Learn to get the most out of your TAPs and Packet Brokers
While data encryption should still be a critical part of your network security protocol, it cannot be your only form of protection
Struggles and Solutions for Businesses and their Cybersecurity Policies
When customers need to troubleshoot their cloud-based applications, they reach for two things: Wireshark and a Network Tap.
On March 4th, 2021, the Infosec and compliance firm Qualys, a member of the Forbes 100 and a provider of security auditing services to over 10,000 customers globally, experienced an attack by a Clop Ransomware zero-day exploit target affecting the Accellion FTA server – a legacy file transfer technology. Many other companies were also targeted, but Qualys has stated that no ransomware was installed in their system, nor was there any request for payment received.
Network Taps, in addition to being available for copper or fiber media, can be purchased in a fixed configuration, typically called “duplex Taps” – or as “Aggregation Taps.” The latter category offers options for how the data copies are distributed among the monitor ports. This article will clarify the differences between the two Tap types, as well as exploring the rationale for different Tap configurations, and examples of their applications.
© 2021 Datacom Systems Inc. All Rights Reserved.
For the latest information, product updates, and to check the status of your service agreement, please contact our support team