Latest Blog Posts

Newsletter

For a Free Quote...

Telnet Network News

Telnet Network News - We'll keep you up to date with what's happening in the industry.

How to Bypass 5 Major Security Risks

  Bypass Risk.  Save time an Money Your businesses continue to invest in advanced security defenses, like next-generation firewalls and intrusion prevention systems (NGFW and NGIPS), data loss prevention (DLP), and other inline tools. These tools can significantly strengthen security, but may also add complexity, operational cost, an...
Continue reading
  81 Hits
  0 Comments
81 Hits
0 Comments

Rogers’ revenues rise 6% in 4Q18

Canadian quad-play operator Rogers Communications posted a 6% year-on-year increase in total revenue for the three months ending 31 December 2018 to CAD3.94 billion (USD2.95 billion), up from CAD3.73 billion in the same period of 2017. Underlying mobile revenue climbed 8% – driven chiefly by mobile data demand monetisation – and fixed broadband int...
Continue reading
  150 Hits
  0 Comments
150 Hits
0 Comments

Introductory Guide to Network Packet Brokers

  What is a Network Packet Broker? A Network Packet Broker (NPB) is a switch-like network device ranging in size from portables devices to 1 and 2 RU units, up to massive chassis and blade systems. Unlike a switch, a Network Packet Broker does not alter the traffic passing through it in any way unless specifically instructed to do so. An NPB c...
Continue reading
  92 Hits
  0 Comments
92 Hits
0 Comments

How to Detect RYUK Ransomware on Your Network

What is RYUK Ransomware?  ​An advisory from the US based Department of Health and Human Services notes that attacks involving RYUK appear to be targeted. In fact, its encryption scheme is intentionally built for small-scale operations, so that only crucial assets and resources are infected in each targeted network by a manual distribution from...
Continue reading
  112 Hits
  0 Comments
112 Hits
0 Comments

Global Webinar Day – StableNet® in the Mining Industry

Date: January 31st, 2019  Time: 4:00 pm (GMT +1)  Join Rinat Bedretdinov, Senior Engineer at CROC, and Dmitry Scherbakov, Regional Presales Manager at Infosim®, for a glistening webinar on how our Unified Network and Services Management solution StableNet® can make your business shine. We will illustrate how one of the global top gold pro...
Continue reading
  108 Hits
  0 Comments
108 Hits
0 Comments

Making The Shift to Network Security Resilience

​In the webinar above,the concept of network security resilience and how to implement it is explained. However, successful implementation relies upon making the fundamental mind shift to the strategy. One cannot expect to see the benefits if they don't embrace change. ​However, change is easier said than done. It seems like many security engineers,...
Continue reading
  115 Hits
  0 Comments
115 Hits
0 Comments

Network Traffic Metadata – Four Recent Customer Use Cases

The rising popularity of network traffic metadata is because it's in the sweet spot between full packet capture like Wireshark and PCAPs on one hand and NetFlow on the other, which lacks detail and drill down. Drill down, granularity, context, and continuous internal visibility are now absolutely critical for organizations of all sizes including SM...
Continue reading
  129 Hits
  0 Comments
129 Hits
0 Comments

Building Business Cases for Investing in Network Performance Management

  In today's digital economy, network performance often determines business performance. Unfortunately, many network managers lack the right tools to manage performance. They have an incomplete picture, especially as networks scale and grow in complexity and applications migrate to the cloud. Monitoring service health and network availability ...
Continue reading
  146 Hits
  0 Comments
146 Hits
0 Comments

Adventures of a Network Monitoring Newbie: The Final Network Security Frontier

T he last part of everything is always hard, they say. I suppose it has to do with having to let go. And, in my case, with deciding what to write about or what's the best way to end the series. Lately I've been reading a lot about cybersecurity, and how it affects everybody, on a personal and a professional level. That's how the idea for this last ...
Continue reading
  133 Hits
  0 Comments
133 Hits
0 Comments

APPLICATION DEPENDENCY MAPPING: CRITICAL TO ENSURING BUSINESS AVAILABILITY

In 2013, in a legal case that sent waves through the IT industry, Sears Holding Corp. filed lawsuits against two IT vendors involved in maintaining and providing equipment for the company's data center. Sears alleged that, as a result of multiple power outages and ongoing issues, the company had lost an estimated $2.2 million in profits and another...
Continue reading
  144 Hits
  0 Comments
144 Hits
0 Comments

