<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2975524&amp;fmt=gif">
BLOG

Axellio, Garland Technology, and Mira Security Join Forces to Provide Comprehensive Decryption and Network Visibility Solution

January 9, 2024

Colorado Springs, CO, January 9, 2024 - Axellio®, Garland Technology and Mira Security today announced a joint collaboration to introduce a groundbreaking solution for network security to enable reliable visibility into TLS 1.3 encrypted network traffic. This partnership marks a significant advancement in addressing the challenges of decrypting and analyzing encrypted network traffic, vital for security operations and forensic analysis.

The solution uniquely integrates Garland Technology’s EdgeLens®, a leading hybrid TAP and network packet broker providing reliable traffic capture and visibility distribution, Mira’s Encrypted Traffic Orchestration providing high-scale TLS 1.3 and other protocol decryption, and Axellio’s PacketXpress®, to simultaneous capture, store, and distribute traffic efficiently and reliably at extremely high speeds to various analysis applications. This solution offers a centralized, scalable, and affordable solution to decrypt the traffic for all your analysis needs while enhancing access to richer event data for forensic analysis.

This innovative joint offering enables detection of encrypted traffic anywhere in the network, whether physical, virtual, or in the cloud. It guarantees no-loss capture at over 100 Gbps for any SSL and TLS encryption protocols, especially the latest TLS 1.3 protocol. The solution features adaptive traffic distribution and balancing for multiple active and passive analysis applications, creating a seamless integration of technologies for enhanced network visibility and security.

"By collaborating with industry leaders Garland Technology and Mira Security, we have developed an integrated solution that sets a new standard for decrypting, analyzing, and securing network traffic," said Scott Aken, CEO, Axellio. "This partnership underlines our dedication to advancing cybersecurity and equipping organizations with the tools needed to navigate the complex digital threat environment, particularly with the advent of the new TLS 1.3 protocol."

“With the predominance of encrypted traffic that is in today’s networks, this joint effort signifies a commitment to pushing the boundaries of cybersecurity and empowering organizations with robust solutions to navigate the evolving landscape of digital threats,” said Niel Viljoen, CEO Mira Security. “We are pleased to work alongside our partners Garland and Axellio in this endeavor.”

“The partnership with Mira Security and Axellio highlights the importance of Garland’s TAP to Tool philosophy,” said Chris Bihary, CEO/Co-Founder, Garland Technology. “It is by creating partnerships like these that we are able to show the true value of our technology and ensure organizations build their security stacks with a foundation of visibility.”

More information on this joint solution can be found on the Axellio website.

About Axellio

Axellio® provides extreme high-performance, scalable, compact, economical, and simultaneous time-series data ingest, storage and distribution solutions for the defense and intelligence community at speeds exceeding 100 Gbps. Axellio’s PacketXpress® platform focuses on network traffic packet capture, distribution, and analysis for cybersecurity monitoring and forensic analysis, and is operationally deployed with the US Army worldwide. For intelligence, surveillance, and reconnaissance applications (ISR), Axellio’s SensorXpressTM offers ingestion and storage of RF data from sensors and distributes it to analysis applications simultaneously at rates exceeding 100 Gbps. Learn more about Axellio at www.Axellio.com.

About Garland Technology

Garland Technology is an industry leader of IT and OT network solutions for enterprise, critical infrastructures, and government agencies worldwide. Since 2011, Garland Technology has been engineering and manufacturing simple, reliable, and affordable Network TAPs and Network Packet Brokers in Richardson, Texas. For help identifying the right IT / OT network visibility solutions for projects large and small, or to learn more about the inventor of the first bypass technology, visit GarlandTechnology.com or @garland-technology-llc.

About Mira Security

Mira Security’s mission is to provide visibility into network traffic as our customers transition to higher speeds and new architectures, and to eliminate the compromise between privacy and security along their journey. We will build lasting relationships with our valued customers and partners and deliver innovative encryption software and products. Mira Security’s products are developed in labs in Pittsburgh, PA and Centurion, South Africa. To learn more about Mira Security and its products, please visit www.mirasecurity.com.

Contact: 

Neal Stein, Technology PR Solutions

Phone: (321) 473-7407

nealjstein@techprsolutions.com

See Everything. Secure Everything.

Contact us now to secure and optimized your network operations

Heartbeats Packets Inside the Bypass TAP

If the inline security tool goes off-line, the TAP will bypass the tool and automatically keep the link flowing. The Bypass TAP does this by sending heartbeat packets to the inline security tool. As long as the inline security tool is on-line, the heartbeat packets will be returned to the TAP, and the link traffic will continue to flow through the inline security tool.

If the heartbeat packets are not returned to the TAP (indicating that the inline security tool has gone off-line), the TAP will automatically 'bypass' the inline security tool and keep the link traffic flowing. The TAP also removes the heartbeat packets before sending the network traffic back onto the critical link.

While the TAP is in bypass mode, it continues to send heartbeat packets out to the inline security tool so that once the tool is back on-line, it will begin returning the heartbeat packets back to the TAP indicating that the tool is ready to go back to work. The TAP will then direct the network traffic back through the inline security tool along with the heartbeat packets placing the tool back inline.

Some of you may have noticed a flaw in the logic behind this solution!  You say, “What if the TAP should fail because it is also in-line? Then the link will also fail!” The TAP would now be considered a point of failure. That is a good catch – but in our blog on Bypass vs. Failsafe, I explained that if a TAP were to fail or lose power, it must provide failsafe protection to the link it is attached to. So our network TAP will go into Failsafe mode keeping the link flowing.

Glossary

  1. Single point of failure: a risk to an IT network if one part of the system brings down a larger part of the entire system.

  2. Heartbeat packet: a soft detection technology that monitors the health of inline appliances. Read the heartbeat packet blog here.

  3. Critical link: the connection between two or more network devices or appliances that if the connection fails then the network is disrupted.

NETWORK MANAGEMENT | THE 101 SERIES