7 Reasons Why You Should TAP
March 13, 2018

Chris Bihary
Garland Technology

Share this

Many network operations teams question if they need to TAP their networks; perhaps they aren't familiar with test access points (TAPs), or they think there isn't an application that makes sense for them. Over the past decade, industry best-practice revealed that all network infrastructure should utilize a network TAP as the foundation for complete visibility.

The following are the seven most popular applications for TAPs:

1. Options to Prevent Network Downtime

With a Bypass TAP, you avoid network downtime, as the TAP's only functionality is to provide copies of traffic to the active, inline device. Because of the heartbeat packets included in Bypass TAPs, should you have any issues with the tools, you can easily take that active, inline device offline for testing, updates, and changes while the live network data still flows.

A switch, on the other hand, has to focus on its production network while combating anomalies like DDoS attacks, so if there is an issue with an inline device like a NGFW (next-generation firewall), you would have to take the network down.

2. Update Older Tools

Do you have older monitoring tools that are running at 10G and you are considering 40G or 100G? Rather than purchase updated tools, which can be expensive or unavailable, you can utilize a network TAP with a purpose-built packet broker at the access layer for any-to-any configuration of network speeds. 

3. Take Devices Offline Without Network Interruption

A Bypass TAP can provide copies of traffic to the active, inline device, which can then do their job to combat DDoS attacks, and because of the heartbeat packets included in Bypass TAPs, if you have issues with your tools, you can take that active, inline device offline for testing, updates, and changes without taking down your entire network. 

4. Media/Speed Conversion

Do you have a single-mode, long range cable running between buildings, but the analyzer tool you want to connect to is in the same rack in your network room? Rather than buy an expensive transceiver, a network TAP can handle the media conversion for you.

5. Lawful Intercept

Do you need to prove evidentiary chain of custody for a court case? Unlike SPAN ports, a TAP can be used to prove that no packets were dropped during the lawful intercept process, but make certain the network TAPs are CALEA approved to ensure all data arrives at the monitoring or analyzer tool, and that it wasn't hacked.  

6. Connect Multiple Monitoring Tools

Do you have multiple monitoring devices to analyze your network? With an aggregator TAP, 100% full duplex traffic is captured in both directions and sent out of two monitoring ports, enabling the ability to send your traffic from that point in your network to Wireshare and an APM.

7. Visibility In to Your Network

Using a network test access point provides complete visibility into your network, allowing you to see every packet of data flowing in and out of your network. With a visibility point in your network, you can analyze e-commerce and web server traffic, VoIP and real-time communication applications.

Chris Bihary is CEO and Co-Founder of Garland Technology
Share this

The Latest

April 18, 2019

A vast majority of organizations are still unprepared to properly respond to cybersecurity incidents, with 77% of respondents indicating they do not have a cybersecurity incident response plan applied consistently across the enterprise, according to The 2019 Study on the Cyber Resilient Organization, a study conducted by the Ponemon Institute on behalf of IBM ...

April 17, 2019

People and businesses today make mistakes similar to Troy, when they get too enamored by the latest, flashiest technology. These modern Trojan Horses work through their ability to "wow" us. Cybercriminals find IoT devices an easy target because they are the cool new technology on the block ...

April 16, 2019

Software security flaws cause the majority of product vulnerabilities, according to the 2019 Security Report from Ixia's Application and Threat Intelligence (ATI) Research Center ...

April 15, 2019

The majority of organizations (nearly 70 percent) do not prioritize the protection of the applications that their business depend on — such as ERP and CRM systems — any differently than how low-value data, applications or services are secured, according to a new survey from CyberArk ...

April 12, 2019

While 97 percent of organizations are currently undertaking or planning to undertake digital transformation initiatives, integration challenges are hindering efforts for 84 percent of organizations, according to the 2019 Connectivity Benchmark Report from MuleSoft ...

April 11, 2019

Companies have low visibility into their public cloud environments, and the tools and data supplied by cloud providers are insufficient, according to The State of Public Cloud Monitoring, a report sponsored by Ixia ...

April 10, 2019

Without improvement in time and budget constraints, the majority of tech pros (75 percent) say they will be unable to confidently manage future innovations, according to IT Trends Report 2019: Skills for Tech Pros of Tomorrow, a new report from SolarWinds. This reality ultimately puts businesses at risk of performance and competitive advantage losses, making the prioritization of skills and career development for tech pros paramount ...

April 09, 2019

Tech pros have one foot grounded in today's hybrid IT realities while also setting their sights on emerging technology, according to IT Trends Report 2019: Skills for Tech Pros of Tomorrow ...

April 08, 2019

This Thursday EMA will be presenting a webinar — Automation, AI and Analytics: Reinventing ITSM — covering recent research. There were quite a few surprises. And in fact, many of the surprises indicated a yet-more-positive outlook than we expected ...

April 05, 2019

Almost three-fourths (69 percent) of organizations have plans to deploy 5G by 2020, according to a new 5G use case and adoption survey by Gartner. Organizations expect 5G networks to be mainly used for IoT communications and video, with operational efficiency being the key driver ...