Latest Blog Posts

Newsletter

 

For a Free Quote...

Telnet Network News

Telnet Network News - We'll keep you up to date with what's happening in the industry.

Network Security Resilience – What Is It?

In a recent webinar, Best Practices for Security Resilience, Jon Oltsik (an analyst from ESG Research Group) and I discussed the topic of network security resilience. The basic concept is that it is not a question of "IF" your company network will be breached, but "WHEN". The real question for you to answer is, "How painful do you want that breach ...
Continue reading
  33 Hits
  0 Comments
33 Hits
0 Comments

What to do when traffic overwhelms your monitoring tools

​ Growing traffic volume is a challenge for NetOps and SecOps as they work to ensure high-quality network performance and network security. As traffic volume exceeds a monitoring tool's capacity, congestion at the data port can cause a tool to slow down, start dropping packets, or even stop working altogether. While you wait for budget approval to ...
Continue reading
  85 Hits
  0 Comments
85 Hits
0 Comments

How to Improve Enterprise Network Visibility

Network requirements are constantly changing in enterprises. The network goal of every enterprise is to be more efficient and cost-effective while embracing the changes. There are several network visibility solutions/vendors available in the market. However, each network has a different requirement and not solutions fit every network architecture. ...
Continue reading
  156 Hits
  0 Comments
156 Hits
0 Comments

Where Should I Place My TAP?

Two common methods to copy traffic to your monitoring or security tools is a Span port or network tap. Span can be convenient for quick troubleshooting, remote locations or when you do not have access to the physical infrastructure. The risk of using a span port is that It can be over subscribed, and the lowest priority when it comes to forwarding ...
Continue reading
  161 Hits
  0 Comments
161 Hits
0 Comments

Ixia's 2019 Security Report

Welcome to the third annual Security Report issued by Ixia, a Keysight business. Each year, the Ixia Application and Threat Intelligence (ATI) Research Centre summarizes the most interesting and prominent internet security trends. We analyze ATI data to help organizations understand where they can improve. We also analyze the data to predict the bi...
Continue reading
  187 Hits
  0 Comments
187 Hits
0 Comments

How to Determine What Ports are Active on a Server

Active Server Ports  ​ I spent most of last week on the visiting customers. Many of them were working on projects to reduce the number of physical servers hosted in their data centers. In some cases, they wanted to move the servers to cloud service such as AWS or Azure. In others, they wanted to virtualize the servers locally on platforms such...
Continue reading
  228 Hits
  0 Comments
228 Hits
0 Comments

IXIA Presents: VISION Edge 1S: Unlocking Opportunity at the Network Edge

The network edge is changing fast, and rapid change brings opportunity. With more applications and devices running at branch locations, performance monitoring and analysis must move closer to the customer - and so must visibility. Ixia's Vision E1S, the latest addition to their "Vision Edge" network packet broker (NPB) series , meets fast-growing d...
Continue reading
  142 Hits
  0 Comments
142 Hits
0 Comments

Cost-effective Aggregation with Booster Aggregation TAPs

​ Traffic monitoring is a must for IT administrators these days, and an integral part of most enterprise networks. There are many different approaches to getting visibility into the network, but using a TAP has proven to be the most accurate and reliable. Read more here about why a network TAP is better than a SPAN.   Among all these network h...
Continue reading
  331 Hits
  0 Comments
331 Hits
0 Comments

Give Your Network An Unfair Advantage Against Hidden Malware

​ The IT role is extremely hard today. Whether you are part of the DevOps or SecOps team makes no difference - threats and problems are a daily, if not hourly, occurrence. What you need is good quality data as fast as you can get it to counter security threats, troubleshoot network outages, and remediate performance problems. Unfortunately, IT...
Continue reading
  165 Hits
  0 Comments
165 Hits
0 Comments

Report Summary TLS 1.3 Adoption in the Enterprise

​ Cyber defenses encrypt data to keep it safe while hackers encrypt malware to sneak threats onto your network. A new report from Enterprise Management Associates (EMA) says enterprises see the new Transport Layer Security (TLS) 1.3 encryption standards as offering greater privacy and security—over 70 percent of respondents have or will start enabl...
Continue reading
  346 Hits
  0 Comments
346 Hits
0 Comments

