Darktrace and Garland Technology Collaborate to Help Businesses Secure Operational Technology Environments

PRESS RELEASE. CAMBRIDGE, England, Jan. 24, 2024 /PRNewswire/ - Darktrace, a global leader in cyber security AI, and Garland Technology, a leading manufacturer of network TAP, aggregator, packet broker, data diode and inline bypass solutions, today announced a new collaboration to help businesses protect complex industrial environments.
This collaboration brings Darktrace/OT™ and Garland Technology's network visibility solutions together, offering fast, seamless deployments and more complete network visibility in operational technology environments.
Security risks in industrial environments and critical infrastructure continue to rise.
The increasing monetization of OT attacks, exposure of Industrial Control Systems to open networks, and convergence with IT is heightening opportunities for threat actors.
Together, Garland's Network TAPs and Aggregators and Darktrace/OT are designed to quickly enable visibility and security across OT, IT, and IIoT networks to Purdue level 1.
Using Garland's network TAP solutions with Darktrace minimizes deployment challenges with little to no additional configuration required in complex industrial environments, quickly illuminates points of IT and OT convergence, provides unidirectional traffic flow, and detects potential threats to keep data and environments secure.
As no connection to the Internet is required, Darktrace/OT functions within air-gapped or highly segmented networks without jeopardizing their integrity.
Garland Technology's network TAP solutions create a foundation of visibility for network management, allowing secure access and monitoring of network traffic.
Garland's solutions are uniquely designed for industrial networks.
When deployed, a Garland Technology network TAP will pass all network traffic from the tapped network link to the Darktrace appliance for analysis, without interrupting business operations.
Many of Garland's TAP and Aggregator solutions include built-in data diode technology, which enforces one-way data flow from a network segment to a monitoring destination to reduce the risk of remote attacks, DDoS attacks, malware, and ransomware from external networks.
When used with Darktrace/OT, this makes it easier to deploy, provides increased network visibility and confidence that network traffic is unidirectional and secured.
Learn more about how Garland Technology and Darktrace/OT can be applied to help protect industrial environments by reading the solution brief here.
ABOUT DARKTRACE. Darktrace, a global leader in cyber security artificial intelligence, is on a mission to free the world of cyber disruption.
Rather than study attacks, Darktrace's technology continuously learns and updates its knowledge of your business data and applies that understanding to optimise your state of optimal cyber security.
Darktrace's cyber AI technology provides a full lifecycle approach to cyber resilience across the entire organisation that can autonomously spot and respond to novel in progress threats within seconds.
Darktrace employs over 2,300 people around the world and protects approximately 9,200 customers globally from advanced cyber threats.
ABOUT GARLAND TECHNOLOGY. Garland Technology is an industry leader of IT and OT network solutions for enterprise, critical infrastructures, and government agencies worldwide.
Since 2011, Garland Technology has been engineering and manufacturing simple, reliable, and affordable Network TAPs and Network Packet Brokers in Richardson, Texas.
For help identifying the right IT/OT network visibility solutions for projects large and small, or to learn more about the inventor of the first bypass technology, visit GarlandTechnology.com.


This Cyber News was published on www.darkreading.com. Publication date: Thu, 25 Jan 2024 00:00:35 +0000


Cyber News related to Darktrace and Garland Technology Collaborate to Help Businesses Secure Operational Technology Environments

