makes network TAPs approved for...
Follow the History and Added Function of the Network TAP
The two most common methods to access network data are via a Network TAP or from a SPAN port. How much do you know about Network TAPs? If you don't use them, maybe you think it's just another failure point or there may be a forwarding...