Latest Blog Posts

Newsletter

For a Free Quote...

Telnet Network News

Telnet Network News - We'll keep you up to date with what's happening in the industry.

Network Monitoring is Changing

Networking is changing rapidly, speed and bandwidth requirements have grown exponentially, new traffic types appear daily, and now a functioning network is a crucial and necessary part of running a successful large or small business in any market. You are expected to provide critical business applications in a secure, always-up network environment....
Continue reading
  344 Hits
  0 Comments
344 Hits
0 Comments

The Choice Between Network Availability and Security

Do you have to give up on network availability when deploying your inline security tools? By using a iBypass switch "YOU DON'T HAVE TO CHOOSE"  When a network monitoring device such as an IPS is deployed inline in a network, it is vital to ensure that traffic continues to flow in all circumstances, even if the IPS loses power, so that mission-...
Continue reading
  393 Hits
  0 Comments
393 Hits
0 Comments

Evaluating Inline Security Fabric: Your Key Considerations

Would you like to see and detect more security threats in your production network? The key to inline security monitoring are fail-safe tool deployment, maximum traffic inspection, and super-fast failover. This white paper will show you how ​ To access 100% of your network traffic I ncrease the efficiency of your security tools Use security intellig...
Continue reading
  738 Hits
  0 Comments
738 Hits
0 Comments

Ixia Debuts New Network Tap

Among the most useful pieces of physical hardware that networking professionals can utilize is a network tap . With a network tap, physical networks can be monitored for outliers as well as potential injection attacks. Network security vendor Ixia is now expanding its portfolio of network taps with the new Flex Tap Secure+. Kevin Formby, VP of market development at Ixia, told Enterprise Networking Planet that the new Flex Tap Secure+ is a net new addition to Ixia's portfolio and doesn't replace ...
Continue reading
  1949 Hits
  0 Comments
1949 Hits
0 Comments

ThreatARMOR Reduces Your Network’s Attack Surface

2014 saw the creation of more than 317 million new pieces of malware. That means an average of nearly one million new threats were released each day. Here at Ixia we’ve been collecting and organizing threat intelligence data for years to help test the industry’s top network security products. Our Application and Threat Intelligence (ATI) research center maintains one of the most comprehensive lists of malware, botnets, and network incursions for exactly this purpose. We’ve had many requests to l...
Continue reading
  1272 Hits
  0 Comments
1272 Hits
0 Comments

Don’t Be Lulled to Sleep with a Security Fable. . .

Once upon a time, all you needed was a firewall to call yourself “secure.” But then, things changed. More networks are created every day, every network is visible to the others, and they connect with each other all the time—no matter how far away or how unrelated. And malicious threats have taken notice . . . As the Internet got bigger, anonymity got smaller. It’s impossible to go “unnoticed” on the Internet now. Everybody is a target. Into today’s network landscape, every network is under the t...
Continue reading
  1186 Hits
  0 Comments
1186 Hits
0 Comments

The State of Enterprise Security Resilience - An Ixia Research Report

Ixia , an international leader in application performance and security resilience technology, conducted a survey to better understand how network security resilience solutions and techniques are used within the modern enterprise. While information exists on security products and threats, very little is available on how it is actually being used and the techniques and technology to ensure that security is completely integrated into the corporate network structure. This report presents the researc...
Continue reading
  1074 Hits
  0 Comments
1074 Hits
0 Comments

The Importance of State

Ixia recently added passive SSL decryption to the ATI Processor (ATIP) . ATIP is an optional module in several of our Net Tool Optimizer (NTO) packet brokers that delivers application-level insight into your network with details such as application ID, user location, and handset and browser type. ATIP gives you this information via an intuitive real-time dashboard, filtered application forwarding, and rich NetFlow/IPFIX. Adding SSL decryption to ATIP was a logical enhancement, given the increasi...
Continue reading
  1525 Hits
  0 Comments
1525 Hits
0 Comments

Ixia Taps into Visibility, Access and Security in 4G/LTE

The Growing Impact of Social Networking Trends on Lawful Interception Lawful Interception (LI) is the legal process by which a communications network operator or Service Provider (SP) gives authorized officials access to the communications of individuals or organizations. With security threats mushrooming in new directions, LI is more than ever a priority and major focus of Law Enforcement Agencies (LEAs). Regulations such as the Communications Assistance for Law Enforcement Act (CALEA), mandate...
Continue reading
  1116 Hits
  0 Comments
1116 Hits
0 Comments

Ixia Taps into Hybrid Cloud Visibility

One of the major issues that IT organizations have with any form of external cloud computing is that they don’t have much visibility into what is occurring within any of those environments. To help address that specific issue, Ixia created its Net Tool Optimizer , which makes use of virtual and physical taps to provide visibility into cloud computing environments. Now via the latest upgrade to that software, Ixia is providing support for both virtual and physical networks while doubling the numb...
Continue reading
  1507 Hits
  0 Comments
1507 Hits
0 Comments

Inline Security Solutions from Ixia

Flexible, Fail-Safe Inline Security Boosts Agility, Availability, and Resilience While Reducing Network Costs As networks deliver more services and carry ever-higher volumes of multiprotocol traffic, data rates continue to soar. Voice, data, and streaming video now travel on one wire, raising security and compliance issues. Today’s intense threat landscape demands multiple proactive security systems throughout the network for a strong, layered security posture. These proactive devices include fi...
Continue reading
  939 Hits
  0 Comments
939 Hits
0 Comments

