<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2975524&amp;fmt=gif">

Visibility Solutions

Garland Technology is committed to educating the benefits of having a strong foundation of network visibility and access. By providing this insight we protect the security of data across your network and beyond.

Resources

Garland Technology's resource library offers free use of white papers, eBooks, use cases, infographics, data sheets, video demos and more.

Blog

The TAP into Technology blog provides the latest news and insights on network access and visibility, including: network security, network monitoring and appliance connectivity and guest blogs from Industry experts and technology partners

Partners

Our extensive technology partnership ecosystem solves critical problems when it comes to network security, monitoring, application analysis, forensics and packet inspection.

Company

Garland Technology is dedicated to high standards in quality and reliability, while delivering the greatest economical solutions for enterprise, service providers, and government agencies worldwide.

Contact

Whether you are ready to make a network TAP your foundation of visibility or just have questions, please contact us. Ask us about the Garland Difference!

EdgeLens®
Inline Security Packet Broker

Perfect 1U solution for all your network security and monitoring needs

Contact Us

1G/10G/40G  |  1U - 44 Ports  |  Integrated Bypass  |  Filtering, Aggregating and Load Balancing

Garland’s new EdgeLens® is a bypass TAP, network packet broker hybrid, purpose-built to provide the ultimate failsafe traffic management device to future proof your network. Eliminate single points of failure, manage multiple tools, reduce network downtime, cut deployment time and save money, without compromising the network.

Inline Security Packet Brokers, like the EdgeLens, are connected between network segments (router and switch or firewall) and active inline tools, like a firewall or intrusion prevention systems (IPS). Allowing you to monitor the health of multiple tools and effectively manage the devices through deployment, updates or troubleshooting. If your tools go off line for any reason the Bypass TAP functionality will automatically ‘bypass’ the tool, keeping your network up while you resolve the issue. 

EdgeLens

How does the EdgeLens work?

Garland Technology’s EdgeLens® is a purpose-built system for managing the network edge. The system facilitates complete lifecycle management of up to four (4) inline appliances, while replicating traffic for use with all out-of-band tools. Additionally the EdgeLens allows for policy verification, historical lookback, speed translation, full bypass functionality, and Garland’s fail-safe technology.

 

Use Case "Simplify your security stack"

As threats rise, the new normal for today’s security environments is you don’t have just one inline security tool, as tools multiply to defend new threats, there's not a single silver bullet to solve the problem. 

IT teams managing security solutions need an easy way to connect all of their inline and out-of-band tools, so they can effectively keep the network up and running but secure at the same time.

Chaining allows you to pass traffic through multiple inline tools, while being able to independently monitor the health of each inline tool with bypass heartbeats. In the case of failed heartbeats, you can manually or automatically move your inline device out-of-band to manage, update or optimize.

Garland’s EdgeLens line of bypass TAP packet broker hybrids, provides an easy, hardware base chaining solution, that allows you to manage multiple inline and out-of-band tools individually, between multiple network segments. If one of the tools in the chain can't keep up, load balance to the other tools 1:1 or 1:N tools. 

Bypass TAP “inline lifecycle management” allows you to easily take tools out-of-band for updates, installing patches, maintenance or troubleshooting to optimize and validate before pushing back inline.

Edgelens- Chaining

APPLICATIONS

• Inline lifecycle management best practice: update, upgrade or troubleshoot at any time.

• Reduce network downtime.

• Eliminate single points of failure within your network.

• Tool chaining - manage multiple inline security and out-of-band monitoring tools.

• TAP 10G links and deliver data to 1G, 10G and 40G tools with high density filtering, aggregation, and load balancing.

• Historical Look Back Forensic - easily provide packet capture data to storage for post breach analysis.

• Before and After Optimization - analyze packet data before and after your inline device to ensure optimal tool performance.

• High availability (HA) support for active/active and active/passive configurations.

GTWP-ManagingtheEdge19-3D-LR

Managing the Edge

Security Starts at the Edge of Your Network

Manage the edge of the network can be stressful to today's security architects to defend the valuable core from increased cyber threats. The more typical tapping scenarios offer flexibility, but in this white paper we introduce an all-in-one solution for security architects looking to achieve an effective chaining approach. 

 

Download Now

Have Questions?

Please contact us. We're here to help you find the right security solution for your project.

 

“Garland Technology triumphs in highly -volatile and critical environments, allowing us to provide visibility into our customers’ formation, and help enterprises take proactive action against cyberattacks.”

-BLAKE DARCHE, AREA 1 Security