Latest Blog Posts

Newsletter

For a Free Quote...

Freedom Mobile enhances network with 700MHz coverage

Canada's Freedom Mobile has begun enabling its recently-acquired 700MHz spectrum – starting in Calgary – improving network coverage and enhancing indoor LTE signal, its parent Shaw Communications announced in a press release. Shaw closed the acquisition of 700MHz and 2500MHz licences from Quebecor (Videotron) in July 2017, supporting network upgrad...
Continue reading
  69 Hits
  0 Comments
69 Hits
0 Comments

Bypass TAPs - Safety Nets for Your In-line Appliances

​To protect your network against an increasing number of outside threats, you need to place in-line security tools (such as Intrusion Prevention Systems-IPS, or firewalls) that check all the traffic on the network line. This way you have a better chance to counter cyber-attacks before they can do any harm. Find out why cyber-security is the rising ...
Continue reading
  34 Hits
  0 Comments
34 Hits
0 Comments

PREVENT MALWARE SPREADING WITH AUTOMATIC CLIENT ISOLATION USING FLOWMON ADS AND CISCO ISE

Today, threats are not only limited to the internet. Organizations face guests and employees who connect their own equipment into the network or take company equipment home with them. A firewall with IPS capabilities, such as a next generation firewall, is a good first measure to protect against modern day threats, but they will only protect what g...
Continue reading
  96 Hits
  0 Comments
96 Hits
0 Comments

Deciding Which Network TAP to Purchase for Total Network Visibility

Network TAPs (Test Access Points) are the absolute best way to gain access to network traffic, whether that be for network visibility solutions, network monitoring infrastructure, or network security auditing. It is common at a certain point in an organization's growth for it to be recognized that mirror ports and SPAN (Switch Port ANalyzer) ports,...
Continue reading
  82 Hits
  0 Comments
82 Hits
0 Comments

Position, Navigation, and Timing: Assured, but Affordable?

As GNSS increasingly becomes a single point of failure in a multitude of civil and military systems, the need for Assured Position, Navigation, and Timing (A-PNT) is well documented. Much of the current discussion centers on the technical challenge of maintaining ready access to accurate PNT data, but cost is also a factor. Consider, for example, t...
Continue reading
  96 Hits
  0 Comments
96 Hits
0 Comments

Four Things to Consider Before You Move Everything to the Cloud

 Organizations everywhere are moving pieces, if not all, of their workloads to public clouds. This is understandable as there are some clear benefits to this strategy. At the same, a public cloud instance does not work the same way as a physical on-premises network does. This means that when you make your move to the cloud, you need to underst...
Continue reading
  100 Hits
  0 Comments
100 Hits
0 Comments

MONITOR USER BEHAVIOUR TO DETECT INSIDER THREATS

The risk of Insider Threats has grown massively with attackers getting around the increasingly complex perimeter protection of Enterprise organisations. It is one of the most common ways customer data or industrial and trade secrets are leaked. This very complex topic includes countless types and techniques. Let us see how such behaviour could be d...
Continue reading
  113 Hits
  0 Comments
113 Hits
0 Comments

Northwestel launching faster, cheaper internet in Nunavut next month

Northwestel – part of Bell Canada Enterprises (BCE) – will triple its fixed internet speeds and double its monthly data volume caps for residential users whilst slashing costs of existing services in Iqaluit on 1 October 2018, reports Nunatsiaq News. The new broadband service, branded 'Tamarmik Nunaliit', will be rolled out to all other communities...
Continue reading
  101 Hits
  0 Comments
101 Hits
0 Comments

Best practices to protect your VoIP network

  Many business executives share important information on VoIP and therefore you want to keep your VoIP network safe. Enterprise VoIP customers and service providers are vulnerable to many inherent security risks compared to the traditional telephone and cellular services. These security issues are the biggest threats. Whether it is providing ...
Continue reading
  121 Hits
  0 Comments
121 Hits
0 Comments

Making Time Sensitive Networks Resilient Against Threats: Recent Advances

Today's time sensitive networks rely on available and accurate positioning, navigation and timing (PNT) signals to provide leaders with the information required to make timely and effective decisions. The proliferation of GNSS-degrading and denying devices across state and non-state actors put this critical information capability in jeopardy. Learn...
Continue reading
  128 Hits
  0 Comments
128 Hits
0 Comments

