<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2975524&amp;fmt=gif">
BLOG

Mira Security Establishes Exclusive Distribution Partnership with Garland Technology to Revolutionize Encrypted Traffic Visibility

February 13, 2025

New York – February 12, 2025 – Mira Security, the leading provider of advanced decryption solutions, has announced an exclusive distribution partnership with Garland Technology, a global leader in network visibility and access solutions. This strategic collaboration enables Garland Technology to distribute Mira Security’s innovative decryption technologies worldwide, offering enterprises unmatched insight into encrypted traffic and ensuring robust network security.

A Solution for Today’s Encrypted Traffic Challenges

With over 90% of north/south traffic and more than 65% of east/west traffic encrypted, enterprise networks face significant challenges in detecting and mitigating hidden threats. The advent of TLS 1.3, while enhancing encryption quality, has further complicated visibility for security tools that lack decryption capabilities.

“Encrypted network traffic is now the norm, but it creates blind spots for traditional security tools,” said Chris Bihary, CEO and Co-Founder of Garland Technology. “By combining our EdgeLens Inline External Bypass technology with Mira Security’s Encrypted Traffic Orchestrator (ETO), we’re ensuring enterprises can detect and address threats without compromising network performance.”

Expanding Security Capabilities with Decryption

The partnership brings together Garland Technology’s expertise in network access and visibility with Mira Security’s cutting-edge decryption solutions. This relationship does not affect current partners and OEMs of Mira.

“This partnership allows Mira Security to extend our reach with the industry’s most advanced decryption solution,” said Niel Viljoen, CEO of Mira Security. “Our Encrypted Traffic Orchestrator automatically detects and decrypts SSL, TLS and SSH traffic, delivering actionable insights to security tools for efficient threat mitigation. Garland Technology’s global distribution network ensures more organizations can eliminate the blind spots created by encrypted traffic.”

Key Benefits of the Partnership:

  • Enhanced Visibility: Eliminates blind spots in encrypted network traffic, ensuring threats are detected and mitigated in real time.
  • Seamless Integration: Combines Garland Technology’s EdgeLens Inline External Bypass with Mira Security’s ETO, allowing inline and out-of-band tools to analyze decrypted traffic without performance degradation.
  • Global Accessibility: Garland Technology’s distributors and resellers can now offer this combined solution to enterprise companies and public agencies worldwide.


Targeting
Today’s Security Challenges

The partnership aims to address critical security gaps across various industries, providing a robust solution for network engineers and cybersecurity architects. The joint offering is particularly valuable for:

  • Organizations using legacy decryption solutions that cannot handle modern encryption standards such as TLS 1.3.
  • Enterprises leveraging cybersecurity tools without built-in decryption capabilities.
  • Companies seeking to offload decryption tasks from Next-Generation Firewalls (NGFWs) to improve performance and extend hardware lifespans.

About Mira Security
Mira Security is the world’s leading decryption solution provider, specializing in SSL/TLS and SSH traffic decryption to enhance the visibility and effectiveness of cybersecurity tools. Mira’s Encrypted Traffic Orchestrator provides unparalleled performance and ensures compliance with the latest encryption standards. Visit mirasecurity.com for more information.

About Garland Technology
Garland Technology is an industry leader of IT and OT network solutions for enterprise, critical infrastructures, and government agencies worldwide. Since 2011, Garland Technology has been engineering and manufacturing simple, reliable, and affordable Network TAPs, Network Packet Brokers, inline Bypass, and Hardware Data Diodes in Richardson, Texas. For help identifying the right IT/OT network visibility solutions for projects large and small, or to learn more about the inventor of the first bypass technology, visit garlandtechnology.com.

See Everything. Secure Everything.

Contact us now to secure and optimized your network operations

Heartbeats Packets Inside the Bypass TAP

If the inline security tool goes off-line, the TAP will bypass the tool and automatically keep the link flowing. The Bypass TAP does this by sending heartbeat packets to the inline security tool. As long as the inline security tool is on-line, the heartbeat packets will be returned to the TAP, and the link traffic will continue to flow through the inline security tool.

If the heartbeat packets are not returned to the TAP (indicating that the inline security tool has gone off-line), the TAP will automatically 'bypass' the inline security tool and keep the link traffic flowing. The TAP also removes the heartbeat packets before sending the network traffic back onto the critical link.

While the TAP is in bypass mode, it continues to send heartbeat packets out to the inline security tool so that once the tool is back on-line, it will begin returning the heartbeat packets back to the TAP indicating that the tool is ready to go back to work. The TAP will then direct the network traffic back through the inline security tool along with the heartbeat packets placing the tool back inline.

Some of you may have noticed a flaw in the logic behind this solution!  You say, “What if the TAP should fail because it is also in-line? Then the link will also fail!” The TAP would now be considered a point of failure. That is a good catch – but in our blog on Bypass vs. Failsafe, I explained that if a TAP were to fail or lose power, it must provide failsafe protection to the link it is attached to. So our network TAP will go into Failsafe mode keeping the link flowing.

Glossary

  1. Single point of failure: a risk to an IT network if one part of the system brings down a larger part of the entire system.

  2. Heartbeat packet: a soft detection technology that monitors the health of inline appliances. Read the heartbeat packet blog here.

  3. Critical link: the connection between two or more network devices or appliances that if the connection fails then the network is disrupted.

NETWORK MANAGEMENT | THE 101 SERIES