Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Hardware

Hall 9 / Booth Number 9-435

Network TAPs

Video

south_east

Key Facts

  • High Quality: Stress tested with live network data
  • Provide unidirectional packet visibility
  • Active TAPs incorporate packet broker functionality

Product Description

 

Garland Technology’s network TAPs make full duplex copies of network data without affecting network traffic, providing the complete visibility that high-performance monitoring and security solutions require. Garland Technology’s network TAPs include: Breakout Network TAPs: Passive Fiber and Copper Network TAPs ensure no packet loss, providing monitoring tools complete visibility. Aggregator TAPs: Send full duplex traffic to multiple monitor appliances to analyze your network and can accommodate, 2:1, 4:1, and up to 11 links to 1. And also includes media conversion and FieldTAP Monitoring on USB. XtraTAP: All-In-1 network TAPs and XtraTAP: Packet Brokers provide unparalleled functionality, combining network TAPs with high density packet brokers, incorporating TAP visibility with filtering, aggregation and load balancing. Data Diodes Network TAPs provide unidirectional TAP visibility for out-of-band monitoring, specifically designed not to send traffic back onto the network. There is no physical connection between the Data Diode monitoring ports and the network, eliminating any possible intrusion from the destination.

... read more

Watch our product video

external video thumbnail
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.