Latest Blog Posts

Newsletter

 

For a Free Quote...

Telnet Network News

Telnet Network News - We'll keep you up to date with what's happening in the industry.

The Traceability of Time Synchronization: Why Internet Time Isn’t Good Enough

In today's modern networking infrastructure, great care is taken to ensure that networks are reliable, highly available and most of all, secure. Cybersecurity has emerged as a critical area in all facets of the internet. It's an area that companies spend millions on each year. Yet still, there are often-overlooked areas that degrade security. One e...
Continue reading
  99 Hits
  0 Comments
99 Hits
0 Comments

How to Improve Enterprise Network Visibility

Network requirements are constantly changing in enterprises. The network goal of every enterprise is to be more efficient and cost-effective while embracing the changes. There are several network visibility solutions/vendors available in the market. However, each network has a different requirement and not solutions fit every network architecture. ...
Continue reading
  146 Hits
  0 Comments
146 Hits
0 Comments

Webinar - Hybrid and Multi - Cloud Integrated IP Address Management from NMSaas

When:  What time: Thursday, May 16th, 2019 2pm  EST  ​Are you using Cloud Integration to manage your IP Addresses? Our Latest version of NMSaaS , now provides new capabilities for IPAM/DNS/DHCP with native integrated support for: Azure DNSA Amazon Route 53 Akamai Fast DNS  ​In this webinar we will discuss: Multiple account suppo...
Continue reading
  139 Hits
  0 Comments
139 Hits
0 Comments

Where Should I Place My TAP?

Two common methods to copy traffic to your monitoring or security tools is a Span port or network tap. Span can be convenient for quick troubleshooting, remote locations or when you do not have access to the physical infrastructure. The risk of using a span port is that It can be over subscribed, and the lowest priority when it comes to forwarding ...
Continue reading
  161 Hits
  0 Comments
161 Hits
0 Comments

Ixia's 2019 Security Report

Welcome to the third annual Security Report issued by Ixia, a Keysight business. Each year, the Ixia Application and Threat Intelligence (ATI) Research Centre summarizes the most interesting and prominent internet security trends. We analyze ATI data to help organizations understand where they can improve. We also analyze the data to predict the bi...
Continue reading
  187 Hits
  0 Comments
187 Hits
0 Comments

How to Determine What Ports are Active on a Server

Active Server Ports  ​ I spent most of last week on the visiting customers. Many of them were working on projects to reduce the number of physical servers hosted in their data centers. In some cases, they wanted to move the servers to cloud service such as AWS or Azure. In others, they wanted to virtualize the servers locally on platforms such...
Continue reading
  226 Hits
  0 Comments
226 Hits
0 Comments

WEBINAR - 4 Gaps to Fix in Your Security Detection and Response with VIAVI Solutions

​Join VIAVI on April 24th when we host a roundtable discussion with expert security threat hunters who will reveal the top pitfalls they see in enterprise security strategies. As their decades of experience converge, common themes appear, identifying the gaps that put their clients at risk for being the next news headline. Reserve your spot now to ...
Continue reading
  259 Hits
  0 Comments
259 Hits
0 Comments

IXIA Presents: VISION Edge 1S: Unlocking Opportunity at the Network Edge

The network edge is changing fast, and rapid change brings opportunity. With more applications and devices running at branch locations, performance monitoring and analysis must move closer to the customer - and so must visibility. Ixia's Vision E1S, the latest addition to their "Vision Edge" network packet broker (NPB) series , meets fast-growing d...
Continue reading
  140 Hits
  0 Comments
140 Hits
0 Comments

Cost-effective Aggregation with Booster Aggregation TAPs

​ Traffic monitoring is a must for IT administrators these days, and an integral part of most enterprise networks. There are many different approaches to getting visibility into the network, but using a TAP has proven to be the most accurate and reliable. Read more here about why a network TAP is better than a SPAN.   Among all these network h...
Continue reading
  329 Hits
  0 Comments
329 Hits
0 Comments

Give Your Network An Unfair Advantage Against Hidden Malware

​ The IT role is extremely hard today. Whether you are part of the DevOps or SecOps team makes no difference - threats and problems are a daily, if not hourly, occurrence. What you need is good quality data as fast as you can get it to counter security threats, troubleshoot network outages, and remediate performance problems. Unfortunately, IT...
Continue reading
  162 Hits
  0 Comments
162 Hits
0 Comments

