Network Taps, in addition to being available for copper or fiber media, can be purchased in a fixed configuration, typically called “duplex Taps” – or as “Aggregation Taps.” The latter category offers options for how the data copies are distributed among the monitor ports. This article will clarify the differences between the two Tap types, as well as exploring the rationale for different Tap configurations, and examples of their applications.
On March 4th, 2021, the Infosec and compliance firm Qualys, a member of the Forbes 100 and a provider of security auditing services to over 10,000 customers globally, experienced an attack by a Clop Ransomware zero-day exploit target affecting the Accellion FTA server – a legacy file transfer technology. Many other companies were also targeted, but Qualys has stated that no ransomware was installed in their system, nor was there any request for payment received.
Bring your own device (BYOD) makes healthcare network and information security more difficult to maintain. Implementing a dynamic, strong security system can assist with HIPAA compliance and compensate for the challenges brought about by BYOD.
The FTP-1516 can reduce the total cost of implementing a monitoring solution by allowing a 40G link to be monitored without using expensive 40G ports. The FTP-1516 allows you to leverage existing 10G monitoring ports and can be a cost effective alternative to upgrading to a 40G monitoring solution.
When customers need to troubleshoot their cloud-based applications, they reach for two things: Wireshark and a Network Tap.
When it comes to monitoring network traffic, there are two main choices: use a network TAP (test access point) or mirror the SPAN port of a network switch. This article helps you decide the best tactic.
Electronic surveillance is a vital tool for State and Federal law enforcement, regulatory agencies, the Intelligence community, and a broad array of other government entities. Find out how network taps enable and improve network surveillance.
While data encryption should still be a critical part of your network security protocol, it cannot be your only form of protection