Latest Blog Posts

Newsletter

For a Free Quote...

Telnet Network News

Telnet Network News - We'll keep you up to date with what's happening in the industry.

SNMP: The ABCs of Network Visibility

Network management and monitoring is a large topic. It includes device monitoring and management, device cluster monitoring and management,network monitoring and management, application monitoring and management, problem resolution, and elements of network security as well. In this blog, I wanted to focus on device monitoring. Devices are often ref...
Continue reading
  42 Hits
  0 Comments
42 Hits
0 Comments

Can Flow Monitoring Work on Encrypted Traffic?

Encrypted traffic is on the rise. It's no longer possible to inspect the content of the communication. What does this mean for network traffic monitoring? Encrypted traffic is on the rise. In 2016, NSS Labs found out that 97% of surveyed enterprises saw an increase in encrypted web traffic. Both Let's Encrypt and Google  currently re...
Continue reading
  44 Hits
  0 Comments
44 Hits
0 Comments

Candela - LANforge FIRE & ICE 5.3.8 has been Released

Release 5.3.8 adds REST automation API support, improved wave-2 WiFi performance and stability, an improved RF RADAR generator and more. See the Release Notes for more details. Click here for more releases.   New Features & Improvements Release 5.3.8 (November 13, 2018) ​  Support Virtual Router Function (VRF) in kernel 4.16 and highe...
Continue reading
  83 Hits
  0 Comments
83 Hits
0 Comments

Webinar - StableNet® Facilitates IT Transformation in Healthcare

Join Steve Miller, Vice President of Field Sales at Global Convergence, Inc., and Paul Krochenski, Director of Strategic Sales at Infosim, Inc., for a webinar on how the Unified Network and Services Management solution StableNet® can lead the way through the zoo-of-management tools. Based on two healthcare industry use cases, we will illustrate how...
Continue reading
  88 Hits
  0 Comments
88 Hits
0 Comments

What Should a Portable Network Forensics Kit Look Like?

Whether you are a network forensics expert or part of a cyber-security team, you need to have the ability to intercept network traffic, and capture data packets in real-time to prevent threats and live attacks. Corporate organizations should opt for network interception and traffic capture tools according to the size and architecture of their netwo...
Continue reading
  114 Hits
  0 Comments
114 Hits
0 Comments

How to Analyze Flow Data with StableNet

Flow data can be one of the best tools a network engineer can use to track down issues. Flo data can be used for a variety of troubleshooting tasks, including:  ​ Network performance Capacity planning Security audits ....and more The key to understanding how to analyze flow data is first to understand what information is contained within flow ...
Continue reading
  141 Hits
  0 Comments
141 Hits
0 Comments

Webinar - Protecting Time-Sensitive Critical Infrastructure Systems

  Free 60-Minute Webinar Time-sensitive systems are facing many issues related to the use of GNSS as the sole provider of accurate timing information. In addition to jamming and spoofing threats that are gaining more visibility, GPS also has a week rollover event occurring in April 2019. Due to the 10-bit week number counter used for the GPS w...
Continue reading
  145 Hits
  0 Comments
145 Hits
0 Comments

What is a Leap Second and How Does It Affect Me?

A leap second is a discontinuity in the world's official timescale and is a risk for those:  ​ Developing and maintaining GPS applications, and/or Managing a precise network synchronization deployment   The last leap second occurred on December 31, 2016 This Essential Education topic is to assist you in understanding the leap second ...
Continue reading
  62 Hits
  0 Comments
62 Hits
0 Comments

Exploring the Different Types of Network TAPs

In this article, we will delve deeper into the different types of TAPs and their passive and active solutions. In addition, we would also introduce a brief about Network Packet Brokers and their usability with TAP devices for added security.   To begin with, there are three types of TAP solutions. Each of these perform the same basic func...
Continue reading
  170 Hits
  0 Comments
170 Hits
0 Comments

How TCP Works- The Timestamp Option

In the TCP handshake, you may see an option called timestamps, shortly followed by scary-looking "TSval" and "TSecr" numbers. What are those values and how can you interpret them? Let's dig. What is a TCP Timestamp?   The timestamps option in TCP enables the endpoints to keep a current measurement of the round-trip time (RTT) of the netwo...
Continue reading
  188 Hits
  0 Comments
188 Hits
0 Comments

