Visibility Solutions

Garland Technology is committed to educating the benefits of having a strong foundation of network visibility and access. By providing this insight we protect the security of data across your network and beyond.

Resources

Garland Technology's resource library offers free use of white papers, eBooks, use cases, infographics, data sheets, video demos and more.

Blog

The TAP into Technology blog provides the latest news and insights on network access and visibility, including: network security, network monitoring and appliance connectivity and guest blogs from Industry experts and technology partners

Partners

Our extensive technology partnership ecosystem solves critical problems when it comes to network security, monitoring, application analysis, forensics and packet inspection.

Company

Garland Technology is dedicated to high standards in quality and reliability, while delivering the greatest economical solutions for enterprise, service providers, and government agencies worldwide.

Contact

Whether you are ready to make a network TAP your foundation of visibility or just have questions, please contact us. Ask us about the Garland Difference!

Bypass

Providing network resiliency without downtime. Guaranteed.

Contact Us

The Role of Network Bypass Technology 

Deploying and Managing Your Inline Appliance

When architecting your inline security tools into your network, incorporating bypass technology is a fundamental best practice to avoid costly network downtime. Simply put, a Bypass TAP, also referred to as a 'bypass switch', provides the ability to manage your inline tool any time without having to take down the network or impact business availability for maintenance or upgrades.

In the tense moments of unplanned downtime, bypass provides expedited problem resolution in the event of a tool failure, with the flexibility to bypass the tool and keep the network up, failover to a redundant link or an HA solution.


Why Use an External Bypass TAP?

Inline-topology19-1LR-X

The Bypass TAP was developed specifically to resolve the problem of an inline security tool causing a single point of failure (SPOF) in the network. In the event an inline device becomes unavailable, it is bypassed and traffic is automatically forwarded around the failed tool, keeping the link up. Implementing an external bypass as part of your security strategy will:

  • Reduce network impact or downtime
  • Remove points of failure in your network
  • Provide complete visibility for inline security tools (IPS, WAF)
  • Sandbox or migrate tools from passive out-of-band to active inline

Remove Points of Failure With an External Bypass TAP

Inline-topology19-4LR copy

 

 



The Role of Heartbeat Packets to Monitor Tool Health

Heartbeat packets, a soft detection technology, are configured to monitor the health of inline appliances. Instead of relying on the direct connectivity of the network to the tool, the bypass TAP is purpose-built, designed specifically to pass heartbeat packets back and forth to detect an issue with the connected appliance. A heartbeat packet is added by the Bypass TAP to the data, and both are sent out to the input port of the inline device. The inline device performs its task and then sends the data back into the TAP with the heartbeat. The Bypass TAP strips the heartbeat from the data, which is sent out of the TAP and back into the live network. Heartbeats are never sent into the live network. If the heartbeat sent from the TAP is not received back, indicating the device is offline for some reason, the TAP will automatically bypass the device, keeping the network up even though the device is offline. No network downtime. No single point of failure.

 


 

Inline Lifecycle Management

 

Inline lifecycle management
Utilizing an external Bypass TAP, and not relying on bypass functionality within your inline tool, offers the unique ability to implement inline lifecycle management. From sandboxing a new tool deployment to easily taking tools out-of-band for updates, installing patches, performing maintenance or troubleshooting to optimize and validate before pushing back inline, a Bypass TAP has quickly become the essential compliment to any inline tool.

Sandboxing or piloting new tools in your real environment with live packet data, without impacting the availability of the network, provides the ability to evaluate and optimize the tool out-of-band, before deploying it live in your network. The tool being tested is exposed to the same type of data it would be monitoring for a production deployment, rather than test data, increasing the confidence of the piloting being performed.

 



Want more info?

3 Keys to Network Resiliency

A Security Engineer's Go-to-Guide to Avoiding Network Downtime

Learn how to increase your network resiliency by expediting troubleshooting and shortening your maintenance windows. This whitepaper from Garland Technology will explore why bypass technology is a critical part of inline security design, how does failsafe technology prevent a single point of failure, and why setting up a redundant bypass architecture improves the usefulness of connected appliances.  

Learn More

Network Resiliency

Inline Security Appliances

Bypass Technology works hand-in-hand with your inline security appliances, to ensure that they do not create a single point of failure in your network. 
NGFW
IPS
Next-Generation Firewall
Intrusion Prevention System
DDoS
IDS
Distributed Denial of Service Appliances
Intrusion Detection System
WAF
SIEM
Web Application Firewall
Security Information & Event Management

TAP into Technology | Inline Security Appliances

Leading the way in Network Technology
Failsafe Deployment of 100G Inline Security Tools with EdgeSafe Bypass TAPs

Failsafe Deployment of 100G Inline Security Tools with EdgeSafe Bypass TAPs

Today’s networks have become sophisticated defense mechanisms, architected with numerous inline security tools such as firewalls, intrusion prevention systems, web application firewalls, data loss

­­­MSSPs: The Pros and Cons of Outsourcing Network Security

­­­MSSPs: The Pros and Cons of Outsourcing Network Security

 When firewalls emerged to protect networks in the early 1990s, outsourcing cyber security to a Managed Security Service Provider (MSSP) wasn’t even a consideration. However, defending your network

The 101 Series: Quick Connect Tips for Inline Security Appliances

The 101 Series: Quick Connect Tips for Inline Security Appliances

You just bought a brand new inline security appliance—a next-gen firewall, intrusion prevention system (IPS), data leakage prevention (DLP) system or web application firewall—and you’re ready to