TAP Into Technology Blog
Leading the Way in Network Technology
How to Improve Telco VoIP Troubleshooting – What every Field Engineer should know
I spent many years as a technical support engineer for a Telecommunications company that did voice and data services in third-tier markets. We would be called in to troubleshoot any performance issues with the equipment. Our customers were...
Why Do Inline Security Tools Rely on External Bypass TAPs?
As the modern cybersecurity stack grows with an array of threat detection and response tools critical to protecting IT data, active blocking tools like Intrusion prevention systems (IPS), Web Application Firewalls (WAF), and next...
Supporting the SOC Visibility Triad with Network TAPs
To put it bluntly, organizational IT and security teams have never been in a more difficult position than they are today. The non-stop need for businesses to adopt any-and-all devices has significantly expanded the size of enterprise...
The 101 Series: Passive Network TAPs
Companies that are using network monitoring tools, either for analyzing security threats, packet flow or Key Performance Indicators (KPIs) – all have one thing in common. They need to ensure that those applications have access to 100% of...
The Deployment Defender: Ensuring Network Uptime with Bypass TAPs
Summary In this comprehensive blog post, we explore the critical role of bypass TAPs in inline security deployments. By providing a fail-safe mechanism, bypass TAPs protect networks from costly downtime during maintenance or upgrades of...
Part 1 – Passive Inspection of TLS 1.3 Within The Enterprise
This blog is the first in a series that looks at a NIST project “Addressing Visibility Challenges with TLS 1.3 within the Enterprise.” The home page for the project is here:...