Visibility Solutions

Garland Technology is committed to educating the benefits of having a strong foundation of network visibility and access. By providing this insight we protect the security of data across your network and beyond.

Resources

Garland Technology's resource library offers free use of white papers, eBooks, use cases, infographics, data sheets, video demos and more.

Blog

The TAP into Technology blog provides the latest news and insights on network access and visibility, including: network security, network monitoring and appliance connectivity and guest blogs from Industry experts and technology partners

Partners

Our extensive technology partnership ecosystem solves critical problems when it comes to network security, monitoring, application analysis, forensics and packet inspection.

Company

Garland Technology is dedicated to high standards in quality and reliability, while delivering the greatest economical solutions for enterprise, service providers, and government agencies worldwide.

Contact

Whether you are ready to make a network TAP your foundation of visibility or just have questions, please contact us. Ask us about the Garland Difference!

Security Scenario

High Availability (HA) Solutions

Problem:

Problem

Finding a cost effective
High Availability (HA) solution

For Active/Passive and for Active/Active

Solution:

Solution

High Availability Solution

Active/Passive:
• Active/Passive: provides failover from primary device to backup appliance with one TAP
• Provide packets to additional monitoring tools for forensics, analysis, etc.
• HA Solutions for 1G and 10G 

Active/Active:
• Active/Active: provides failover if either active device fails with two TAPs

• Full redundancy for multiple units - failover to second appliance should the primary fail
• Provide packets to additional monitoring tools for forensics, analysis, etc.
• HA Solutions for 1G and 10G

High Availability Flow

High Availability (HA) solution for Active/Passive
High Availability (HA) solution for Active/Active
< Back to Security