Introductory Guide to Network Packet Brokers

  What is a Network Packet Broker? A Network Packet Broker (NPB) is a switch-like network device ranging in size from portables devices to 1 and 2 RU units, up to massive chassis and blade systems. Unlike a switch, a Network Packet Broker does not alter the traffic passing through it in any way unless specifically instructed to do so. An NPB c...
Continue reading
  292 Hits
  0 Comments
292 Hits
0 Comments

Network Traffic Metadata – Four Recent Customer Use Cases

The rising popularity of network traffic metadata is because it's in the sweet spot between full packet capture like Wireshark and PCAPs on one hand and NetFlow on the other, which lacks detail and drill down. Drill down, granularity, context, and continuous internal visibility are now absolutely critical for organizations of all sizes including SM...
Continue reading
  337 Hits
  0 Comments
337 Hits
0 Comments

Fiber Taps - Y Cables Matter

Passive fiber optic taps are very simple devices. They almost never go wrong. In fact they have MTBF figures calculated in millions of hours. You will certainly die before they will! However Ixia often gets questions from customers of the kind "I've installed your tap, but it does not work - please send me a new one". In almost all cases this is du...
Continue reading
  668 Hits
  0 Comments
668 Hits
0 Comments

Discover Application Performance Issues Before Your Business Does!

Availability issues. Slow response times. Performance bottlenecks. Also web applications have problems that affect the satisfaction of your employees and customers. Identify and troubleshoot them before they impact your business with Flowmon APM, an agent-less solution to proactively drive user experience and application value.    Applica...
Continue reading
  401 Hits
  0 Comments
401 Hits
0 Comments

Webinar - Network Protocol Specialists

Date: Time: December 19, 2018  10:00 am Pacific Time (US ad Canada) Join Mike Pennacchi, where i n this webinar we will cover a number of tips and tricks related to network analysis and troubleshooting. Topics covered this month: Getting in the path of the packets - You can't analyze packets you didn't capture. In this webcast I'll be cov...
Continue reading
  414 Hits
  0 Comments
414 Hits
0 Comments

SNMP: The ABCs of Network Visibility

Network management and monitoring is a large topic. It includes device monitoring and management, device cluster monitoring and management,network monitoring and management, application monitoring and management, problem resolution, and elements of network security as well. In this blog, I wanted to focus on device monitoring. Devices are often ref...
Continue reading
  349 Hits
  0 Comments
349 Hits
0 Comments

Visibility is Security

While security experts may disagree on exactly how to secure a network, one thing they all agree on is that you cannot defend against what you cannot see. In other words, network visibility IS network security. Visibility needs to be the starting the point. After that, you can implement whatever appliances, processes, and configurations you need to...
Continue reading
  688 Hits
  0 Comments
688 Hits
0 Comments

Inspecting SSL Traffic

A delicate balancing act is taking place on networks globally. It is the balance between applying strong protective measures to keep data safe and unintentionally concealing new IT security vulnerabilities. And it all centers on SSL (Secure Socket Layer) encryption. Just as SSL encryption protects certain details of a transaction, it can also conce...
Continue reading
  2180 Hits
  0 Comments
2180 Hits
0 Comments

Ixia Special Edition Network Visibility For Dummies

 Advanced cyber threats, cloud computing, and exploding traffic volume pose significant challenges if you are responsible for your organization's network security and performance management. The concept of 'network visibility' is frequently introduced as the key to improvement. But what exactly is network visibility and how does it help an org...
Continue reading
  1128 Hits
  0 Comments
1128 Hits
0 Comments

Infosim's Veni, Vidi, Vici: Seeing as an integral part of conquering your network Webinar

Infosim's Global Webinar  Julius Caesar knew that, in order to conquer an issue, you need to get a good overview of the situation you are facing. In this Webinar, Infosim shows you how an ideal visualization solution can help you conquer your network issues.  Join Paul Krochenski, Sales Manager at Infosim®, and Jason Farrer...
Continue reading
  1342 Hits
  0 Comments
1342 Hits
0 Comments

Contact Us

Address:

Telnet Networks Inc.
100 Strowger Blvd, Suite 118, Brockville, ON, K6V 5J9, Canada

Phone:

(800) 561-4019

Fax:

613-498-0075

For More Information about Telnet Networks, our products, or our services, or to request a quote please feel free to contact us directly.