It's Time to Prepare Your Network For the Effect of Rogue IOT Devices

One of the most common forms of network threats today is distributed denial of service (DDoS). An attack involves flooding networks and servers with false internet traffic, thereby blocking access to genuine devices. Sometimes used to target specific businesses, cyber-attacks can bring down entire telecoms networks, as was the case in the attack on...
Continue reading
  211 Hits
  0 Comments
211 Hits
0 Comments

Report Summary TLS 1.3 Adoption in the Enterprise

​ Cyber defenses encrypt data to keep it safe while hackers encrypt malware to sneak threats onto your network. A new report from Enterprise Management Associates (EMA) says enterprises see the new Transport Layer Security (TLS) 1.3 encryption standards as offering greater privacy and security—over 70 percent of respondents have or will start enabl...
Continue reading
  344 Hits
  0 Comments
344 Hits
0 Comments

Network Traffic Metadata – Four Recent Customer Use Cases

The rising popularity of network traffic metadata is because it's in the sweet spot between full packet capture like Wireshark and PCAPs on one hand and NetFlow on the other, which lacks detail and drill down. Drill down, granularity, context, and continuous internal visibility are now absolutely critical for organizations of all sizes including SM...
Continue reading
  331 Hits
  0 Comments
331 Hits
0 Comments

Building Business Cases for Investing in Network Performance Management

  In today's digital economy, network performance often determines business performance. Unfortunately, many network managers lack the right tools to manage performance. They have an incomplete picture, especially as networks scale and grow in complexity and applications migrate to the cloud. Monitoring service health and network availability ...
Continue reading
  318 Hits
  0 Comments
318 Hits
0 Comments

Adventures of a Network Monitoring Newbie: The Final Network Security Frontier

T he last part of everything is always hard, they say. I suppose it has to do with having to let go. And, in my case, with deciding what to write about or what's the best way to end the series. Lately I've been reading a lot about cybersecurity, and how it affects everybody, on a personal and a professional level. That's how the idea for this last ...
Continue reading
  327 Hits
  0 Comments
327 Hits
0 Comments

Fiber Taps - Y Cables Matter

Passive fiber optic taps are very simple devices. They almost never go wrong. In fact they have MTBF figures calculated in millions of hours. You will certainly die before they will! However Ixia often gets questions from customers of the kind "I've installed your tap, but it does not work - please send me a new one". In almost all cases this is du...
Continue reading
  659 Hits
  0 Comments
659 Hits
0 Comments

Discover Application Performance Issues Before Your Business Does!

Availability issues. Slow response times. Performance bottlenecks. Also web applications have problems that affect the satisfaction of your employees and customers. Identify and troubleshoot them before they impact your business with Flowmon APM, an agent-less solution to proactively drive user experience and application value.    Applica...
Continue reading
  395 Hits
  0 Comments
395 Hits
0 Comments

Webinar - Network Protocol Specialists

Date: Time: December 19, 2018  10:00 am Pacific Time (US ad Canada) Join Mike Pennacchi, where i n this webinar we will cover a number of tips and tricks related to network analysis and troubleshooting. Topics covered this month: Getting in the path of the packets - You can't analyze packets you didn't capture. In this webcast I'll be cov...
Continue reading
  412 Hits
  0 Comments
412 Hits
0 Comments

SNMP: The ABCs of Network Visibility

Network management and monitoring is a large topic. It includes device monitoring and management, device cluster monitoring and management,network monitoring and management, application monitoring and management, problem resolution, and elements of network security as well. In this blog, I wanted to focus on device monitoring. Devices are often ref...
Continue reading
  336 Hits
  0 Comments
336 Hits
0 Comments

Infosim® provides any-to-any IoT management with StableNet®

The unprecedented complexity of IoT is bringing together a universe of "things" that were not designed to work together or share data. Data is increasing exponentially. Competitive edge often depends on getting new services to market quickly. New management systems can take years to roll out.  Now there's StableNet® — an innovative, flexible p...
Continue reading
  1428 Hits
  0 Comments
1428 Hits
0 Comments

Contact Us

Address:

Telnet Networks Inc.
100 Strowger Blvd, Suite 118, Brockville, ON, K6V 5J9, Canada

Phone:

(800) 561-4019

Fax:

613-498-0075

For More Information about Telnet Networks, our products, or our services, or to request a quote please feel free to contact us directly.