Latest Blog Posts

Newsletter

 

For a Free Quote...

Cutting SaaS Troubleshooting Time with Network Performance Metrics

​ With the popularity of SaaS platforms on the rise, network performance metrics become an invaluable tool in the hands of network administrators, who cannot afford to waste time resolving issues that originate outside their network. Office 365, G Suite, Salesforce and many other SaaS platforms are replacing applications operated in-house by IT dep...
Continue reading
  72 Hits
  0 Comments
72 Hits
0 Comments

Bell claims wholesale rate hike will reduce broadband rollout by 200,000 households

​ Bell Canada has released a statement claiming that a regulatory decision to reduce wholesale broadband rates will negatively impact its high speed access network expansion in smaller towns and rural communities, reducing the scope of its current plans in such areas by 20%, or approximately 200,000 households. On 15 August the Canadian Radio-telev...
Continue reading
  78 Hits
  0 Comments
78 Hits
0 Comments

Orolia - Tech Brief Resiliency in PNT: Cybersecurity

Cybersecurity is the watchword of the day, but what does it mean for Positioning, Navigation and Timing (PNT)? For many, the ability to hack or spoof a GPS/GNSS signal is a cybersecurity issue. At Orolia , we agree, which is why we have a wide array of products to augment, toughen and protect against GNSS vulnerabilities. However, the other aspect ...
Continue reading
  112 Hits
  0 Comments
112 Hits
0 Comments

Big operators take a hit as CRTC cuts wholesale broadband rates

The Canadian Radio-television and Telecommunications Commission (CRTC) has ordered the country's large telcos and cablecos to reduce tariffs for wholesale broadband network services charged to smaller ISPs, in a move which it says will 'facilitate greater competition and promote innovative broadband services and more affordable prices for consumers...
Continue reading
  72 Hits
  0 Comments
72 Hits
0 Comments

Deliver Enhanced Traffic Monitoring for Private Clouds and Data Centers

CloudLens Self-Hosted 5.1 provides packet-level visibility into restricted cloud environments to detect security vulnerabilities and increase application and network performance monitoring ​ SANTA ROSA, Calif., July 31, 2019 – Keysight Technologies, Inc. (NYSE: KEYS), a leading technology company that helps enterprises, service providers and govern...
Continue reading
  96 Hits
  0 Comments
96 Hits
0 Comments

VIAVI Solutions - State of the Network 2019

NetOps and SecOps Collide Over 600 IT professionals weigh in on the workloads, challenges, data sources and team collaboration required to safeguard critical corporate assets. Study Highlights: Network team role in security increases: Over 80% of network teams play a role in security efforts including investigations and clean-up, implementation and...
Continue reading
  225 Hits
  0 Comments
225 Hits
0 Comments

The Best Way To Optimize Load Balancing for Inline Security Appliances

​ In today's 24x7, "always on" world, the company's data network must be as reliable as possible. Otherwise, revenue reduction and productivity losses are not only possible, but probable. This includes inline security and monitoring tools which can become a single point of failure. Security and monitoring tool survivability is often thought about i...
Continue reading
  160 Hits
  0 Comments
160 Hits
0 Comments

What is hidden in encrypted internet traffic streams

​ Full internet encryption is on the horizon and with it the risk that hackers will gain access to your computer network. When you open any website today, it is highly probable you will see a small padlock in front of the address. For the everyday internet user, this is the only visible sign that the site is secure and communication with the site i...
Continue reading
  154 Hits
  0 Comments
154 Hits
0 Comments

Orolia Product Notification for SecureSync and NetClock 9400

​ Orolia would like to take this opportunity to inform our customers of a Preventative Maintenance Action (PMA) to your SecureSync 1200 and NetClock 9400 appliances. This PMA is being executed to prevent unexpected failures caused by flash memory corruption within these appliances. Our SecureSync 1200 and NetClock 9400 line of products have an inte...
Continue reading
  382 Hits
  0 Comments
382 Hits
0 Comments

5 predictions for cyber security in 2019

​Last year completely refuted doubts about the increasing cyber security risks. Hackers, obtained sensitive data on hundreds of German politicians, including Chancellor Merkel and accessed data relating to tens of millions of Facebook accounts. The year also confirmed that hacking has become a means for political activists and an effective tool for...
Continue reading
  255 Hits
  0 Comments
255 Hits
0 Comments