5 Tips For Monitoring Network Traffic on Your Network

Monitoring traffic on your network is important if you want to keep it secure and running efficiently. The information obtained by network traffic monitoring tools can be used in multiple security and IT operational use cases to identify security vulnerabilities, troubleshoot network issues and analyze the impact new applications will have on the n...
Continue reading
  202 Hits
  0 Comments
202 Hits
0 Comments

Fiber Taps - Y Cables Matter

Passive fiber optic taps are very simple devices. They almost never go wrong. In fact they have MTBF figures calculated in millions of hours. You will certainly die before they will! However Ixia often gets questions from customers of the kind "I've installed your tap, but it does not work - please send me a new one". In almost all cases this is du...
Continue reading
  379 Hits
  0 Comments
379 Hits
0 Comments

What Traffic Reports To Focus on if You Are Dealing With Google Unusual Traffic Notifications

 Why does Google sometimes show unusual traffic messages? Recently I worked with a number of network managers who downloaded our LANGuardian software to try and find the source of malware on their networks. The issue they faced was that clients were been presented with the message "Our systems have detected unusual traffic – possibly Malware f...
Continue reading
  191 Hits
  0 Comments
191 Hits
0 Comments

Discover Application Performance Issues Before Your Business Does!

Availability issues. Slow response times. Performance bottlenecks. Also web applications have problems that affect the satisfaction of your employees and customers. Identify and troubleshoot them before they impact your business with Flowmon APM, an agent-less solution to proactively drive user experience and application value.    Applica...
Continue reading
  189 Hits
  0 Comments
189 Hits
0 Comments

Webinar - Network Protocol Specialists

Date: Time: December 19, 2018  10:00 am Pacific Time (US ad Canada) Join Mike Pennacchi, where i n this webinar we will cover a number of tips and tricks related to network analysis and troubleshooting. Topics covered this month: Getting in the path of the packets - You can't analyze packets you didn't capture. In this webcast I'll be cov...
Continue reading
  208 Hits
  0 Comments
208 Hits
0 Comments

SNMP: The ABCs of Network Visibility

Network management and monitoring is a large topic. It includes device monitoring and management, device cluster monitoring and management,network monitoring and management, application monitoring and management, problem resolution, and elements of network security as well. In this blog, I wanted to focus on device monitoring. Devices are often ref...
Continue reading
  162 Hits
  0 Comments
162 Hits
0 Comments

Twelve applicants for Canadian 600MHz auction

Innovation, Science & Economic Development Canada has published the final list of twelve applicants for the upcoming national mobile frequency auction in the 600MHz band. Alongside the big three nationwide mobile operators Rogers Communications, Bell Mobility (part of Bell Canada) and Telus, the other nine applicants are: Freedom Mobile (owned ...
Continue reading
  136 Hits
  0 Comments
136 Hits
0 Comments

Can Flow Monitoring Work on Encrypted Traffic?

Encrypted traffic is on the rise. It's no longer possible to inspect the content of the communication. What does this mean for network traffic monitoring? Encrypted traffic is on the rise. In 2016, NSS Labs found out that 97% of surveyed enterprises saw an increase in encrypted web traffic. Both Let's Encrypt and Google  currently re...
Continue reading
  159 Hits
  0 Comments
159 Hits
0 Comments

Candela - LANforge FIRE & ICE 5.3.8 has been Released

Release 5.3.8 adds REST automation API support, improved wave-2 WiFi performance and stability, an improved RF RADAR generator and more. See the Release Notes for more details. Click here for more releases.   New Features & Improvements Release 5.3.8 (November 13, 2018) ​  Support Virtual Router Function (VRF) in kernel 4.16 and highe...
Continue reading
  201 Hits
  0 Comments
201 Hits
0 Comments

Webinar - StableNet® Facilitates IT Transformation in Healthcare

Join Steve Miller, Vice President of Field Sales at Global Convergence, Inc., and Paul Krochenski, Director of Strategic Sales at Infosim, Inc., for a webinar on how the Unified Network and Services Management solution StableNet® can lead the way through the zoo-of-management tools. Based on two healthcare industry use cases, we will illustrate how...
Continue reading
  197 Hits
  0 Comments
197 Hits
0 Comments

Contact Us

Address:

Telnet Networks Inc.
100 Strowger Blvd, Suite 118, Brockville, ON, K6V 5J9, Canada

Phone:

(800) 561-4019

Fax:

613-498-0075

For More Information about Telnet Networks, our products, or our services, or to request a quote please feel free to contact us directly.

Latest Blog Posts

Latest Blog Posts (copy)