Latest Blog Posts

Newsletter

For a Free Quote...

How to Detect RYUK Ransomware on Your Network

What is RYUK Ransomware?  ​An advisory from the US based Department of Health and Human Services notes that attacks involving RYUK appear to be targeted. In fact, its encryption scheme is intentionally built for small-scale operations, so that only crucial assets and resources are infected in each targeted network by a manual distribution from...
Continue reading
  112 Hits
  0 Comments
112 Hits
0 Comments

Global Webinar Day – StableNet® in the Mining Industry

Date: January 31st, 2019  Time: 4:00 pm (GMT +1)  Join Rinat Bedretdinov, Senior Engineer at CROC, and Dmitry Scherbakov, Regional Presales Manager at Infosim®, for a glistening webinar on how our Unified Network and Services Management solution StableNet® can make your business shine. We will illustrate how one of the global top gold pro...
Continue reading
  108 Hits
  0 Comments
108 Hits
0 Comments

Making The Shift to Network Security Resilience

​In the webinar above,the concept of network security resilience and how to implement it is explained. However, successful implementation relies upon making the fundamental mind shift to the strategy. One cannot expect to see the benefits if they don't embrace change. ​However, change is easier said than done. It seems like many security engineers,...
Continue reading
  115 Hits
  0 Comments
115 Hits
0 Comments

Network Traffic Metadata – Four Recent Customer Use Cases

The rising popularity of network traffic metadata is because it's in the sweet spot between full packet capture like Wireshark and PCAPs on one hand and NetFlow on the other, which lacks detail and drill down. Drill down, granularity, context, and continuous internal visibility are now absolutely critical for organizations of all sizes including SM...
Continue reading
  129 Hits
  0 Comments
129 Hits
0 Comments

Building Business Cases for Investing in Network Performance Management

  In today's digital economy, network performance often determines business performance. Unfortunately, many network managers lack the right tools to manage performance. They have an incomplete picture, especially as networks scale and grow in complexity and applications migrate to the cloud. Monitoring service health and network availability ...
Continue reading
  146 Hits
  0 Comments
146 Hits
0 Comments

Adventures of a Network Monitoring Newbie: The Final Network Security Frontier

T he last part of everything is always hard, they say. I suppose it has to do with having to let go. And, in my case, with deciding what to write about or what's the best way to end the series. Lately I've been reading a lot about cybersecurity, and how it affects everybody, on a personal and a professional level. That's how the idea for this last ...
Continue reading
  133 Hits
  0 Comments
133 Hits
0 Comments

APPLICATION DEPENDENCY MAPPING: CRITICAL TO ENSURING BUSINESS AVAILABILITY

In 2013, in a legal case that sent waves through the IT industry, Sears Holding Corp. filed lawsuits against two IT vendors involved in maintaining and providing equipment for the company's data center. Sears alleged that, as a result of multiple power outages and ongoing issues, the company had lost an estimated $2.2 million in profits and another...
Continue reading
  144 Hits
  0 Comments
144 Hits
0 Comments

5 Tips For Monitoring Network Traffic on Your Network

Monitoring traffic on your network is important if you want to keep it secure and running efficiently. The information obtained by network traffic monitoring tools can be used in multiple security and IT operational use cases to identify security vulnerabilities, troubleshoot network issues and analyze the impact new applications will have on the n...
Continue reading
  202 Hits
  0 Comments
202 Hits
0 Comments

Fiber Taps - Y Cables Matter

Passive fiber optic taps are very simple devices. They almost never go wrong. In fact they have MTBF figures calculated in millions of hours. You will certainly die before they will! However Ixia often gets questions from customers of the kind "I've installed your tap, but it does not work - please send me a new one". In almost all cases this is du...
Continue reading
  379 Hits
  0 Comments
379 Hits
0 Comments

Big Three Commit to Lower-Cost Mobile Data

Canada's 'big three' nationwide mobile operators Rogers, Telus and Bell have committed to offer a broad range of lower-cost data-only packages within the next 90 days, the Canadian Radio-television and Telecommunications Commission (CRTC) announced yesterday. The national providers must introduce the monthly plans ranging from 250MB (CAD15 [USD11.2...
Continue reading
  199 Hits
  0 Comments
199 Hits
0 Comments

What Traffic Reports To Focus on if You Are Dealing With Google Unusual Traffic Notifications

 Why does Google sometimes show unusual traffic messages? Recently I worked with a number of network managers who downloaded our LANGuardian software to try and find the source of malware on their networks. The issue they faced was that clients were been presented with the message "Our systems have detected unusual traffic – possibly Malware f...
Continue reading
  191 Hits
  0 Comments
191 Hits
0 Comments

Discover Application Performance Issues Before Your Business Does!