A Simple Solution To Combatting Virtual Data Center Blind Spots

Blind spots are a long-established threat to virtual data centers. They are inherent to virtual machine (VM) usage and technology due to the nature of VMs, lack of visibility for inter- and intra-VM data monitoring, the typical practices around the use of VM’s, and the use of multiple hypervisors in enterprise environments. Virtual machines by their nature hide inter- and intra-VM traffic. This is because the traffic stays within in a very small geographic area. As I mentioned in a previous blog...
Continue reading
  1049 Hits
  0 Comments
1049 Hits
0 Comments

Ixia Exposes Hidden Threats in Encrypted Mission-Critical Enterprise Applications

Delivers industry’s first visibility solution that includes stateful SSL decryption to improve application performance and security forensics Ixia (Nasdaq: XXIA), a leading provider of application performance and security resilience solutions, announced it has extended its Application and Threat Intelligence (ATI) Processor™ to include stateful, bi-directional SSL decryption capability for application monitoring and security analytics tools. Stateful SSL decryption provides complete session info...
Continue reading
  1138 Hits
  0 Comments
1138 Hits
0 Comments

Encryption: The Next Big Security Threat

As is common in the high-tech industry, fixing one problem often creates another. The example I’m looking at today is network data encryption. Encryption capability, like secure sockets layer (SSL), was devised to protect data packets from being read or corrupted by non-authorized users. It’s used on both internal and external communications between servers, as well as server to clients. Many companies (e.g. Google, Yahoo, WebEx, Exchange, SharePoint, Wikipedia, E*TRADE, Fidelity, etc.) have tur...
Continue reading
  1544 Hits
  0 Comments
1544 Hits
0 Comments

Campus to Cloud Network Visibility

Visibility. Network visibility. Simple terms that are thrown around quite a bit today. But the reality isn’t quite so simple. Why? Scale for one. It’s simple to maintain visibility for a small network. But large corporate or enterprise networks? That’s another story altogether. Visibility solutions for these large networks have to scale from one end of the network to the other end – from the campus and branch office edge to the data center and/or private cloud. Managing and troubleshooting perfo...
Continue reading
  1046 Hits
  0 Comments
1046 Hits
0 Comments

NTO Now Provides Twice the Network Visibility

Ixia is proud to announce that we are expanding one of the key capabilities in Ixia xStream platforms, “Double Your Ports,” to our Net Tool Optimizers (NTO) family of products . As of our 4.3 release, this capability to double the number of network and monitor inputs is now available on the NTO platform. If you are not familiar with Double Your Ports, it is a feature that allows you to add additional network or tool ports to your existing NTO by allowing different devices to share a single port....
Continue reading
  1279 Hits
  0 Comments
1279 Hits
0 Comments

Cost-Effective Monitoring for Multi-Device Copper Networks is Here!

Proper access is the core component of any visibility architecture—you need to be able to capture the data before you can properly analyze it. To further help our customers, Ixia has released a new regenerator tap for copper networks. Regeneration means you get the same clean copy of incoming data distributed to multiple output ports in real time. The Ixia Net Optics Regeneration Taps solve the key physical layer challenges of multi-device monitoring for 10, 100, and 1000MB (1 GbE) copper networ...
Continue reading
  1341 Hits
  0 Comments
1341 Hits
0 Comments

Improving Network Visibility – Part 4: Intelligent, Integrated, and Intuitive Management

In the three previous blogs in this series, I answered an often asked customer question – “What can really be done to improve network visibility?” – with discussions on data and packet conditioning, advanced filtering, and automated data center capability. In the fourth part of this blog series, I’ll reveal another set of features that can further improve network visibility and deliver even more verifiable benefits. Too quickly summarize, this multi-part blog covers an in-depth view of various f...
Continue reading
  1414 Hits
  0 Comments
1414 Hits
0 Comments

“Who Makes the Rules?” The Hidden Risks of Defining Visibility Policies

Imagine what would happen if the governor of one state got to change all the laws for the whole country for a day, without the other states or territories ever knowing about it. And then the next day, another governor gets to do the same. And then another. Such foreseeable chaos is precisely what happens when multiple IT or security administrators define traffic filtering policies without some overarching intelligence keeping tabs on who’s doing what. Each user acts from their own unique perspec...
Continue reading
  1728 Hits
  0 Comments
1728 Hits
0 Comments

Advanced Packet Filtering with Ixia’s Advanced Filtering Modules (AFM)

An important factor in improving network visibility is the ability to pass the correct data to monitoring tools. Otherwise, it becomes very expensive and aggravating for most enterprises to sift through the enormous amounts of data packets being transmitted (now and in the near future). Bandwidth requirements are projected to continue increasing for the foreseeable future – so you may want to prepare now. As your bandwidth needs increase, complexity increases due to more equipment being added to...
Continue reading
  2165 Hits
  0 Comments
2165 Hits
0 Comments

Contact Us

Address:

Telnet Networks Inc.
100 Strowger Blvd, Suite 118, Brockville, ON, K6V 5J9, Canada

Phone:

(800) 561-4019

Fax:

613-498-0075

For More Information about Telnet Networks, our products, or our services, or to request a quote please feel free to contact us directly.

Latest Blog Posts

Latest Blog Posts (copy)