Shaw revenues up 7%, boosted by Freedom Mobile

  Canadian cableco Shaw Communications has reported its results for the quarter ended 31 August 2018 (the end of its fiscal year 2018) including its fixed network and cellular (Freedom Mobile) divisions. Revenue from continuing operations increased by approximately 7% both in the quarter and fiscal year to CAD1.34 billion (USD1.03 billion) and...
Continue reading
  153 Hits
  0 Comments
153 Hits
0 Comments

Testing the No Break Feature - with Mike Pennachi

 One of the best ways to get access to your network and see what is happening on a network line is to place a network TAP that gives you full visibility without dropping any packets. However, the last thing you want to happen is that your network goes down in case of an unexpected power failure to the TAP device. To prevent network problems in...
Continue reading
  131 Hits
  0 Comments
131 Hits
0 Comments

Coming to a Crossroad - Visibility Nightmare in Modern Data Centers

​Virtualization technology has tremendously transformed the modern data centre. Applications and operating systems are installed into virtual machine images instead of physical machines, which in turn are executed by physical servers running a hypervisor. Virtualizing applications provide many benefits, including consolidation — running multiple ap...
Continue reading
  128 Hits
  0 Comments
128 Hits
0 Comments

Bell launches Virtual Network Services for Enterprises.

Bell Canada has launched its Virtual Network Services (VNS) platform, offering enterprise customers nationwide a range of on-demand network functions that reside securely in the telco's private cloud, reports ConvergeDigest.com. Bell also announced it will be the first Canadian operator to offer a managed software-defined wide area network (SD-WAN)...
Continue reading
  122 Hits
  0 Comments
122 Hits
0 Comments

Employees Leaving? Need and Audit Trail?

 Users Leaving? How to get an audit trail Network users come and go. When new employees start we create sign on accounts and assign any relevant permissions. When employees leave we typically transfer their data over to someone else and disable any logon accounts.  During this transition period, an audit trail can be an invaluable resourc...
Continue reading
  143 Hits
  0 Comments
143 Hits
0 Comments

DNS Risks to Watch Out For

People don't usually notice that DNS exists. They use their browsers and send email, and they assume that they'll reach the  expected destination. When they don't, it's alarming. The 2016 DDoS attach on Dyn's DNS servers brought a large portion of the Internet's traffic to a grinding halt. No one expected it, and few people understood it....
Continue reading
  309 Hits
  0 Comments
309 Hits
0 Comments

Webinar - Assigning, Tracking, Auditing and Managing your IP address space with NMSaaS

Listen in on this webinar for an in depth look at how to assign, track, audit and manage your IP addresses. In this webinar, you will learn how many customers across all industries, private and public, are leveraging the NMSaaS IPAM Solution to improve network visibility and security out of the box. We will share how NMSaaS: ​ Can be deployed ...
Continue reading
  167 Hits
  0 Comments
167 Hits
0 Comments

Freedom Mobile enhances network with 700MHz coverage

Canada's Freedom Mobile has begun enabling its recently-acquired 700MHz spectrum – starting in Calgary – improving network coverage and enhancing indoor LTE signal, its parent Shaw Communications announced in a press release. Shaw closed the acquisition of 700MHz and 2500MHz licences from Quebecor (Videotron) in July 2017, supporting network upgrad...
Continue reading
  187 Hits
  0 Comments
187 Hits
0 Comments

Bypass TAPs - Safety Nets for Your In-line Appliances

​To protect your network against an increasing number of outside threats, you need to place in-line security tools (such as Intrusion Prevention Systems-IPS, or firewalls) that check all the traffic on the network line. This way you have a better chance to counter cyber-attacks before they can do any harm. Find out why cyber-security is the rising ...
Continue reading
  154 Hits
  0 Comments
154 Hits
0 Comments

PREVENT MALWARE SPREADING WITH AUTOMATIC CLIENT ISOLATION USING FLOWMON ADS AND CISCO ISE

Today, threats are not only limited to the internet. Organizations face guests and employees who connect their own equipment into the network or take company equipment home with them. A firewall with IPS capabilities, such as a next generation firewall, is a good first measure to protect against modern day threats, but they will only protect what g...
Continue reading
  204 Hits
  0 Comments
204 Hits
0 Comments

Contact Us

Address:

Telnet Networks Inc.
100 Strowger Blvd, Suite 118, Brockville, ON, K6V 5J9, Canada

Phone:

(800) 561-4019

Fax:

613-498-0075

For More Information about Telnet Networks, our products, or our services, or to request a quote please feel free to contact us directly.

Latest Blog Posts

Latest Blog Posts (copy)