Technology Partners

Our technology partners solve critical problems when it comes to network security, monitoring, application analysis, forensics and packet inspection. Garland Technology's network TAPs provide the physical connection between your network, and your security and monitoring appliances.  

By using a purpose-built external network TAP you are ensured 100% visibility to see every bit, byte and packet ®.

Accolade Technology

Accolade is the technology leader in high performance FPGA-based packet capture and application acceleration adapters/NICs serving global OEM network security and monitoring appliance customers. Customers integrate Accolade’s ANIC adapters into their network appliances to perform advanced packet capture and processing functions. Accolade’s ANIC series of advanced Adapters are optimized to offload multi-core host CPUs in a variety of target applications including network monitoring, network/cyber security, (IPS, IDS, DPI, DDoS, Network Forensics) network test, latency measurement and video monitoring. Accolade’s NICs offer lossless packet capture at Line Rate, the richest acceleration feature sets at the best value per GigE port in the 1-100G performance spectrum. For additional information, visit www.accoladetechnology.com.

Learn More

Big Switch Networks

Big Switch Networks is the market leader in bringing hyperscale-inspired data center networking technologies to a broader audience. The company is taking three key hyperscale technologies -- OEM/ODM bare metal and open Ethernet switch hardware, sophisticated SDN control software, and core-and-pod data center designs -- and leveraging them in fit-for-purpose products designed for use in enterprises, cloud providers, and service providers.

The company's Big Monitoring Fabric is a next-generation SDN solution to monitor existing networks, and the flagship Big Cloud Fabric is the industry's most advanced bare metal switching fabric intended for new data center pods such as private cloud, big data, and VDI. The company is backed by Index Ventures, Morgenthaler Ventures, Silver Lake Partners, Accton, Redpoint Ventures, Khosla Ventures, Intel and Goldman Sachs, among others. For additional information, email info@bigswitch.com, follow @bigswitch, or visit www.bigswitch.com.

Learn More

CapStar Forensics

CapStar is a highly flexible, very fast network forensic platform for analyzing pcaps and real-time network data. CapStar can be automated, running a group of analytics against a series of pcaps in batch saving precious, high-priced investigator's time. 

CapStar excels at searching large raw pcaps blazingly fast, delivering quicker time-to-resolution as well as lower cost per investigation. The centerpiece is the "stateful" scripting enabling extraction of information based on time domain and inter-packet dependencies. The scripting language leverages the relevant protocol field names and syntax of the popular Wireshark platform in a fully programmable way. 

The platform comes with 150+ modifiable scripts including "show potential http malware, detect C&C traffic, detect ARP poisoning, overview of all sessions, match threat intel against a given pcap, show chain of infection and more. For additional information, visit: www.capstarforensics.com

Learn More

Cisco Solutions

Cisco is a global leader in telecommunications, security, network infrastructure and IT applications. Garland Technology has joined the solution partner program, giving clients who use Cisco products a great out-of-the-box solution for connecting your network.

Ask your Garland Network Designer about the new 40G-SR-BiDi Network TAP - an exclusive Cisco Partner Solution that supports Cisco's BiDirectional Optical Technology.

Visit Garland Technology at Cisco Live.

Learn More

Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. (www.checkpoint.com), is the largest network cyber security vendor globally, providing industry-leading solutions and protecting customers from cyberattacks with an unmatched catch rate of malware and other types of threats. Check Point offers a complete security architecture defending enterprises – from networks to mobile devices – in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organizations of all sizes.

Learn More

Cyphort

Cyphort is an innovative provider of Advanced Threat Protection solutions that deliver a complete defense against current and emerging Advanced Persistent Threats, targeted attacks and zero day vulnerabilities. The Cyphort Platform accurately detects and analyzes next generation malware, providing actionable, contextual intelligence that enables security teams to respond to attacks faster and more effectively. Learn more at www.cyphort.com

Learn More

Datatap

DataTapSolutions offers integrated network, application and log visibility platform for hybrid, cloud & datacenter environments. DataTap SightApps application provides a comprehensive solution that addresses network & operational analytics, application performance, traffic visibility, asset utilization, network management, compliance and monitoring of cloud applications and infrastructure. Our solutions can work in micro computing instance environment like Docker as well as high-speed 10G networks consisting of numerous servers. Learn more at www.datatapsolutions.com

Learn More

Edgecore Networks

Edgecore Networks Corporation is a wholly owned subsidiary of Accton Technology Corporation, the leading network ODM.  Edgecore Networks delivers wired and wireless networking products and solutions through channel partners and system integrators worldwide for the Data Center, Service Provider, Enterprise and SMB customers.  Edgecore Networks is the leader in open networking providing a full line of 1GbE, 10GbE, 25GbE, 40GbE, 50GbE and 100GbE open and OCP switches that offer choice of NOS and SDN software for data center, telecommunications and Enterprise network use cases.  For more information, visit www.Edge-Core.com.