Darktrace and Garland Technology Collaborate to Help Businesses Secure Operational Technology Environments - PRESS RELEASE. CAMBRIDGE, England, Jan. 24, 2024 /PRNewswire/ - Darktrace, a global leader in cyber security AI, and Garland Technology, a leading manufacturer of network TAP, aggregator, packet broker, data diode and inline bypass solutions, today ...
1 year ago Darkreading.com
25 Best Managed Security Service Providers (MSSP) - 2025 - Pros & Cons: ProsConsStrong threat intelligence & expert SOCs.High pricing for SMBs.24/7 monitoring & rapid incident response.Complex UI and steep learning curve.Flexible, scalable, hybrid deployments.Limited visibility into endpoint ...
1 month ago Cybersecuritynews.com
Darktrace Announces Acquisition by Thoma Bravo - 1, 2024 /PRNewswire/ -- Darktrace, a global leader in cybersecurity AI, has today announced the completion of its acquisition by Thoma Bravo, a leading software investment firm, for $5.3bn. The recommended cash acquisition was announced on 26 April ...
10 months ago Darkreading.com
Securing Remote Work: A Guide for Businesses - This article aims to provide businesses with a comprehensive guide to securing remote work, covering the essential components of remote work security policies and exploring best practices for ensuring secure communication. By implementing these ...
1 year ago Securityzap.com
Cybersecurity Training for Small Businesses - The importance of cybersecurity training for small businesses cannot be overstated in today's increasingly digital world. In conclusion, cybersecurity training is essential for small businesses to protect themselves against cyber threats. There are ...
1 year ago Securityzap.com
20 Best Inventory Management Tools in 2025 - inFlow Inventory is a comprehensive inventory management tool designed for small to medium-sized businesses, offering features like real-time stock tracking, order management, and barcode scanning to streamline operations. The tool provides advanced ...
1 week ago Cybersecuritynews.com
Exploring Technology in Classroom Learning - This article aims to explore the effective utilization of technology to enhance classroom learning experiences. Technology plays a crucial role in facilitating effective and engaging learning experiences in the classroom. With the advancement of ...
1 year ago Securityzap.com
Cloud Security Best Practices for Businesses - In today's digital landscape, ensuring robust cloud security is a crucial priority for businesses. The increasing reliance on cloud services to store and process sensitive data necessitates organizations to adopt best practices to safeguard their ...
1 year ago Securityzap.com
The Top 6 Cybersecurity Threats Businesses Must Tackle in 2024 - Through the rise of Artificial Intelligence, increased cyberwarfare and new emerging technologies, the security landscape has evolved significantly, with new threats emerging and existing ones growing in sophistication. Cybersecurity in 2024 is more ...
1 year ago Cybersecurity-insiders.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
1 year ago Esecurityplanet.com
How Secure Cloud Development Replaces Virtual Desktop Infrastructures - The need to secure corporate IT environments is common to all functions of organizations, and software application development is one of them. Development environments have notoriously complex setups and often require significant maintenance because ...
1 year ago Feeds.dzone.com
New ISC Security Patches Released for 2021: What You Need to Know - The Internet Systems Consortium (ISC), the largest provider of open-source Internet infrastructure software, has released new security patches designed to mitigate data breaches and other cyber threats. These new security patches, released in January ...
2 years ago Thehackernews.com
25 Best Cloud Service Providers (Public and Private) in 2025 - Oracle Cloud offers a variety of services, including infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS), to help organizations build, deploy, and run applications in the cloud. Oracle Cloud is a cloud ...
3 months ago Cybersecuritynews.com
Managing the Requirements of a MultiCloud System - The use of digital technology has advanced to include cloud computing in the delivery of services, cost reduction, increased agility, and improved security. The emergence of various cloud solutions has led organizations to move their assets from ...
2 years ago Blog.isc2.org
FCC adopts lead generation rules to protect consumer privacy - The Federal Communications Commission adopted rules for the Telephone Consumer Protection Act that aim to protect consumers against robocalls and robotexts from lead generation and comparison shopping websites and give consumers the ability to choose ...
1 year ago Techtarget.com
How A Strong Digital Culture Is the Foundation For Successful Metaverse Exploration - Businesses must become digital-first to understand the emerging realm of the metaverse and develop the innovations that will drive success there. A growing number of companies are shifting their strategies to include engaging with consumers in the ...
1 year ago Cyberdefensemagazine.com
Third Of European Businesses Have Adopted AI, AWS - AWS finds AI already adopted at sizeable number of European businesses, resulting in increased revenues, productivity. An insight into the adoption rate of artificial intelligence within the business community has been offered in a new report from ...
1 year ago Silicon.co.uk
What is Word Unscrambler In Gaming? - Are you tired of getting stuck on those tricky word puzzles in your favourite mobile game? Have you ever wished for a tool to help unscramble those seemingly impossible words? Look no further because the word unscrambler is here to save the day! This ...
2 years ago Hackread.com
10 Best ZTNA Solutions (Zero Trust Network Access) in 2025 - Google BeyondCorp Enterprise delivers Zero Trust security through a cloud-native platform, enabling secure access to applications without VPNs. Check Point ZTNA is a leading Zero Trust solution designed for organizations seeking comprehensive, ...
1 month ago Cybersecuritynews.com
Hackers exploit SAP NetWeaver bug to deploy Linux Auto-Color malware - According to the latest research by Darktrace, the threat actors behind Auto-Color exploit CVE-2025-31324, a critical vulnerability in NetWeaver that allows unauthenticated attackers to upload malicious binaries to achieve remote code ...
1 week ago Bleepingcomputer.com CVE-2025-31324
Cyber Insurance for Businesses: Navigating Coverage - To mitigate these risks, many businesses opt for cyber insurance. With the wide range of policies available, navigating the world of cyber insurance can be overwhelming. In this article, we will delve into the complexities of cyber insurance and ...
1 year ago Securityzap.com
Content Delivery Network FAQs - Content Delivery Networks have become increasingly popular among businesses of all sizes in recent years. They offer a host of benefits to businesses, which can help to aid the smooth running of operations and boost reputation, efficiency, ...
2 years ago Hackread.com
Accenture and SandboxAQ Collaborate to Help Organizations Protect Data - PRESS RELEASE. NEW YORK; Jan. 16, 2024 - Accenture and SandboxAQ are partnering to deliver artificial intelligence and quantum computing solutions to help organizations identify and remediate cybersecurity vulnerabilities. According to recent ...
1 year ago Darkreading.com
8 Strategies for Defending Against Help Desk Attacks - COMMENTARY. Defensive security techniques often lag offensive attack tactics, opening companies to heightened risk from rapidly evolving threats. An alarming case in point is the help desk, one of today's most exposed organizational Achilles' heels. ...
1 year ago Darkreading.com
Biometric Security in Educational Environments - Biometric technology has gained significant attention in recent years as a potential solution to enhance security in educational environments. The adoption of biometric security in educational settings raises important privacy and ethical concerns. ...
1 year ago Securityzap.com