Telnet Network News

Telnet Network News - We'll keep you up to date with what's happening in the industry.

What Makes a Network TAP the Right Tool for Monitoring

In today's connected world, your network is one of your most important assets. An underperforming network is something you cannot afford, be it from a performance or from a security standpoint, because it can greatly hinder your business's capabilities.In order to ensure optimum performance and security at all times, network engineers need a clear,...
Continue reading
  521 Hits
  0 Comments
521 Hits
0 Comments

Reduce the cost of tool sprawl with smarter network monitoring

By Jason Lackey, Network and Security Marketing, Keysight Technologies Monitoring tools have always been critical for ensuring network performance and security. Top vendors have designed new tools specifically for monitoring networks with virtualization, cloud infrastructure, distributed data centers, and edge computing. Way back in 2016, Enterpris...
Continue reading
  615 Hits
  0 Comments
615 Hits
0 Comments

Introductory Guide to Network Packet Brokers

 What is a Network Packet Broker? A Network Packet Broker (NPB) is a switch-like network device ranging in size from portables devices to 1 and 2 RU units, up to massive chassis and blade systems. Unlike a switch, a Network Packet Broker does not alter the traffic passing through it in any way unless specifically instructed to do so. An NPB ca...
Continue reading
  2057 Hits
  0 Comments
2057 Hits
0 Comments

Network Monitoring is Changing

Networking is changing rapidly, speed and bandwidth requirements have grown exponentially, new traffic types appear daily, and now a functioning network is a crucial and necessary part of running a successful large or small business in any market. You are expected to provide critical business applications in a secure, always-up network environment....
Continue reading
  2378 Hits
  0 Comments
2378 Hits
0 Comments

The Choice Between Network Availability and Security

Do you have to give up on network availability when deploying your inline security tools? By using a iBypass switch "YOU DON'T HAVE TO CHOOSE"  When a network monitoring device such as an IPS is deployed inline in a network, it is vital to ensure that traffic continues to flow in all circumstances, even if the IPS loses power, so that mission-...
Continue reading
  2511 Hits
  0 Comments
2511 Hits
0 Comments

Evaluating Inline Security Fabric: Your Key Considerations

Would you like to see and detect more security threats in your production network? The key to inline security monitoring are fail-safe tool deployment, maximum traffic inspection, and super-fast failover. This white paper will show you how ​To access 100% of your network trafficIncrease the efficiency of your security toolsUse security intelligence...
Continue reading
  2810 Hits
  0 Comments
2810 Hits
0 Comments

Inspecting SSL Traffic

A delicate balancing act is taking place on networks globally. It is the balance between applying strong protective measures to keep data safe and unintentionally concealing new IT security vulnerabilities. And it all centers on SSL (Secure Socket Layer) encryption. Just as SSL encryption protects certain details of a transaction, it can also conce...
Continue reading
  3700 Hits
  0 Comments
3700 Hits
0 Comments

Ixia Special Edition Network Visibility For Dummies

 Advanced cyber threats, cloud computing, and exploding traffic volume pose significant challenges if you are responsible for your organization's network security and performance management. The concept of 'network visibility' is frequently introduced as the key to improvement. But what exactly is network visibility and how does it help an org...
Continue reading
  2852 Hits
  0 Comments
2852 Hits
0 Comments

Private Cloud: The ABCs of Network Visibility

Cloud computing has become the de facto foundation for digital business. As more and more enterprises move critical workloads to private and public clouds, they will face new challenges ensuring security, reliability, and performance of these workloads. If you are responsible for IT security, data center operations, or application performance, make...
Continue reading
  2942 Hits
  0 Comments
2942 Hits
0 Comments

Ixia's new hyperscale visibility with cost effective pricing

Vision Edge 100 & Vision Edge 40 ​Expanding your hyperscale data center? Adding microscale data centers to provide a better experience for end users? Be sure to see everything, in every cluster—whether it is a part of your core infrastructure or a remote site—with the latest in Ixia's Vision Portfolio of network packet brokers (NPBs). Ixia has ...
Continue reading
  3152 Hits
  0 Comments
3152 Hits
0 Comments

Ixia Debuts New Network Tap

Among the most useful pieces of physical hardware that networking professionals can utilize is a network tap. With a network tap, physical networks can be monitored for outliers as well as potential injection attacks. Network security vendor Ixia is now expanding its portfolio of network taps with the new Flex Tap Secure+. Kevin Formby, VP of market development at Ixia, told Enterprise Networking Planet that the new Flex Tap Secure+ is a net new addition to Ixia's portfolio and doesn't replace a...
Continue reading
  3913 Hits
  0 Comments
3913 Hits
0 Comments

ThreatARMOR Reduces Your Network’s Attack Surface

2014 saw the creation of more than 317 million new pieces of malware. That means an average of nearly one million new threats were released each day. Here at Ixia we’ve been collecting and organizing threat intelligence data for years to help test the industry’s top network security products. Our Application and Threat Intelligence (ATI) research center maintains one of the most comprehensive lists of malware, botnets, and network incursions for exactly this purpose. We’ve had many requests to l...
Continue reading
  3397 Hits
  0 Comments
3397 Hits
0 Comments

Don’t Be Lulled to Sleep with a Security Fable. . .

