Garland Technology ensures complete network visibility by delivering a full platform of network test access point (TAPs) and packet broker products.
Garland Technology is committed to educating the benefits of having a strong foundation of network visibility and access. By providing this insight we protect the security of data across your network and beyond.
Garland Technology's resource library offers free use of white papers, eBooks, use cases, infographics, data sheets, video demos and more.
Resources
Read AllThe TAP into Technology blog provides the latest news and insights on network access and visibility, including: network security, network monitoring and appliance connectivity and guest blogs from Industry experts and technology partners
Our extensive technology partnership ecosystem solves critical problems when it comes to network security, monitoring, application analysis, forensics and packet inspection.
Whether you are ready to make a network TAP your foundation of visibility or just have questions, please contact us. Ask us about the Garland Difference!
Garland’s new EdgeLens® is a bypass TAP, network packet broker hybrid, purpose-built to provide the ultimate failsafe traffic management device to future proof your network. Eliminate single points of failure, manage multiple tools, reduce network downtime, cut deployment time and save money, without compromising the network.
Inline Security Packet Brokers, like the EdgeLens, are connected between network segments (router and switch or firewall) and active inline tools, like a firewall or intrusion prevention systems (IPS). Allowing you to monitor the health of multiple tools and effectively manage the devices through deployment, updates or troubleshooting. If your tools go off line for any reason the Bypass TAP functionality will automatically ‘bypass’ the tool, keeping your network up while you resolve the issue.
Garland Technology’s EdgeLens® is a purpose-built system for managing the network edge. The system facilitates complete lifecycle management of up to four (4) inline appliances, while replicating traffic for use with all out-of-band tools. Additionally the EdgeLens allows for policy verification, historical lookback, speed translation, full bypass functionality, and Garland’s fail-safe technology.
Use Case "Simplify your security stack"
As threats rise, the new normal for today’s security environments is you don’t have just one inline security tool, as tools multiply to defend new threats, there's not a single silver bullet to solve the problem.
IT teams managing security solutions need an easy way to connect all of their inline and out-of-band tools, so they can effectively keep the network up and running but secure at the same time.
Chaining allows you to pass traffic through multiple inline tools, while being able to independently monitor the health of each inline tool with bypass heartbeats. In the case of failed heartbeats, you can manually or automatically move your inline device out-of-band to manage, update or optimize.
Garland’s EdgeLens line of bypass TAP packet broker hybrids, provides an easy, hardware base chaining solution, that allows you to manage multiple inline and out-of-band tools individually, between multiple network segments. If one of the tools in the chain can't keep up, load balance to the other tools 1:1 or 1:N tools.
Bypass TAP “inline lifecycle management” allows you to easily take tools out-of-band for updates, installing patches, maintenance or troubleshooting to optimize and validate before pushing back inline.
APPLICATIONS
• Inline lifecycle management best practice: update, upgrade or troubleshoot at any time.
• Reduce network downtime.
• Eliminate single points of failure within your network.
• Tool chaining - manage multiple inline security and out-of-band monitoring tools.
• TAP 10G links and deliver data to 1G, 10G and 40G tools with high density filtering, aggregation, and load balancing.
• Historical Look Back Forensic - easily provide packet capture data to storage for post breach analysis.
• Before and After Optimization - analyze packet data before and after your inline device to ensure optimal tool performance.
• High availability (HA) support for active/active and active/passive configurations.
Manage the edge of the network can be stressful to today's security architects to defend the valuable core from increased cyber threats. The more typical tapping scenarios offer flexibility, but in this white paper we introduce an all-in-one solution for security architects looking to achieve an effective chaining approach.
-BLAKE DARCHE, AREA 1 Security
Buffalo, NY / Richardson, TX
+1 716 242 8500 (office)
+1 888 578 5686 (fax)
Quotes & Product Info:
sales@garlandtechnology.com
Tech Support:
Submit Online Support Request