Latest Blog Posts

Newsletter

 

For a Free Quote...

Telnet Network News

Telnet Network News - We'll keep you up to date with what's happening in the industry.

Huawei supports Ice Wireless 4G upgrade in Inuvik

Ice Wireless has partnered with Huawei to deliver 4G LTE mobile services to the town of Inuvik in the Northwest Territories, reports Canadian news site MobileSyrup. Services will be functional by the end of June 2019. Samer Bishay, CEO of Ice Wireless, said: 'Our collaborative launch with Huawei to offer 4G LTE in Inuvik will be the stepping stone ...
Continue reading
  118 Hits
  0 Comments
118 Hits
0 Comments

Webinar - Do You Have a Strategy for IoT?

 When Thursday, June 27th, 2019 at 2pm EST Due to the popular demand of our IoT webinar in March, we have decided to run another for those who could not make the first.  Join us on Thursday June 27th @ 2pm EST for an in-depth look at how our customers are using NMSaaS to monitor and report on all kinds of new data outside of the tradition...
Continue reading
  129 Hits
  0 Comments
129 Hits
0 Comments

All You Need to Know About the Network Packet Brokers

​ The last decade experienced an overwhelming increase in network size, bandwidth, and traffic. IT companies were, therefore, forced to adapt by developing the next-generation of security and network monitoring tools. This new wave of tools exposed a greater need for advanced network visibility, one that traditional data center monitoring devices c...
Continue reading
  217 Hits
  0 Comments
217 Hits
0 Comments

How to Optimize Your Security Defenses

​As I mentioned in a blog a couple of months ago, there is an absolute myriad of security architectures and techniques available to the enterprise IT professionals. These strategies all have pros and cons. Lets look at one of the most common ones-a defensive approach. Everyone in the security arena is familiar with this concept. It is sometimes tho...
Continue reading
  205 Hits
  0 Comments
205 Hits
0 Comments

An Inline Security Primer

​Anyone in network security knows that it is a complicated and involved process. The clear goal is to prevent security breaches. How do you go about that though? There are so many schools of thought, methods, and configurations. Here are just a few examples: Cyber range training Cyber resilience Defense in depth Encryption Endpoint security Firewal...
Continue reading
  314 Hits
  0 Comments
314 Hits
0 Comments

Network Flow Monitoring: The ABCs of Network Visibility

​This is another in a series of blogs on the important concepts of network management. Today's topic is flow monitoring. A network flow is the series of messages exchanged between the opening and closing of a communication session. Flow data is used by tools like network flow analyzers and flow collectors to generate insight into network performanc...
Continue reading
  254 Hits
  0 Comments
254 Hits
0 Comments

Network Security Works Only If You See The Right Traffic

Security is nowadays an important part of network management . Secure networks are vital for running an uninterrupted business, preventing data loss and maintaining the overall image of the business. Security challenges are increasing because networking is getting more complex, more dynamic and virtual. The existing approach of network visibility l...
Continue reading
  272 Hits
  0 Comments
272 Hits
0 Comments

How to Detect if a Rootkit Compromised Your System

​ The importance of having a quality network test access port (TAP) when conducting Digital Forensics and Incident Response (DFIR) has been covered in a white paper by Profitap, titled " Special Tool for Special Forces: Tapping into real-time threats in the cyberspace ". In addition to the points presented in the white paper, I would like to provid...
Continue reading
  309 Hits
  0 Comments
309 Hits
0 Comments

Network Security Resilience – What Is It?

In a recent webinar, Best Practices for Security Resilience, Jon Oltsik (an analyst from ESG Research Group) and I discussed the topic of network security resilience. The basic concept is that it is not a question of "IF" your company network will be breached, but "WHEN". The real question for you to answer is, "How painful do you want that breach ...
Continue reading
  281 Hits
  0 Comments
281 Hits
0 Comments

What to do when traffic overwhelms your monitoring tools

​ Growing traffic volume is a challenge for NetOps and SecOps as they work to ensure high-quality network performance and network security. As traffic volume exceeds a monitoring tool's capacity, congestion at the data port can cause a tool to slow down, start dropping packets, or even stop working altogether. While you wait for budget approval to ...
Continue reading
  300 Hits
  0 Comments
300 Hits
0 Comments

The Traceability of Time Synchronization: Why Internet Time Isn’t Good Enough

In today's modern networking infrastructure, great care is taken to ensure that networks are reliable, highly available and most of all, secure. Cybersecurity has emerged as a critical area in all facets of the internet. It's an area that companies spend millions on each year. Yet still, there are often-overlooked areas that degrade security. One e...
Continue reading
  302 Hits
  0 Comments
302 Hits
0 Comments