Learn More

eSentire

eSentire® is a proven industry leader, keeping mid-size organizations safe from constantly evolving cyber attacks that traditional security defenses simply can’t detect. eSentire’s Active Threat Protection combines people, process and technology to deliver an unmatched, premium level service that detects, remediates and communicates sophisticated cyber threats in real-time, 24/7.  Learn more at: www.esentire.com

Learn More

Flowmon

Flowmon Networks empowers businesses to manage and secure their computer networks confidently. Through our high performance network monitoring technology and lean-forward behavior analytics, IT pros worldwide benefit from absolute network traffic visibility to enhance network & application performance and deal with modern cyber threats. Driven by a passion for technology, we are leading the way of NetFlow/IPFIX network monitoring that is high performing, scalable and easy to use. The world’s largest businesses, internet service providers, government entities or even small and midsize companies rely on our solutions to take control over their networks, keep order and overcome uncertainty. Learn more at www.flowmon.com

Learn More

ForeScout

ForeScout delivers pervasive network security by allowing organizations to continuously monitor and mitigate security exposures and cyber attacks. Because ForeScout’s solutions are easy to deploy, unobtrusive, flexible and scalable, they have been chosen by more than 1,500 enterprises and government agencies. Learn more at www.forescout.com

Learn More

Gearbit

Gearbit network tools are designed to be highly automated, and deeply integrated across multiple vendor tool platforms. Our products start with the latest cutting-edge technologies to provide automated high speed packet capture and analysis. Gearbit decreases the time to resolution by identifying key issues through multiple sources.

With an open platform approach Gearbit empowers the customer to use the best of breed tools to deliver services across a globally scalable architecture. Gearbit integrates with log systems, snmp managers, netflow collectors, SEIM tools, event managers as well as providing our own alarms and reporting.Learn more at Gearbit.com.

Learn More

HP AllianceOne

HP AllianceOne is a comprehensive partner program focused on HP’s Converged Infrastructure strategy of providing a shared services model to deliver secure, best-in-class applications. Learn more at hp.com.

Learn More

Imperva

Imperva has a singular purpose: to defend your business-critical data and applications from cyber attacks and internal threats. Imperva's solutions enable you to discover assets and risks, and then protect your most valuable information—such as intellectual property, business plans, trade secrets, customer and employee information, and the day-to-day data that drives your business. Imperva also helps you comply with the myriad of increasingly stringent data protection regulations and mandates, as well as enforce policies, entitlements and audit controls.
For more information, visit 
www.imperva.com.

Learn More

Klos Technologies

Klos Technologies has been offering network protocol analyzers, tools and services to network engineers for more than 25 years. Klos products included the first low cost protocol analyzers to support accurate GPS time stamps, the industry standard serial line analyzer to support PPP, the first to support real time detunneling and filtering of the reassembled packets, support multiple interfaces simultaneously and more.  Klos also builds packet capture appliances and offers customization services for various network appliances .


Whether providing custom network capture appliances, protocol decodes, router engines, NIC drivers, applications or utilities, Klos works quickly with customers to meet their needs, to industry standards, providing prompt professional services. Learn more at www.klos.com.

Learn More

McAfee by Intel

Intel Security combines the security expertise of McAfee with the innovation, performance and trust of Intel. The partnership with the Intel Security Platform provides customers with 100% data visibility and access for their next-generation intrusion prevention system. Garland Technology Bypass taps and EdgeLens family supports the intrusion prevention lifecycle from evaluation and learning your network, to optimization with live data, full validation, and anytime off-line access for trouble-shooting, updates, and maintenance—all with tapping the live network only once.  Learn more about Intel Security Products.


Learn More

NetFort

NetFort LANGuardian DPI product provides continuous visibility at the right level for SMEs, bridging the gap between insufficient detail of NetFlow and high cost and complexity of full packet capture systems.  NetFort’s metadata views for users and applications enable rapid alerting and investigation of operational and security incidents, including ransomware attacks, network misuse, or simply providing audit trails and enabling collaboration between security and network operations. Fast, agentless deployment on physical or virtual infrastructure sees NetFort used in a wide range of industry sectors including financial services, high technology, utilities, local and national government, automotive, healthcare, sport, and education.

