Latest Blog Posts

Newsletter

For a Free Quote...

Telnet Network News

Telnet Network News - We'll keep you up to date with what's happening in the industry.

Key Factors in NCCM and CMDB Integration - Part 1 Discovery

Part I Discovery “I am a rock, I am an Island…” These lyrics by Simon and Garfunkel pretty appropriately summarize what most IT companies would like you to believe about their products. They are islands that stand alone and don’t need any other products to be useful. Well, despite what they want, the truth is closer to the lyrics by the Rolling Stones – “We all need someone we can lean on”. Music history aside, the fact is that interoperability and integration is one of the most important keys t...
Continue reading
  2128 Hits
  0 Comments
2128 Hits
0 Comments

Rogers Set to ‘Ignite’ Gigabit Rollout in Toronto; 4m Homes to be Covered by End-2016

Rogers Communications, Canada’s second largest broadband provider by subscribers, has confirmed that the rollout of its planned 1Gbps internet service will commence this year in downtown Toronto and the Greater Toronto Area (GTA). Parts of the city earmarked for coverage include: Harbourfront, Cabbagetown, Riverdale, King Street West, Queen Street West, the Financial District, the Discovery District, Yonge & Bloor, Vaughan, Markham, Richmond Hill, Pickering, Ajax and Whitby. By the end of 20...
Continue reading
  4126 Hits
  0 Comments
4126 Hits
0 Comments

Cyber Attacks – Businesses Held for Ransom in 2015

Really nice crisp clear morning here in Galway, bit chilly though. Before I dropped my 14 year old son to school, I tuned into an Irish station, NewsTalk and caught most of a very interesting conversation between a member of a large Irish law firm, William Fry and the presenter. They were discussing the increasing threat of cyber-attack for Irish businesses . They spoke about the importance of detection as 43% of business are not even aware that they are being attacked and the hackers can have a...
Continue reading
  960 Hits
  0 Comments
960 Hits
0 Comments

Telus Reveals CAD1 Billion Vancouver FTTH Project

Western Canada’s largest telco Telus Communications has announced a plan to invest an additional CAD1 billion (USD760 million) to connect the majority of homes and businesses in the city of Vancouver directly to the company’s fibre optic network over the next five years. In a release on the quadruple-play operator’s website, CEO Darren Entwhistle said that the rollout in the British Columbian city would add more than 400,000 homes, businesses, hospitals, community centres and municipal offices t...
Continue reading
  1657 Hits
  0 Comments
1657 Hits
0 Comments

Benefits of Network Security Forensics

The networks that your business operates on are often open and complex. Your IT department is responsible for mitigating network risks, managing performance and auditing data to ensure functionality. Using NetFlow forensics can help your IT team maintain the competitiveness and reliability of the systems required to run your business. In IT, network security forensics involves the monitoring and analysis of your network's traffic to gather information, obtain legal evidence and detect network in...
Continue reading
  1252 Hits
  0 Comments
1252 Hits
0 Comments

Tracking the Evolution of UC Technology

Defining unified communications is more complicated than it seems, but a thorough understanding of UC technology is required before informed buying decisions can be made. Not only is the UC value proposition difficult to articulate, but it involves multiple decisions that impact both the IT group and end users. In brief, UC is a platform that seamlessly integrates communications applications across multiple modes -- such as voice, data and video -- and delivers a consistent end-user experience a...
Continue reading
  1167 Hits
  0 Comments
1167 Hits
0 Comments

Detecting XCodeGhost Activity By Monitoring HTTP Traffic

Apple is presently working on issues with malware (XCodeGhost) in their App Store. According to this blog post , over 50 iOS apps contained malicious code that made iPhones and iPads part of a botnet that stole potentially sensitive user information including: Application name Application version OS version Language Country Developer info Application installation type Device name Device type One of the quick ways to check for suspicious activity on your network is to look for HTTP or DNS traffic...
Continue reading
  1206 Hits
  0 Comments
1206 Hits
0 Comments

The State of Enterprise Security Resilience - An Ixia Research Report

Ixia , an international leader in application performance and security resilience technology, conducted a survey to better understand how network security resilience solutions and techniques are used within the modern enterprise. While information exists on security products and threats, very little is available on how it is actually being used and the techniques and technology to ensure that security is completely integrated into the corporate network structure. This report presents the researc...
Continue reading
  1284 Hits
  0 Comments
1284 Hits
0 Comments

5 Reasons Why You Must Back Up Your Routers and Switches

I’ve been working in the Network Management business for over 20 years, and in that time I have certainly seen my share of networks. Big and small, centralized and distributed, brand name vendor devices in shiny datacenters, and no-name brands in basements and bunkers. The one consistent surprise I continue to encounter is how many of these organization (even the shiny datacenter ones) lack a backup system for their network device configurations. I find that a little amazing, since I also can’t ...
Continue reading
  1042 Hits
  0 Comments
1042 Hits
0 Comments

NetFlow Auditor - Best Practices for Network Traffic Analysis Webinar

In this Webinar John Olson, from  NetFlow Auditor , discusses the top 10 Best Practices for using Netflow data to analyse, report and alert on multiple aspects of Network traffic. These best practices include: Understanding where is the best place in your network to collect netflow data from How long you should retain your flow data Why you should archive more than just the top 100 flows When static thresholds should be replaced by adaptive thresholds More... Thanks to NetFlow Auditor for t...
Continue reading
  1666 Hits
  0 Comments
1666 Hits
0 Comments