Ixia's 2019 Security Report

Threats to network security are on the rise. Take a look at Ixia's 2019 Security Report to get actionable insights on how you can strengthen your security strategy. Ixia's 3rd annual Security Report outlines six key security trends and offers recommendations for addressing the challenges these trends pose to your enterprise. Read the report and sta...
Continue reading
  293 Hits
  0 Comments
293 Hits
0 Comments

Basic Rules for Network Data Visualization Access

More and more managers and system admins feel challenged when dealing with the mass of information and volume of data that passes through their network each day. Network data visualization access tools help network admins keep an eye on what is always happening on the their network. This means these tools play an important role in any complex ...
Continue reading
  291 Hits
  0 Comments
291 Hits
0 Comments

Ixia, a Keysight Business, Delivers Scalable Visibility for Data Centers Today and Tomorrow

​Ixia's Vision X network packet broker offers a high-density, modular platform to keep pace with evolving data center needs "Today's network and security operations teams are faced with increasing data volumes and velocity that are exceeding human scale," said Bob Laliberte, Sr. Analyst at ESG. "It is impossible to effectively manage the security a...
Continue reading
  306 Hits
  0 Comments
306 Hits
0 Comments

Huawei supports Ice Wireless 4G upgrade in Inuvik

Ice Wireless has partnered with Huawei to deliver 4G LTE mobile services to the town of Inuvik in the Northwest Territories, reports Canadian news site MobileSyrup. Services will be functional by the end of June 2019. Samer Bishay, CEO of Ice Wireless, said: 'Our collaborative launch with Huawei to offer 4G LTE in Inuvik will be the stepping stone ...
Continue reading
  375 Hits
  0 Comments
375 Hits
0 Comments

Webinar - Do You Have a Strategy for IoT?

 When Thursday, June 27th, 2019 at 2pm EST Due to the popular demand of our IoT webinar in March, we have decided to run another for those who could not make the first.  Join us on Thursday June 27th @ 2pm EST for an in-depth look at how our customers are using NMSaaS to monitor and report on all kinds of new data outside of the tradition...
Continue reading
  324 Hits
  0 Comments
324 Hits
0 Comments

All You Need to Know About the Network Packet Brokers

​ The last decade experienced an overwhelming increase in network size, bandwidth, and traffic. IT companies were, therefore, forced to adapt by developing the next-generation of security and network monitoring tools. This new wave of tools exposed a greater need for advanced network visibility, one that traditional data center monitoring devices c...
Continue reading
  549 Hits
  0 Comments
549 Hits
0 Comments

How to Optimize Your Security Defenses

​As I mentioned in a blog a couple of months ago, there is an absolute myriad of security architectures and techniques available to the enterprise IT professionals. These strategies all have pros and cons. Lets look at one of the most common ones-a defensive approach. Everyone in the security arena is familiar with this concept. It is sometimes tho...
Continue reading
  437 Hits
  0 Comments
437 Hits
0 Comments

An Inline Security Primer

​Anyone in network security knows that it is a complicated and involved process. The clear goal is to prevent security breaches. How do you go about that though? There are so many schools of thought, methods, and configurations. Here are just a few examples: Cyber range training Cyber resilience Defense in depth Encryption Endpoint security Firewal...
Continue reading
  643 Hits
  0 Comments
643 Hits
0 Comments

Network Flow Monitoring: The ABCs of Network Visibility

​This is another in a series of blogs on the important concepts of network management. Today's topic is flow monitoring. A network flow is the series of messages exchanged between the opening and closing of a communication session. Flow data is used by tools like network flow analyzers and flow collectors to generate insight into network performanc...
Continue reading
  490 Hits
  0 Comments
490 Hits
0 Comments

Network Security Works Only If You See The Right Traffic

Security is nowadays an important part of network management . Secure networks are vital for running an uninterrupted business, preventing data loss and maintaining the overall image of the business. Security challenges are increasing because networking is getting more complex, more dynamic and virtual. The existing approach of network visibility l...
Continue reading
  449 Hits
  0 Comments
449 Hits
0 Comments

Contact Us

Address:

Telnet Networks Inc.
100 Strowger Blvd, Suite 118, Brockville, ON, K6V 5J9, Canada

Phone:

(800) 561-4019

Fax:

613-498-0075

For More Information about Telnet Networks, our products, or our services, or to request a quote please feel free to contact us directly.