Learn more at www.netfort.com.

Learn More

NextComputing

NextComputing is the premier OEM supplier of open, massively scalable, full packet capture systems. Our
Packet Continuum technology achieves lossless capture to disk at high line rates up to 40Gbps, real time
indexing, in-line data compression, PLUS simultaneous query and deterministic retrieval of pcap data. Active Trigger alerts and packet analytics make Packet Continuum ideal for cyber security protection, incident response, and network trouble-shooting. Packet Continuum software operates on a standalone appliance (portable or rackmount), or across a cluster of enterprise-grade servers, for massively scalable forensic timelines and advanced analytics. Learn more at  www.nextcomputing.com
Learn More

Palo Alto Networks

As the next-generation security company, we are leading a new era in cybersecurity by safely enabling all applications and preventing advanced threats from achieving their objectives for thousands of organizations around the world. We are the fastest growing security company in the market because of our deep expertise, commitment to innovation, and game-changing security platform focused on bringing an end to the era of breaches by uniquely integrating our Next-Generation Firewall, Advanced Endpoint Protection, and Threat Intelligence Cloud. Learn more at: www.paloaltonetworks.com.

 

Learn More

Performance Vision

PerformanceVision is a leading vendor in the Application Performance Monitoring (APM) and network visibility markets.  Unlike most competitors, PV’s in-depth decoding capabilities are not limited to tops but bring quick true root cause analysis at transaction level for all HTTP(s), SQL, CIFS/SMB, DNS and VoIP traffic. To learn more, visit:  www.PerformanceVision.com

Learn More

PRILINK

PRILINK provides network meters for call centres to measure voice service performance from network perspective. Used similarly as hydro meters, our smart-phone sized meters generate network analytics for every single phone number and IP address, and can monitor voice traffic from PSTN, mobile phone, online chat, etc.

Supplementary to CRM software, PRILINK's meter software add complete network oversights including blocked calls, event logs for compliance requirements and network diagnostics capabilities to call centres. To learn more, 
visit: www.prilink.com


Learn More

Quantea

Quantea allows organizations, from large or small, to have the capability to fully understand their network. Whether it is their network’s macroscopic topology or nanoseconds worth of network traffic, the QP Series allows large amounts of data to be recorded while maintaining a wide spectrum of granularity. Quantea’s PureInsight software provides visualized network analysis to quickly zoom in to an area of interest to find root cause or indication of anomalies. Whether it is gaining insight on determining network performance issues, user or network anomalies, intrusion detection or prevention, and network or business intelligence, the data is rich with information and this is why it is our mission to empower businesses and organizations through their data – that begins with Quantea. For more information, visit quantea.com.


Learn More

Riverbed Technology

Riverbed, at more than $1 billion in annual revenue, is the leader in application performance infrastructure, delivering the most complete platform for the hybrid enterprise to ensure applications perform as expected, data is always available when needed, and performance issues can be proactively detected and resolved before impacting business performance. 

Riverbed enables hybrid enterprises to transform application performance into a competitive advantage by maximizing employee productivity and leveraging IT to create new forms of operational agility. Riverbed’s 27,000+ customers include 97% of the Fortune 100 and 98% of the Forbes Global 100.

Learn more at  www.riverbed.com.
Learn More

Savvius

Savvius offers a range of powerful software and appliance products that automate the collection of critical network data for network forensics in security investigations and for network and application visibility and performance diagnostics. Savvius products are trusted by network and security professionals at over 6,000 companies in 60 countries around the world.

Visit
www.savvius.com for information about Savvius Omnipliance®, Savvius Omnipeek®, Savvius Vigil™, and Savvius Insight™, and to learn about Savvius technology and channel partners.
Learn More

SCADAfence

SCADAfence is a pioneer in providing cybersecurity solutions for Industrial IoT or ICS/SCADA networks in smart manufacturing industries, such as pharmaceutical, chemical, food & beverage and automotive. SCADAfence's passive solutions are designed to reduce risks such as operational downtime, product manipulation and theft of sensitive proprietary information, while keeping the peace of mind that the solution does not pose any threat to the production environment. Our solutions offer visibility of day-to-day operations, detection of malicious cyber-attacks as well as non-malicious operational threats, and risk management tools designed to reduce the attack surface. More information is available at www.scadafence.com .
Learn More