<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2975524&amp;fmt=gif">

Visibility Solutions

Garland Technology is committed to educating the benefits of having a strong foundation of network visibility and access. By providing this insight we protect the security of data across your network and beyond.

Resources

Garland Technology's resource library offers free use of white papers, eBooks, use cases, infographics, data sheets, video demos and more.

Blog

The TAP into Technology blog provides the latest news and insights on network access and visibility, including: network security, network monitoring and appliance connectivity and guest blogs from Industry experts and technology partners

Partners

Our extensive technology partnership ecosystem solves critical problems when it comes to network security, monitoring, application analysis, forensics and packet inspection.

Company

Garland Technology is dedicated to high standards in quality and reliability, while delivering the greatest economical solutions for enterprise, service providers, and government agencies worldwide.

Contact

Whether you are ready to make a network TAP your foundation of visibility or just have questions, please contact us. Ask us about the Garland Difference!

Case Study: Healthcare IT Security

How to Gain Full Visibility During an Instant Response Data Breach

Expecting a PDF?

We created this case study as a web page for better mobile optimization and accessibility. If you'd still like a PDF version of this use case, you can download it here: 

Cyber Defense Group, an incident response firm needed to gain visibility to contain a breach on a large healthcare facility’s network. With a complicated network environment stacked with legacy equipment, and staffed with basic onsite IT and an underperforming MSSP, the facility was overwhelmed.

The network seemed to work great when there was nothing wrong, but issues were quickly exposed during the attacks in this scenario. Once they were under attack, it became apparent that the network was not set up properly with zero visibility. The existing switches didn’t have the proper firmware updates, they weren’t configured correctly and had ingress / egress set up issues.

Challenge

The first challenge was gaining visibility to monitor the network traffic: understand where the attackers were coming from, where they might be touching internally, and how to stop them.

“We’re under attack and every minute that we don’t have visibility, is another minute that bad guys are exfiltrating sensitive data.”

- Lou Rabon, Founder/CEO, Cyber Defense Group

The second challenge was finding the right vendor to provide that access and visibility. “Before we found Garland our options were limited. It’s either we go to a huge provider like Gigamon, which is super expensive, and doesn’t give you a custom solution. Or the other end of the spectrum would be buying a 1G consumer grade mirror on Amazon and that wasn’t going to solve our problem.”

Goal

Quickly gain visibility, to contain a breach on a large healthcare facility’s network.

Solution

Out-of-band security and monitoring tools analyze packet data from the production network to provide insights or alerts for SecOps and NetOps teams to properly respond. These packets are delivered to solutions by either Network TAPs or SPAN ports both mirror traffic from ports to out-of-band solutions.

Cyber Defense Group utilized two Garland Technology ‘Breakout’ TAPs and one Bypass TAP, in aggregation mode to feed the proprietary tools they use for intrusion detection system (IDS), security monitoring, NGFW and log management. “We were able to get the visibility we needed quickly. That allowed us to do what we needed to do to find the bad guys and kick them out.”

Visibility Solution

Cyber Defense Group

Diagram 1: Three Garland Technology TAPs aggregating traffic to forensics or network analyzers tools.

TAP ‘Breakout’ mode sends each side of traffic to separate monitoring ports. Ensuring that no packet is lost to high-priority monitoring tools. Aggregation mode merges traffic streams into one monitoring port to reduce appliance costs, often used in combination with filtering taps, ie: filter, aggregate data streams.

When I found Garland, I got a network expert on the phone and they configured a custom solution for us. Really from the beginning, from sales to the solution, to support. I can’t say enough good things.”

-Lou Rabon, Founder/CEO Cyber Defense Group

Benefits

• After installing Garland’s network TAPs, CDG easily diagnosed and resolved the breach

• Not knowing what they needed, the Garland team helped design the deployment to quickly resolve the issue

• Improve risk assessment

• Enable security technology upgrades

 

Looking to learn how to provide visibility into your environment? Contact us for a free Design-IT session with our engineer team today!

How Healthcare Providers Can Fight Back Against Cyber Attacks

| July 29, 2021

When it comes to industries that are under threat from cyberattacks, healthcare ranks near the top. Although attackers love to steal banking and..

Read More

Best Practices for Healthcare IoT Security Monitoring

| May 27, 2021

2020 was a watershed year for IoT; for the first time ever, IoT connections like connected industrial equipment and home devices outnumbered non-IoT..

Read More

Pharmaceutical Cybersecurity and Visibility are as Critical As Ever

| April 1, 2021

The coronavirus (COVID-19) pandemic has been a harrowing experience in many ways, but it’s also given the pharmaceutical industry the chance to..

Read More