Monitoring the flow of data in a network

By using both physical and virtual TAPs at key nodes, as well as Bypass TAPs for added
security, you will get a comprehensive, real-time picture of your whole network.

X