Gigamon

Network TAPs

Obtain broad, reliable access to 100 percent of your traffic with a network TAP.

Understanding network TAP/network TAP devices

A network TAP (test access point; sometimes also called an “ethernet TAP”) is an external monitoring device that mirrors the traffic that is passing between network nodes. A network TAP can be a hardware device or virtual (G-vTAP agentless G-vTAP VM) inserted at a strategic point in the network or public and private cloud to monitor specific data. Because they are more effective, efficient and reliable, network TAPs are generally preferred over switch port analyzers (SPANs).

As part of the Gigamon Visibility and Analytics Fabric™, network TAP technology provides access to the traffic required to secure, monitor and manage your network infrastructure continuously and efficiently. Network TAPs are the first step in the process to provide pervasive visibility across the physical, virtual and cloud infrastructure.

Instead of two switches or routers connecting directly to each other, a network TAP sits between the two endpoint devices connected directly to each of them. Then traffic is seen and copied, providing visibility into the networked traffic. Network TAPs capture data and forward it to the Gigamon Visibility and Analytics Fabric (physical nodes) or V Series (virtual nodes) for aggregation, filtering and application of traffic intelligence before distributing the data to the network and security tools.

  • Passive optical TAPs
  • Active network TAPs
  • Virtual agent G-vTAPs

Passive fiber optical TAPs create perfect copies of all traffic at full bandwidth. They require no power or management and do not actively interact with other components of the network. Gigamon offers several passive optical TAP solutions.

WHITEPAPER
TAP vs SPAN

TAP and SPAN technologies provide direct access to the actual packets — but which is the preferred…

PDF, 4 pages

GUIDE

Definitive guide to NGNPB

How to harness the power of unprecedented network visibility.

PDF, 74 pages

ANALYST REPORT

2019 Cyberthreat defense report

See what 1,200 of your peers are doing to address cyberthreat challenges and concerns.

PDF, 50 pages

Technology partners

Get the most from your tools.

Tempest Telecom and our partners seek to provide the most flexible and efficient joint solutions that allow you to maximize the effectiveness of your investment.

Clemson Univ

My highest priority was finding a solution that allowed us to watch more than the ocean of data passing at the network border, that allowed us to sharpen our focus on the data we care about most. Now, we feel more comfortable that were not missing traffic and are better able to highlight and inspect traffic of interest to reduce false positives and optimize inline security tool performance."

John Hoyt • Security Information and Operations Director • Clemson University
Speak to a Tempest Gigamon Specialist

First Name
required
Last Name
required
Job Title
required
Phone
required
Email
required
Question(s)/Comment(s)

Related information