CIO Review - Infosim Unified Solution for Automated Network Management

CIO Review 20 Most Promising Networking Solution Providers Virtualization has become the life blood of the networking industry today. With the advent of technologies such as software-defined networking and network function virtualization, the black box paradigm or the legacy networking model has been shattered. In the past, the industry witnessed networking technology such as Fiber Distributed Data Interface (FDDI), which eventually gave way to Ethernet, the predominant network of choice. This p...
Continue reading
  836 Hits
  0 Comments
836 Hits
0 Comments

Sapling’s Master Clock – Leader of the Pack – Part 2

In continuing with our post explaining how Sapling’s master clocks can receive time, the second option a user has to receive time is through a GPS Receiver. Receiving time from a GPS satellite is not only extremely accurate, it is also very secure. With the GPS Receiver, the facility does not have to go outside the facility’s established firewall and use a time source via the Internet. A GPS receiver is built-in to the master clock and sends out the master clock’s exact location to satellites ar...
Continue reading
  4014 Hits
  0 Comments
4014 Hits
0 Comments

NetFort 12.4 – Network Traffic and Security Monitoring

New Version of NetFort LANGuardian Provides Customers with a Single Point of Reference for Network Traffic and Security Monitoring. NetFort , a leading provider of network traffic and security monitoring (NTSM) solutions, today unveiled version 12.4 of the LANGuardian application. The new version ensures network teams today have the visibility required to collaborate and work with their security colleagues and manage the daily security issues prevalent in today’s world. Version 12.4 includes a n...
Continue reading
  1710 Hits
  0 Comments
1710 Hits
0 Comments

3 Reasons for Real Time Configuration Change Detection

So far, we have explored what NCCM is, and taken a deep dive into device policy checking – in this post we are going to be exploring Real Time Configuration Change Detection (or just Change Detection as I will call it in this blog). Change Detection is the process by which your NCCM system is notified - either directly by the device or from a 3rd party system that a configuration change has been made on that device. Why is this important? Let’s identify 3 main reasons that Change Detection is a ...
Continue reading
  4149 Hits
  0 Comments
4149 Hits
0 Comments

Xplornet Explores IPO, Sources Say

Bloomberg reports that Canadian rural broadband specialist Xplornet Communications is working with Bank of Montreal and Royal Bank of Canada on an initial public offering (IPO) planned for this year, according to anonymous sources with knowledge of the matter who added that the New Brunswick-based fixed-wireless ISP has not yet decided on the stake size or price range. In May Xplornet’s management expressed the desire to examine new ways to continue growing, including a potential IPO, after reve...
Continue reading
  1713 Hits
  0 Comments
1713 Hits
0 Comments

The Importance of State

Ixia recently added passive SSL decryption to the ATI Processor (ATIP) . ATIP is an optional module in several of our Net Tool Optimizer (NTO) packet brokers that delivers application-level insight into your network with details such as application ID, user location, and handset and browser type. ATIP gives you this information via an intuitive real-time dashboard, filtered application forwarding, and rich NetFlow/IPFIX. Adding SSL decryption to ATIP was a logical enhancement, given the increasi...
Continue reading
  1734 Hits
  0 Comments
1734 Hits
0 Comments

Virtualization Visibility

See Virtual with the Clarity of Physical The cost-saving shift to virtualization has challenged network teams to maintain accurate views. While application performance is often the first casualty when visibility is reduced, the right solution can match and in some cases even exceed the capabilities of traditional monitoring strategies. Virtual Eyes Network teams are the de facto “first responders” when application performance degrades. For this reason, it’s critical to maintain visibility into a...
Continue reading
  945 Hits
  0 Comments
945 Hits
0 Comments

Don’t Miss the Forest for the Trees: Taps vs. SPAN

These days, your network is as important to your business as any other item—including your products. Whether your customers are internal or external, you need a dependable and secure network that grows with your business. Without one, you are dead in the water. IT managers have a nearly impossible job. They must understand, manage, and secure the network all the time against all problems. Anything less than a 100 percent working network is a failure. There is a very familiar saying: Don’t miss t...
Continue reading
  1390 Hits
  0 Comments
1390 Hits
0 Comments

How Hiring Employees Increases Your Chance of a Ransomware Attack

It seems like a strange combination, employee hiring and Ransomware but there is a connection. Ransomware is one of the biggest network security issues in today’s world and businesses have paid out tens of millions in ransoms this year. Thankfully a lot more people are aware of the problems it can cause and how it can get into a network. This is making things more difficult for the virus writers but they are a resourceful bunch with a lot of time on their hands. Most people avoid opening attachm...
Continue reading
  1017 Hits
  0 Comments
1017 Hits
0 Comments

A Deeper Look Into Network Device Policy Checking

In our last blog post “ Why you need NCCM as part of your Network Management Platform ” I introduced the many reasons that growing networks should investigate and implement an NCCM solution . One of the reasons is that an NCCM system can help with automation in a key area which is related to network security as well as compliance and availability – Policy Checking . So, in this post, I will be taking a deeper dive into Network Device Policy Checking which will (hopefully) shed some light onto wh...
Continue reading
  860 Hits
  0 Comments
860 Hits
0 Comments

Contact Us

Address:

Telnet Networks Inc.
100 Strowger Blvd, Suite 118, Brockville, ON, K6V 5J9, Canada

Phone:

(800) 561-4019

Fax:

613-498-0075

For More Information about Telnet Networks, our products, or our services, or to request a quote please feel free to contact us directly.