Visibility Solutions

Garland Technology is committed to educating the benefits of having a strong foundation of network visibility and access. By providing this insight we protect the security of data across your network and beyond.


Garland Technology's resource library offers free use of white papers, eBooks, use cases, infographics, data sheets, video demos and more.


The TAP into Technology blog provides the latest news and insights on network access and visibility, including: network security, network monitoring and appliance connectivity and guest blogs from Industry experts and technology partners


Our extensive technology partnership ecosystem solves critical problems when it comes to network security, monitoring, application analysis, forensics and packet inspection.


Garland Technology is dedicated to high standards in quality and reliability, while delivering the greatest economical solutions for enterprise, service providers, and government agencies worldwide.


Whether you are ready to make a network TAP your foundation of visibility or just have questions, please contact us. Ask us about the Garland Difference!


Providing network resiliency without downtime. Guaranteed.

IT Security Solutions   Inline Bypass

The Role of Network Bypass Technology 

Deploying and Managing Your Inline Appliance

When architecting your inline security tools into your network, incorporating bypass technology is a fundamental best practice to avoid costly network downtime. Simply put, a Bypass TAP, also referred to as a 'bypass switch', provides the ability to manage your inline tool any time without having to take down the network or impact business availability for maintenance or upgrades.

In the tense moments of unplanned downtime, bypass provides expedited problem resolution in the event of a tool failure, with the flexibility to bypass the tool and keep the network up, failover to a redundant link or an HA solution.

Why Use an External Bypass TAP?


The Bypass TAP was developed specifically to resolve the problem of an inline security tool causing a single point of failure (SPOF) in the network. In the event an inline device becomes unavailable, it is bypassed and traffic is automatically forwarded around the failed tool, keeping the link up. Implementing an external bypass as part of your security strategy will:

  • Reduce network impact or downtime
  • Remove points of failure in your network
  • Provide complete visibility for inline security tools (IPS, WAF)
  • Sandbox or migrate tools from passive out-of-band to active inline

Remove Points of Failure With an External Bypass TAP

Inline-topology19-4LR copy



The Role of Heartbeat Packets to Monitor Tool Health

Heartbeat packets, a soft detection technology, are configured to monitor the health of inline appliances. Instead of relying on the direct connectivity of the network to the tool, the bypass TAP is purpose-built, designed specifically to pass heartbeat packets back and forth to detect an issue with the connected appliance. A heartbeat packet is added by the Bypass TAP to the data, and both are sent out to the input port of the inline device. The inline device performs its task and then sends the data back into the TAP with the heartbeat. The Bypass TAP strips the heartbeat from the data, which is sent out of the TAP and back into the live network. Heartbeats are never sent into the live network. If the heartbeat sent from the TAP is not received back, indicating the device is offline for some reason, the TAP will automatically bypass the device, keeping the network up even though the device is offline. No network downtime. No single point of failure.



Inline Lifecycle Management


Inline lifecycle management
Utilizing an external Bypass TAP, and not relying on bypass functionality within your inline tool, offers the unique ability to implement inline lifecycle management. From sandboxing a new tool deployment to easily taking tools out-of-band for updates, installing patches, performing maintenance or troubleshooting to optimize and validate before pushing back inline, a Bypass TAP has quickly become the essential compliment to any inline tool.

Sandboxing or piloting new tools in your real environment with live packet data, without impacting the availability of the network, provides the ability to evaluate and optimize the tool out-of-band, before deploying it live in your network. The tool being tested is exposed to the same type of data it would be monitoring for a production deployment, rather than test data, increasing the confidence of the piloting being performed.


Want more info?

3 Keys to Network Resiliency

A Security Engineer's Go-to-Guide to Avoiding Network Downtime

Learn how to increase your network resiliency by expediting troubleshooting and shortening your maintenance windows. This whitepaper from Garland Technology will explore why bypass technology is a critical part of inline security design, how does failsafe technology prevent a single point of failure, and why setting up a redundant bypass architecture improves the usefulness of connected appliances.  

Learn More

Network Resiliency

Inline Security Appliances

Bypass Technology works hand-in-hand with your inline security appliances, to ensure that they do not create a single point of failure in your network. 
Next-Generation Firewall
Intrusion Prevention System
Distributed Denial of Service Appliances
Intrusion Detection System
Web Application Firewall
Security Information & Event Management

TAP into Technology | Inline Security Appliances

Leading the way in Network Technology
Adapting to New Security Demands at the Edge

Adapting to New Security Demands at the Edge

In Part 1 of this “Master the Edge of the Network” series, we talked about the key networking factors you have to consider managing the edge of the network to gain these edge computing benefits. But

How Historical Look-back is Revolutionizing Network Forensics and Inline Deployment

How Historical Look-back is Revolutionizing Network Forensics and Inline Deployment

As you can imagine, cyberattacks are now increasing year over year from a combination of cybercriminals, hackers, malicious insiders, unwitting insiders, nation-state attackers and hacktivists. Their

The 101 Series: Out-of-Band vs Inline Network Security

The 101 Series: Out-of-Band vs Inline Network Security

Designing a modern security strategy is no easy feat, as it must protect all components of a complex network, while having a limited effect on performance. As expected, we get a lot of questions