Freedom Mobile expands VoLTE availability

  Canada's fourth largest cellco Freedom Mobile, a subsidiary of Shaw Communications, last week expanded the availability of VoLTE services to additional smartphones including the Samsung Galaxy S9/S9+ and the LG V30/Q6/Q Stylo+/X Power 3, having initially launched VoLTE in mid-August (supported by LG G6/G7 phones, and Samsung Galaxy S8/S8 Plu...
Continue reading
  116 Hits
  0 Comments
116 Hits
0 Comments

Network Security Resilience Reduces Breach Risk and Cost

 It has been stated many times that for most companies it's not a question of IF you will be breached, but WHEN. The good news is that being forewarned makes you forearmed. So now that you know, what will you do about it? Doing nothing won't help your company and it won't help your career either. Common wisdom says that you should invest milli...
Continue reading
  112 Hits
  0 Comments
112 Hits
0 Comments

Bell completes acquisition of Axia NetMedia, takes full control of Alberta SuperNet

Bell Canada Enterprises (BCE) yesterday completed its acquisition of Axia NetMedia Corporation, the Calgary-based operator of SuperNet, the Alberta broadband network connecting thousands of provincial and municipal offices, Indigenous communities, schools, libraries, healthcare institutions, businesses and ISPs throughout the province. In addition ...
Continue reading
  140 Hits
  0 Comments
140 Hits
0 Comments

The Unexpected Benefits Of Contact Center Load Testing Setup

 A re you launching a new contact center and thinking of running a load test to make sure it works? Load Testing is not just about throwing 100 or 1,000 or even 10,000 calls at a solution to see what happens. That's taking the "let's see if this breaks it!" approach, and like I've mentioned before, that becomes a self-fulfilling prophecy. Many...
Continue reading
  162 Hits
  0 Comments
162 Hits
0 Comments

Report on Traffic Between a Certain Source IP and Destination IP Address

Reporting on traffic between network devices   Recently one of our customers got in contact with this simple query. "I am looking to find out if it's possible to get traffic between a certain source IP and destination IP along with the time of the connections." They needed a historical report so there was no point in launching a tool like Wire...
Continue reading
  150 Hits
  0 Comments
150 Hits
0 Comments

DEFENDING NETWORKS WITH "BEST OF BOTH WORLDS"

 More and more organisations are struggling to keep up with the rapid IT developments and the increasing number of attacks. One thing is for sure, neither are going to get any less. That is why it is important to implement a strategy and solutions that are flexible and scalable in order to continuously anticipate changes. In terms of secu...
Continue reading
  181 Hits
  0 Comments
181 Hits
0 Comments

How Much Would You Pay for Free Software?

In the past few years, open-source software (OSS) has experienced a real boom. Driven from its free availability and the spirit of dedicated communities, OSS managed to spread like a wildfire and made its way into various sectors: healthcare, science, engineering, and the food industry, just to name a few. It is no wonder as the benefits are tempti...
Continue reading
  180 Hits
  0 Comments
180 Hits
0 Comments

Network Security Conference Data Connectors – September 6, 2018

  Come join Telnet Networks and ProfiTap at Data Connectors in Montreal being held at Hotel Omni Mont-Royal on September 6 th . This Cyber Security Conference will feature vendor displays and educational speakers discussing current cyber-security issues such as cloud security, email security, VoIP, LAN Security, wireless security and more. We ...
Continue reading
  172 Hits
  0 Comments
172 Hits
0 Comments

Firewall Configuration/Network Configuration and Change Management (NCCM)

Turn on any "techy" TV show or movie these days and you are bound to see some reference to hackers trying to break into corporate or government networks by breaching firewalls. While many of the scenarios are unrealistic as they are portrayed onscreen, the real-life battle between security vendors and hackers does go on. In their effort to defeat t...
Continue reading
  167 Hits
  0 Comments
167 Hits
0 Comments

VIAVI'S State of the Network Study 2018

As hybrid IT migration escalates, 65 percent of IT teams are responsible for resolving cloud issues, according to 11th annual State of the Network Study. ​ VIAVI released the results of its 11th annual State of the Network global study. Findings demonstrate that a significant portion of enterprise IT teams are unsure how to handle cloud migration c...
Continue reading
  179 Hits
  0 Comments
179 Hits
0 Comments

Contact Us

Address:

Telnet Networks Inc.
100 Strowger Blvd, Suite 118, Brockville, ON, K6V 5J9, Canada

Phone:

(800) 561-4019

Fax:

613-498-0075

For More Information about Telnet Networks, our products, or our services, or to request a quote please feel free to contact us directly.