Videotron switches on 5G test site in Montreal

​Quebec-based cableco and mobile operator Videotron and its partners in the Open-Air Laboratory for Smart Living (LabVI) have announced that a 5G testing site is now live in Montreal's Quartier de l'innovation using Ericsson equipment, reports MobileSyrup. The site – utilizing an existing 4G LTE site on the roof of the Ecole de Technologie Superieu...
Continue reading
  413 Hits
  0 Comments
413 Hits
0 Comments

Telus buys Axia rural Albertan consumer operations from Bell

Canadian full-service operator Telus has bought Axia's residential internet services in rural Alberta from Bell Canada, reports VulcanAdvocate.com. Bell purchased Calgary-based Axia's network assets in September last year, and the transaction with Telus follows a 31 March agreement to sell Axia's residential fibre-to-the-premises (FTTP) operations,...
Continue reading
  349 Hits
  0 Comments
349 Hits
0 Comments

How to Improve Enterprise Network Visibility

Network requirements are constantly changing in enterprises. The network goal of every enterprise is to be more efficient and cost-effective while embracing the changes. There are several network visibility solutions/vendors available in the market. However, each network has a different requirement and not solutions fit every network architecture. ...
Continue reading
  321 Hits
  0 Comments
321 Hits
0 Comments

Webinar - Hybrid and Multi - Cloud Integrated IP Address Management from NMSaas

When:  What time: Thursday, May 16th, 2019 2pm  EST  ​Are you using Cloud Integration to manage your IP Addresses? Our Latest version of NMSaaS , now provides new capabilities for IPAM/DNS/DHCP with native integrated support for: Azure DNSA Amazon Route 53 Akamai Fast DNS  ​In this webinar we will discuss: Multiple account suppo...
Continue reading
  306 Hits
  0 Comments
306 Hits
0 Comments

Bell Canada revenues up 2.6% in 1Q19

​ Bell Canada Enterprises (BCE) posted total revenue of CAD5.734 billion (USD4.262 billion)) for the three months ended 31 March 2019, up 2.6% compared to the same period of last year. First-quarter service revenue grew 1.6% to CAD5.045 billion and product revenue increased 10.1% to CAD689 million, reflecting increases at both wireless and wireline...
Continue reading
  351 Hits
  0 Comments
351 Hits
0 Comments

Where Should I Place My TAP?

Two common methods to copy traffic to your monitoring or security tools is a Span port or network tap. Span can be convenient for quick troubleshooting, remote locations or when you do not have access to the physical infrastructure. The risk of using a span port is that It can be over subscribed, and the lowest priority when it comes to forwarding ...
Continue reading
  325 Hits
  0 Comments
325 Hits
0 Comments

Ixia's 2019 Security Report

Welcome to the third annual Security Report issued by Ixia, a Keysight business. Each year, the Ixia Application and Threat Intelligence (ATI) Research Centre summarizes the most interesting and prominent internet security trends. We analyze ATI data to help organizations understand where they can improve. We also analyze the data to predict the bi...
Continue reading
  326 Hits
  0 Comments
326 Hits
0 Comments

Xplornet gets capacity on new Hughes satellite for rural broadband

Canada's leading rural fixed-wireless broadband provider Xplornet has signed a 15-year contract valued at over USD250 million for 50Gbps of Ka-band capacity on the EchoStar XXIV satellite due to be launched by US-based Hughes Network Systems in 2021, to support high speed broadband reaching over 90% of Canadians. According to Hughes' press release,...
Continue reading
  408 Hits
  0 Comments
408 Hits
0 Comments

Canada's Premier IT Security Conference!

 OCT 7-10 2019 ​Welcome to Canada's Premier IT security conference. Telnet Networks and InfoSim® are a proud sponsor of Canada's largest IT Security Conference, SecTor. As a guest of Telnet Networks and Infosim you can use Telnet2019 to get a 10% discount off your full conference ticket to this year's conference. SecTor 2019 takes place in the...
Continue reading
  396 Hits
  0 Comments
396 Hits
0 Comments

Contact Us

Address:

Telnet Networks Inc.
100 Strowger Blvd, Suite 118, Brockville, ON, K6V 5J9, Canada

Phone:

(800) 561-4019

Fax:

613-498-0075

For More Information about Telnet Networks, our products, or our services, or to request a quote please feel free to contact us directly.

Latest Blog Posts

Latest Blog Posts (copy)