<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2975524&amp;fmt=gif">
Skip to content

Visibility Solutions

Garland Technology is committed to educating the benefits of having a strong foundation of network visibility and access. By providing this insight we protect the security of data across your network and beyond.

Resources

Garland Technology's resource library offers free use of white papers, eBooks, use cases, infographics, data sheets, video demos and more.

Blog

The TAP into Technology blog provides the latest news and insights on network access and visibility, including: network security, network monitoring and appliance connectivity and guest blogs from Industry experts and technology partners

Partners

Our extensive technology partnership ecosystem solves critical problems when it comes to network security, monitoring, application analysis, forensics and packet inspection.

Company

Garland Technology is dedicated to high standards in quality and reliability, while delivering the greatest economical solutions for enterprise, service providers, and government agencies worldwide.

Contact

Whether you are ready to make a network TAP your foundation of visibility or just have questions, please contact us. Ask us about the Garland Difference!

Industrial_Defender_Logo-500x99-white

Managing Cyber Risk in Evolving
OT Environments

Download the joint Solution PDF
Supreme Tab Elements
Industrial Defender Platform Key Features
Garland Technology TAPs Key Features

Industrial Defender Platform Key Features

industrial-defender-computer

Leading OT asset management solution providing the deepest, most comprehensive OT asset information for security and compliance. Offers deep asset inventory details, including software versions, vulnerabilities, patches, firewall rules, and PLC key switch positions. It serves as a centralized solution for OT asset management, change and configuration management, vulnerability management, and policy compliance.

Combining Industrial Defender’s platform with Garland Technology’s Network TAPs enhances situational awareness of the OT environment.

Garland Technology TAPs Key Features

OT-Netowrk-TAP

Provide the deepest levels of visibility into the packet level data, with no impact to the live network. By ensuring 100% of network traffic is copied and transmitted to monitoring tools in real time, TAPs improve uptime and guarantee comprehensive packet visibility for security solutions. Garland TAPs are independent and cannot be hacked as they do not have an IP address or a MAC address, making them invisible to the network.

Schedule Your Network Solution Call Today

Garland EdgeLens Solution

Garland’s EdgeLens series is an advanced bypass TAP with built-in packet broker functionality that centralizes network traffic, making network tools more efficient by sharing network traffic with monitoring and security tools. EdgeLens provides visibility for a hybrid configuration of an active, inline network device and out-of-band tools, such as LiveAction. EdgeLens provides identical network traffic streams through the active inline device and to the capture engine of LiveAction LiveWire or LiveCapture. The benefits of both devices seeing the same traffic are:

Live-Action-Diagram-1-V1

Correlated data for real-time monitoring and root cause analysis using network packets.
Historical look back and playback of the network traffic.
Validating and updating network policy changes and spotting anomalies.
Network data recording for compliance and security forensics.
Root cause analysis for application and network related problems.

 

Download the Joint Solution

TAP -> TOOL

Industrial-Defender-Diagram

How it Works

Garland Network TAPs: Analyze data from OT networks by mirroring network traffic. The tapped traffic can then feed into the Network Packet Broker, which combines, filters, and load balances the tapped traffic at scale into the Industrial Defender IDC data collector and/or management system.


Industrial Defender Collector (IDC): Analyzes the traffic, inventories all OT assets, and identifies vulnerable devices, cyber threats, and operational anomalies on your network.

Industrial Defender Central Manager (IDCM): Industrial Defender centralizes data with other OT asset management and configuration management data collected across the environment, making it reportable and actionable.

Together, Industrial Defender and Garland Technology deliver a robust, integrated OT asset management and security monitoring solution, allowing for enhanced compliance and operational resilience for industrial organizations.

Benefits Summary

  • Comprehensive OT Asset Data: Deliver the most detailed OT asset data needed to protect industrial operations and prove compliance.
  • Non-Intrusive Network Monitoring: Gain a detailed view of all the traffic traversing a network, including communications between OT assets. This comprehensive visibility helps in identifying and monitoring all assets connected to the network.
  • Anomaly Detection: Identify anomalies and irregularities in network traffic, which could indicate compromised devices or malicious activities. Early detection of such issues is critical in preventing significant security incidents.
  • Configuration and Change Management: Maintain the integrity of all configurable elements of hardware or software, including capturing a baseline build or settings for any specific asset, detecting new configurations, and managing the deployment of new builds or configurations.
  • Vulnerability Management: Proactively identify and mitigate vulnerabilities to minimize the window of opportunity for attackers, and make progress with prioritization and tracking of your patching and mitigation efforts as part of your compliance workflow.
  • Optimize Tool Performance: Improve and air gap tool performance by providing complete unidirectional packet visibility while optimizing and aggregating traffic.
  • Packet Visibility for Legacy Networks: Provide OT security tools packet visibility for legacy networks with unmanaged switches that cannot utilize SPAN.
  • Automate Compliance Efforts: With built-in policy management and reporting templates, automate compliance efforts for standards including NERC CIP, IEC 62443, TSA SD, NIS2, AESCSF, CMMC, and more.

Full PDF Solution Brief

Solution Brief
Industrial_Defender

Industrial Defender protects the world’s critical infrastructure from cyberattacks. As the leader in OT cybersecurity innovation, the company’s scalable platform is used by the largest organizations in the world to empower security stakeholders with actionable data about their OT and IIoT infrastructure, enabling them to make informed risk management decisions. Learn more at IndustrialDefender.com.

 

Schedule Your Network Solution Call Today

 

  • How It Works
  • Bypass TAP Benefits
  • Full PDF Solution Brief
  • How It Works
  • How It Works
  • How It Works

Bypass manages the availability of inline tools, preventing a single point of failure in the network by “bypassing” the device in the event it fails or needs to be updated. Reducing network downtime. Bypass is unique to the other TAP modes, as it is an inline use case not out-of-band.