Need

IT & OT (ICS) We believe that providing visibility into your critical infrastructure, continuous monitoring, operational continuity, measuring network performance and securing the cyber security of your network is the ultimate goal. In order to achieve these goals, do not leave any blind spots in your business by providing 360° visibility using Secure Packet Mirroring Technology solution. By establishing an IT & OT (ICS) Cyber Security Intelligence SoC network parallel to your network structure, you will secure what you cannot see. Garland Technology is committed to helping increase the value of your network by offering the industry's most reliable, affordable, easy-to-deploy and scalable Active/Passive Network TAP (Network Traffic Analysis Point) and Active/Passive Network Packet Broker (Packet Aggregation Network Component) secure packet aggregation solutions.

Why Garland?
You Cannot Secure What You Cannot See
Whether deployed at the edge of the network, within a traditional data center or on-premises, IT security has a common theme. “Complete packet visibility for feeding cyber security tools”
Ensure 100% Packet Visibility to Security Tools on Your Network.
Help reducing risks to critical infrastructures of your organization with network visibility solutions.
Provide IT and OT (ICS) Visibility
Deploying network TAPs throughout your industrial network area provides complete packet visibility for security solutions, improves uptime and eliminates the packet delivery problems that SPAN/Mirror ports inevitably present.
Eliminate Network and Security Blind Spots
Blind spot: A segment or device in your network that is independent of the network that your monitoring tools cannot detect. For these areas that you cannot see or monitor, it is impossible to know what is happening inside them or analyze data between specific network segments. For this reason, detect and eliminate blind spots by establishing an IT & OT (ICS) Cyber Security Intelligence network parallel to your structure .
Benefits

Operational Visibility

Avoid Packet Losses to optimize your network

Complete network monitoring without any blind spots


IT & OT ( ICS ) Solution Benefits

Modern IPS tools may have add-on options for internal or built-in bypass, which may be useful in some failure use cases but leaves open additional vulnerabilities like software failures and doesn’t provide the flexibility to sandbox, troubleshoot and optimize and the cost tends to outweigh the industry best practice of utilizing an external bypass. Bypass TAPs reduce network downtime with which allows you to easily take tools out-of-band for updates, installing patches, maintenance or troubleshooting to optimize and validate before pushing back inline. Designed to eliminate single points of failure within your network.
IDS is a listen-only monitoring solution, it is placed out-of-band on the network infrastructure, it is not analyzing real-time traffic but is receiving a copy of the data. The two ways an IDS tool access this data is through SPAN / mirror ports on the switch or through the industry best practice network TAPs. SPAN is generally used for low utilization applications and are known to drop or alter packets, possibly masking threats. The network TAP creates full duplex traffic copies that pass physical errors and provide the flexibility to send this data to multiple destinations. If the IDS is processing many network segments, a network TAP and network packet broker are used to streamline the data to optimize security detection.
A Bypass TAP, also referred to as a 'bypass switch', provides the ability to manage the availability and reliability of your inline tool (IPS, WAF, firewalls) any time without network downtime or impacting business availability for maintenance or upgrades. A critical component to IT security strategies. Garland’s modular EdgeSafeTM Bypass TAPs, are purpose-built to provide the ultimate failsafe device that eliminates single points of failure, reducing network downtime, without compromising the network. Bypass TAP "Inline lifecycle management" allows you to sandbox new tool deployments, manage updates, install patches, perform maintenance or troubleshooting and validate out-of-band, without impacting the network.
A network TAP will copy all of your data - every bit, byte and packet on your network. But sometimes your tools don’t need to see everything. Your VoIP or Wireshark only needs to see the traffic required to do its job. In this case we need to add the additional technology of filtering. When we are not interested in all the traffic that is going through the link, we can filter out what is not required by the tool – this ensures we will not oversubscribe the monitor ports. This scenario (below) shows four 1G links with a filter applied and then aggregated together and sent out port D on TAP four to the monitoring or security tool.
The Finance Sector is one of the sectors that is at the center of cyber attacks today. Extremely important subscriber, account and commercial information is of vital importance. The damage that well-managed cyber attacks can cause to customers and institutions can be devastating. In such cases, the network must be monitored and analyzed 360 degrees. For this, the data collected by TAPs must be transported/transmitted to monitoring and analysis platforms in an organized manner, and this is provided by Packet Brokers.
Install the Garland Technology Bypass TAP between the network. Bypass TAP always manages that the inline device (Firewall, DDoS...) is up without the need to shut down the network. Bypass TAP continuously checks the health of the inline device with heartbeat packets and Bypass TAP will bypass the inline device to keep the network up and running in case the inline device is unavailable.
The Energy Sector is one of the leading industrial critical infrastructures in the world. Network elements used here must be protected with one-way traffic. Thanks to the "data diode" function, inbound attacks from the control and management systems to which the elements are connected can be prevented.
In telecom networks, which were previously designed as "3-layer (Tier-3)", with the addition of aggregators, a "4-layer (Tier-4)" structure was created, and with normal and hybrid (copper/fiber) models, packet transfer can be achieved without interruption. By supporting relevant communication protocols, traffic is transmitted to surveillance platforms. Features include: - Load Balancing - Layer 2-4 filtering - GRE, VxLan, ERSPAN etc. Tunneling - Time Stamping, packet slicing, etc. features. - Features such as deduplication (removal of excess information) etc. are available.
Defense Sector literally means IT security, where the “Zero Trust” cyber security model and the “Enterprise Defense Architecture” (JEDI) etc. programs are taken into account. Efficiency, scalability, high performance and error-free monitoring in the network are essential, working in “tough conditions” when necessary. For this purpose, for example: "Military-Grade TAP for Rugged Environment" type Taps provide "bi-directional" traffic flow with a 10/100/1000 M copper connection without any packet loss.
Join Our Garland Network

Resources

Solution Briefs

Wondering how it's done? Visit our resources page for complete solution summaries.

Summaries of Garland solutions

More

Technical Documents

Access the technical documents of the product you are interested in. Learn more for the Garland technical documentation.

Garland (White Papers) technical documents.

More

Videos

Garland Product videos are here. Learn more about Garlandtechnical videos and more.

We have compiled the Garlandvideos for you.

More