Once upon a time, all you needed was a firewall to call yourself “secure.” But then, things changed. More networks are created every day, every network is visible to the others, and they connect with each other all the time—no matter how far away or how unrelated. And malicious threats have taken notice . . . As the Internet got bigger, anonymity got smaller. It’s impossible to go “unnoticed” on the Internet now. Everybody is a target. Into today’s network landscape, every network is under the t...
Continue reading
  3546 Hits
  0 Comments
3546 Hits
0 Comments

The State of Enterprise Security Resilience - An Ixia Research Report

Ixia, an international leader in application performance and security resilience technology, conducted a survey to better understand how network security resilience solutions and techniques are used within the modern enterprise. While information exists on security products and threats, very little is available on how it is actually being used and the techniques and technology to ensure that security is completely integrated into the corporate network structure. This report presents the research...
Continue reading
  2943 Hits
  0 Comments
2943 Hits
0 Comments

The Importance of State

Ixia recently added passive SSL decryption to the ATI Processor (ATIP). ATIP is an optional module in several of our Net Tool Optimizer (NTO) packet brokers that delivers application-level insight into your network with details such as application ID, user location, and handset and browser type. ATIP gives you this information via an intuitive real-time dashboard, filtered application forwarding, and rich NetFlow/IPFIX. Adding SSL decryption to ATIP was a logical enhancement, given the increasin...
Continue reading
  4112 Hits
  0 Comments
4112 Hits
0 Comments

Ixia Taps into Visibility, Access and Security in 4G/LTE

The Growing Impact of Social Networking Trends on Lawful Interception Lawful Interception (LI) is the legal process by which a communications network operator or Service Provider (SP) gives authorized officials access to the communications of individuals or organizations. With security threats mushrooming in new directions, LI is more than ever a priority and major focus of Law Enforcement Agencies (LEAs). Regulations such as the Communications Assistance for Law Enforcement Act (CALEA), mandate...
Continue reading
  3241 Hits
  0 Comments
3241 Hits
0 Comments

Ixia Taps into Hybrid Cloud Visibility

One of the major issues that IT organizations have with any form of external cloud computing is that they don’t have much visibility into what is occurring within any of those environments. To help address that specific issue, Ixia created its Net Tool Optimizer, which makes use of virtual and physical taps to provide visibility into cloud computing environments. Now via the latest upgrade to that software, Ixia is providing support for both virtual and physical networks while doubling the numbe...
Continue reading
  3945 Hits
  0 Comments
3945 Hits
0 Comments

Inline Security Solutions from Ixia

Flexible, Fail-Safe Inline Security Boosts Agility, Availability, and Resilience While Reducing Network Costs As networks deliver more services and carry ever-higher volumes of multiprotocol traffic, data rates continue to soar. Voice, data, and streaming video now travel on one wire, raising security and compliance issues. Today’s intense threat landscape demands multiple proactive security systems throughout the network for a strong, layered security posture. These proactive devices include fi...
Continue reading
  3327 Hits
  0 Comments
3327 Hits
0 Comments

A Simple Solution To Combatting Virtual Data Center Blind Spots

Blind spots are a long-established threat to virtual data centers. They are inherent to virtual machine (VM) usage and technology due to the nature of VMs, lack of visibility for inter- and intra-VM data monitoring, the typical practices around the use of VM’s, and the use of multiple hypervisors in enterprise environments. Virtual machines by their nature hide inter- and intra-VM traffic. This is because the traffic stays within in a very small geographic area. As I mentioned in a previous blog...
Continue reading
  3251 Hits
  0 Comments
3251 Hits
0 Comments

Ixia Exposes Hidden Threats in Encrypted Mission-Critical Enterprise Applications

Delivers industry’s first visibility solution that includes stateful SSL decryption to improve application performance and security forensics Ixia (Nasdaq: XXIA), a leading provider of application performance and security resilience solutions, announced it has extended its Application and Threat Intelligence (ATI) Processor™ to include stateful, bi-directional SSL decryption capability for application monitoring and security analytics tools. Stateful SSL decryption provides complete session info...
Continue reading
  3014 Hits
  0 Comments
3014 Hits
0 Comments

Contact Us

Address:

Telnet Networks Inc.
740 Augusta Dr.
Suite 202
Kingston, ON  K7P 0R5
Canada

Phone:

(800) 561-4019

Fax:

613-498-0075

For More Information about Telnet Networks, our products, or our services, or to request a quote please feel free to contact us directly.

Latest Blog Posts

Latest Blog Posts