Availability issues. Slow response times. Performance bottlenecks. Also web applications have problems that affect the satisfaction of your employees and customers. Identify and troubleshoot them before they impact your business with Flowmon APM, an agent-less solution to proactively drive user experience and application value.    Applica...
Continue reading
  189 Hits
  0 Comments
189 Hits
0 Comments

SSI Micro improves LTE services via Rogers spectrum tie-up

SSi Micro, a Canadian far-northern wireless broadband operator which trades under the SSi Mobile and QINIQ brands, has teamed up with national cellular giant Rogers Communications to deliver enhanced services to customers in northern Canada, including in Nunavut, Northwest Territories and Yukon. SSi has received a spectrum sub-licence from Rogers t...
Continue reading
  157 Hits
  0 Comments
157 Hits
0 Comments

Webinar - Network Protocol Specialists

Date: Time: December 19, 2018  10:00 am Pacific Time (US ad Canada) Join Mike Pennacchi, where i n this webinar we will cover a number of tips and tricks related to network analysis and troubleshooting. Topics covered this month: Getting in the path of the packets - You can't analyze packets you didn't capture. In this webcast I'll be cov...
Continue reading
  208 Hits
  0 Comments
208 Hits
0 Comments

SNMP: The ABCs of Network Visibility

Network management and monitoring is a large topic. It includes device monitoring and management, device cluster monitoring and management,network monitoring and management, application monitoring and management, problem resolution, and elements of network security as well. In this blog, I wanted to focus on device monitoring. Devices are often ref...
Continue reading
  162 Hits
  0 Comments
162 Hits
0 Comments

Twelve applicants for Canadian 600MHz auction

Innovation, Science & Economic Development Canada has published the final list of twelve applicants for the upcoming national mobile frequency auction in the 600MHz band. Alongside the big three nationwide mobile operators Rogers Communications, Bell Mobility (part of Bell Canada) and Telus, the other nine applicants are: Freedom Mobile (owned ...
Continue reading
  136 Hits
  0 Comments
136 Hits
0 Comments

5% of Your Customer Interactions are Failing!

During a typical month we generate between 500,000 to 600,000 HeartBeat calls, and of these anywhere from 4% to 6% of these calls we encounter availability or performance issue. So, we classified these issues to see where they were coming from: ​ 40% - Issue with answer – busy, ring-no-answer, silence or click 40% - Caller-requested information una...
Continue reading
  134 Hits
  0 Comments
134 Hits
0 Comments

Can Flow Monitoring Work on Encrypted Traffic?

Encrypted traffic is on the rise. It's no longer possible to inspect the content of the communication. What does this mean for network traffic monitoring? Encrypted traffic is on the rise. In 2016, NSS Labs found out that 97% of surveyed enterprises saw an increase in encrypted web traffic. Both Let's Encrypt and Google  currently re...
Continue reading
  159 Hits
  0 Comments
159 Hits
0 Comments

How Resilient PNT is Used in Cybersecurity

Cybersecurity is a hot topic today. Hackers are always looking to undermine our network connections and we are always trying to protect against them.  I'm no cybersecurity expert, but I am often asked, "Can Resilient PNT be used to improve cybersecurity?" Resoundingly, "YES"  Here are a few simple examples:  1. Passwords - Most secur...
Continue reading
  257 Hits
  0 Comments
257 Hits
0 Comments

Candela - LANforge FIRE & ICE 5.3.8 has been Released

Release 5.3.8 adds REST automation API support, improved wave-2 WiFi performance and stability, an improved RF RADAR generator and more. See the Release Notes for more details. Click here for more releases.   New Features & Improvements Release 5.3.8 (November 13, 2018) ​  Support Virtual Router Function (VRF) in kernel 4.16 and highe...
Continue reading
  201 Hits
  0 Comments
201 Hits
0 Comments

Contact Us

Address:

Telnet Networks Inc.
100 Strowger Blvd, Suite 118, Brockville, ON, K6V 5J9, Canada

Phone:

(800) 561-4019

Fax:

613-498-0075

For More Information about Telnet Networks, our products, or our services, or to request a quote please feel free to contact us directly.

Latest Blog Posts

Latest Blog Posts (copy)