Visibility Solutions

Garland Technology is committed to educating the benefits of having a strong foundation of network visibility and access. By providing this insight we protect the security of data across your network and beyond.

Resources

Garland Technology's resource library offers free use of white papers, eBooks, use cases, infographics, data sheets, video demos and more.

Blog

The TAP into Technology blog provides the latest news and insights on network access and visibility, including: network security, network monitoring and appliance connectivity and guest blogs from Industry experts and technology partners

Partners

Our extensive technology partnership ecosystem solves critical problems when it comes to network security, monitoring, application analysis, forensics and packet inspection.

Company

Garland Technology is dedicated to high standards in quality and reliability, while delivering the greatest economical solutions for enterprise, service providers, and government agencies worldwide.

Contact

Whether you are ready to make a network TAP your foundation of visibility or just have questions, please contact us. Ask us about the Garland Difference!

Network resiliency and availability without downtime

Inline Bypass Solutions

Deploying and Managing Your Inline Appliance

Inline IPS Failure

When architecting inline security tools into your network, incorporating network bypass technology is a fundamental best practice to avoid costly network downtime. Simply put, a Bypass TAP, also referred to as a 'bypass switch', provides the ability to manage the availability of your inline tool any time without having to take down the network or impact business availability for maintenance or upgrades.

In the tense moments of unplanned downtime, a bypass TAP provides expedited problem resolution in the event of a tool failure, with the flexibility to bypass the tool and keep the network up, or failover to a High Availability (HA) solution.

Managing the Risks of Downtime
As inline security devices sit either between network segments or at a network edge, managing the risk of a downtime is a critical consideration when deploying security devices. Security teams commonly face:

•  Oversubscribed devices can degrade network performance
• Device failures can bring down the network 

Downtime Impacts more than the Network
• Lost revenue
• Loss of customers and trust in the company, reputational damage

Why Use An External Bypass TAP?

Inline-topology19-4LR copy

The Bypass TAP was developed specifically to resolve the problem of an inline tool causing a single point of failure (SPOF) in the network. In the event an inline device becomes unavailable, it is bypassed and traffic is automatically forwarded around the failed tool.

“Research found that extensive use of external bypass devices is a best practice.”
-EMA [Enterprise Management Associates]

Appliances may have internal bypass capability, but adding this feature is known to be costly and still lacks key functionality associated with Bypass TAPs, including:

•  Administrative isolation - No maintenance windows 
• Operational isolation - Expedited problem resolution of unplanned downtime without impacting network connectivity 
• Tool Sandbox - Pilot or deploy new tools 
• Deployment efficiency - Extend the reach of the same tools into multiple network segments
• Network resilience - Flexibility to bypass the tool and keep the network up, or to failover to a High Availability [HA] solution

Heartbeat Packets Monitor the Tools Health

Heartbeat packets, a soft detection technology, are configured to monitor the health of inline appliances. Instead of relying on the direct connectivity of the network to the tool, the bypass TAP is purpose-built, designed specifically to pass heartbeat packets back and forth to detect an issue with the connected appliance. A heartbeat packet is added by the Bypass TAP to the data, and both are sent out to the input port of the inline device. The inline device performs its task and then sends the data back into the TAP with the heartbeat. The Bypass TAP strips the heartbeat from the data, which is sent out of the TAP and back into the live network.

Heartbeats are never sent into the live network. If the heartbeat sent from the TAP is not received back, indicating the device is offline for some reason, the TAP will automatically bypass the device, keeping the network up even though the device is offline. No network downtime. No single point of failure.

Inline Lifecycle Management

Sandbox

Utilizing an external Bypass TAP, and not relying on bypass functionality within your inline tool, offers the unique ability to implement inline lifecycle management. From sandboxing a new tool deployment to easily taking tools out-of-band for updates, installing patches, performing maintenance or troubleshooting to optimize and validate before pushing back inline, a Bypass TAP has quickly become the essential compliment to any inline tool.

Sandboxing or piloting new tools in your real environment with live packet data, without impacting the availability of the network, provides the ability to evaluate and optimize the tool out-of-band, before deploying it live in your network. The tool being tested is exposed to the same type of data it would be monitoring for a production deployment, rather than test data, increasing the confidence of the piloting being performed.

Bypass

Bypass Best Practices

Bypass TAPs solve many issues. Let's explore bypass use cases to see why:

Bypass functionality is essential to preventing inline security devices from causing network performance degradations and downtime. Many appliances have internal bypass capability, but external bypass devices are considered more reliable and offer more features.

1920x1080-HeroFeature-Financial1

Case Study

Financial Services
Simplify security stack, while providing threat prevention optimization and analysis

Learn More
1920x1080-Hero-IndustrialScada

Case Study

SCADA Inline Bypass
Providing visibility to your Industrial virtualization and inline environment

Learn More
1920x1080-HeroFeature-Financial2

Case Study

Financial Banking 
Ensuring complete High Availability (HA) redundancy and availability for critical links

Learn More

"Knowing the loss of time and money was unacceptable, I designed the network bypass TAP. This solution continuously checked the health of the device and ensured the integrity of traffic flows regardless of their condition."

Jerry Dillard
Garland Technology, CTO - Developed the first bypass technology

Bypass Resources

3 Keys to Network Resiliency

3 Keys To Network Resiliency

The ability to update, repair, and replace security appliances without bringing down the network for a maintenance window, and reduce the risks of unplanned downtime, are the next step for network resilience.

Download Now

IT Security

IT Security

Today’s security strategies incorporate both inline and out-of-band solutions, of active blocking and monitoring tools. This whitepaper will review how these tools are being used and what industry best practices and use cases may help improve your next deployment.

Download Now

TAP into Technology

Leading the way in Network Technology

Firewall Primer: Best Practices for Avoiding Downtime

| September 17, 2020

Firewalls are the most recognized security tool for safeguarding your network and are a critical component of any security infrastructure. Firewalls..

Read More

7 Threat Hunting Best Practices to Keep Your Network Secure

| September 3, 2020

Threat hunting is one of the few IT terms I've come across that probably sounds cool to people who aren't engineers.  But cyber threat hunting is..

Read More

Why Cybersecurity Relies on Redundancy to Ensure Network Availability

| August 20, 2020

Today, 50% of large enterprises are spending over $1 million annually on cybersecurity.1 The worldwide information security market is forecast to..

Read More