<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2975524&amp;fmt=gif">
Skip to content

Visibility Solutions

Garland Technology is committed to educating the benefits of having a strong foundation of network visibility and access. By providing this insight we protect the security of data across your network and beyond.

Resources

Garland Technology's resource library offers free use of white papers, eBooks, use cases, infographics, data sheets, video demos and more.

Blog

The TAP into Technology blog provides the latest news and insights on network access and visibility, including: network security, network monitoring and appliance connectivity and guest blogs from Industry experts and technology partners

Partners

Our extensive technology partnership ecosystem solves critical problems when it comes to network security, monitoring, application analysis, forensics and packet inspection.

Company

Garland Technology is dedicated to high standards in quality and reliability, while delivering the greatest economical solutions for enterprise, service providers, and government agencies worldwide.

Contact

Whether you are ready to make a network TAP your foundation of visibility or just have questions, please contact us. Ask us about the Garland Difference!



logo

Secure and Manage Industrial Networks
A joint solution from Garland Technology and Radiflow
providing full visibility into OT networks.

Download the Joint Solution PDF

 

Security Challenges

 

Key Solution Benefits

Schedule Your Design-IT Today

Garland EdgeLens Solution

Garland’s EdgeLens series is an advanced bypass TAP with built-in packet broker functionality that centralizes network traffic, making network tools more efficient by sharing network traffic with monitoring and security tools. EdgeLens provides visibility for a hybrid configuration of an active, inline network device and out-of-band tools, such as LiveAction. EdgeLens provides identical network traffic streams through the active inline device and to the capture engine of LiveAction LiveWire or LiveCapture. The benefits of both devices seeing the same traffic are:

Live-Action-Diagram-1-V1

Correlated data for real-time monitoring and root cause analysis using network packets.
Historical look back and playback of the network traffic.
Validating and updating network policy changes and spotting anomalies.
Network data recording for compliance and security forensics.
Root cause analysis for application and network related problems.

 

Download the Joint Solution

TAP -> TOOL

Modern manufacturing, logistics, transportation, and other critical industries increasingly rely on automation to help drive down costs and increase efficiency. With the rise of Industry 4.0 and widespread implementation of IIoT-based automation, organizations are suddenly faced with unique security posture challenges. Today’s automation systems host an array of vendors and legacy (and often outdated) assets. Applications and corporate IT systems must be accessed by 3rd party integrators and consultants greatly increasing the attack surface. You can easily see why exposure to cyber threats, through malicious activity and human error, continue to increase. Organizations must now find creative ways to stay ahead of the hackers and that starts with improving visibility across ICS environments.

Garland Technology and Radiflow each offer costeffective, scalable solutions designed to meet the unique needs of critical infrastructure and industrial networks. Teaming up multiplies the benefits to OT customers.

The initial stage in securing industrial operations involves mapping the OT network, including network topology, modern and legacy assets, devices, ports, and all connections. The result is a virtual model of the complete system, down-drillable to each device. To ensure that Radiflow’s iSID Industrial Threat Detection system has complete visibility and access to network traffic, Garland Technology Network TAPs are deployed as the access method for network traffic at each critical point of interest in the network. Once network visibility is established, iSID can begin to protect against cyber attacks, enforce policies, provide anomaly detection, monitor operational behavior, and perform maintenance management.

OT-TAPS-V1
  • Single Site Deployment
  • Multisite Deployment
  • JOINT SOLUTION BENEFITS
  • Full PDF Solution Brief

Radiflow-Diagram-1-V1

The Garland Network TAP allows for up to 4 links to be tapped and aggregated together to feed the iSID Threat Detection Server in an out-of-band, passive deployment. By using a TAP instead of configuring a mirror port on a Switch, if one is even available, customers will be able to guarantee that 100% of the network packets are delivered to iSID for analysis, while providing unidirectional traffic via the built-in data diode functionality of the TAP.

The Radiflow iSAP Smart Collector is a cost effective, distributed solution that offers a network-wide view of all connected devices and all network traffic for threat detection at a central site. Installed at each remote site, iSAP receives all LAN traffic from the Garland Network TAP and filters out much of the irrelevant traffic data, leaving intact the SCADA traffic. Each iSAP securely connects to a centrally located iSID Threat Detection server, where corporate-wide network and device activity is analyzed.

 

Schedule Your Design-IT Today

 

  • How It Works
  • Bypass TAP Benefits
  • Full PDF Solution Brief
  • How It Works
  • How It Works
  • How It Works

Bypass manages the availability of inline tools, preventing a single point of failure in the network by “bypassing” the device in the event it fails or needs to be updated. Reducing network downtime. Bypass is unique to the other TAP modes, as it is an inline use case not out-of-band.