Telnet Network News

Telnet Network News - We'll keep you up to date with what's happening in the industry.

Ixia’s iBypass 3: Most Efficient Copper Bypass Switch Available

Ixia is proud to announce the new Ixia Net Optics iBypass 3 Switch. This switch sets a new standard for flexibility, efficiency, and usability in copper bypass switching by supporting up to eight bypass switches in 1U – 4 times the density of our last gigbabit copper bypass switch. In addition to space efficiency, the iBypass 3 achieves class-leading power savings of 48% over the last generation of bypass switch! Ixia bypass switches provide a permanent and trouble-free access port for in-line n...
Continue reading
  3266 Hits
  0 Comments
3266 Hits
0 Comments

Exposing the Ghost in the Virtual Machine

Virtualization continues to be an important data center success story. This technology has reduced physical plant hardware footprints, power costs, and cooling costs – significantly improving the total cost of ownership for the data center. At the same time, however, virtualization technology has also introduced a set of problems. These problems have decreased the visibility into what is happening within the virtual network, and can be summarized as follows: Lack of visibility hides potential se...
Continue reading
  5500 Hits
  0 Comments
5500 Hits
0 Comments

Network Visibility Solutions- Solution Brief

Optimal Visibility and Control of Your Data Center Ixia’s portfolio provides complete network visibility into physical and virtual networks, improves network security and optimizes monitoring tool performance. The Anue NTO ensures that each monitoring tool gets exactly the right data needed for analysis. This improves the way you manage your data center and maximizes return on investment. What Our Customers Say “The Anue NTO makes my life easier. It makes complex data monitoring simple and allow...
Continue reading
  2470 Hits
  0 Comments
2470 Hits
0 Comments

Taking a Quantum Leap in Network Visibility

In our area of technology, we often think of our products in terms of how they compare to the rest of the products in the same market segment. Maybe we can highlight one facet of a unique feature and point out how nobody else offers it – or at least not in that way. It is tempting to compare features line-by-line when you have competitors who offer products that are generally similar. But now I have the opportunity to talk about a market where nobody else has gone. Ixia can show something that i...
Continue reading
  3296 Hits
  0 Comments
3296 Hits
0 Comments

Phantom vTap v3.5 Release

The Phantom Virtualization Tap™ (Phantom vTap™) v3.5 release is now available. This software solution provides IT monitoring staff access to packet data in virtualized data centers, allowing you to pinpoint performance issues and improve network security. With this capability, you can remove virtualized data center blind spots by exposing the approximately 80% of hidden inter-VM ("east-west") traffic that exists in this environment and that raises the risk of undetected threats or perf...
Continue reading
  3203 Hits
  0 Comments
3203 Hits
0 Comments

Why Network Monitoring Is Changing?

IT needs end-to-end visibility, meaning tool access to any point in the physical and virtual network, and it has to be scalable and easy to manage, says Jason Echols, IXIA Networking is a rapidly evolving and changing landscape. We've quickly moved from parsing bits and bytes from workstation to workstation to providing powerful applications and services to millions of consumers. Speed and bandwidth requirements have grown exponentially, new traffic types appear daily, and now a functioning netw...
Continue reading
  2642 Hits
  0 Comments
2642 Hits
0 Comments

Demystifying NFV: Ixia’s Latest eBook Takes the Risks Out of Virtualization

Network Functions Virtualization (NFV) is perhaps the most profound paradigm shift facing the networking industry. In carrier networks, proven functions such as switching, routing, firewall, and other security elements migrate from proven hardware platforms to unproven virtualized servers controlled by software to gain efficiency and flexibility. Carriers worldwide agree on the need and vision for virtualization, but may still struggle to quantify the benefits, understand practical migration ste...
Continue reading
  2450 Hits
  0 Comments
2450 Hits
0 Comments

Application Intelligence For Your Monitoring Tools

Application intelligence (the ability to monitor packets based on application type and usage) is the next evolution in network visibility. It can be used to dynamically identify all applications running on a network. Distinct signatures for known and unknown applications can be identified, captured, and passed on to specialized monitoring tools in order to provide network managers a complete view of their network. In addition, well-designed visibility solutions will gather additional (contextual...
Continue reading
  3271 Hits
  0 Comments
3271 Hits
0 Comments

Understanding The Needs Of Today's Financial Networks

Good Decisions Reduce Risk The financial industry is at the forefront of network technology. The traditional image of bankers and financial traders is really an anachronism. The reality is that the financial industry, from retail banking to high speed trading, is at the cutting edge of network innovation – for better or for worse. Whether adopting new technologies to allow customers broad-based mobile access, squeezing out the last few nanoseconds of latency, or providing air-tight security, net...
Continue reading
  2546 Hits
  0 Comments
2546 Hits
0 Comments

Application Intelligence: THE Driving Force In Network Visibility

Business networks continue to respond to user and business demands, such as, access to more data, bring your own device (BYOD), virtualisation and the continued growth of the Internet of Things. Historically much of the traffic that runs through these networks has been known to network administrators but access to application and user data remains lacking. Application intelligence - the ability to monitor application flows based on application type - provides the insight that is desperately requ...
Continue reading
  2421 Hits
  0 Comments
2421 Hits
0 Comments

The 3 Key Attributes Of A Visibility Architecture

A visibility architecture is essential for security, network and integrated, service-oriented operations teams to establish and maintain a continuous awareness of activity, health, and performance of applications and infrastructure. Such awareness is only possible with continuous, reliable network visibility. But this is not an easy task when network and security professionals must ensure security and proactively meet performance expectations in dynamic, virtualized environments with increasingl...
Continue reading
  2249 Hits
  0 Comments
2249 Hits
0 Comments

Network Monitoring Tools Overview

With the rapid increase in network complexity – as well as customer dependence on enterprise network applications and services – it's more and more important that operators understand what, how, and when traffic is traversing the network. Network monitoring is the increasingly powerful connected set of tools used in controlling, maintaining, and optimizing networks. A network management system (NMS) is a set of devices and applications that allow a network operator to supervise the individual co...
Continue reading
  2586 Hits
  0 Comments
2586 Hits
0 Comments

Ixia Network Visibility Operating System 4.2 General Availability

The Network Visibility Operating System (NVOS) v4.2 release is now available for download to current Net Tool Optimizer® (NTO) customers at the Ixia Customer Portal. Partners can find the MIBS files and user guide on Ixia Partner Portal product section. This new software update supports the following NTO models: NTO 5288, NTO 5293, and ControlTower (NTO 5260, 5263 and 5268.) What is New Advanced Feature Module (AFM16) enhancements New FabricPath stripping feature Expanded de-duplication con...
Continue reading
  2203 Hits
  0 Comments
2203 Hits
0 Comments

ControlTower Gains FabricPath Stripping

Networking technology continues to evolve. An example of such evolution is the development of something called FabricPath. FabricPath was invented by Cisco® in, or about, 2010 for their Nexus line of switches (e.g., Nexus 7000 and Nexus 5500) as part of their 3.0 release of VMDC. The key benefit of this technology is that it eliminates the complexities of Spanning Tree Protocol (STP) and thereby enables the building of massively scalable and flexible data centers. To accomplish this, FabricPath ...
Continue reading
  2737 Hits
  0 Comments
2737 Hits
0 Comments

The Key Components of a Visibility Architecture

More mobile devices are now connecting to more data from more sources. IT challenges are complicated by increasingly high customer expectations for always-on access and immediate application response. This complexity creates network "blind spots" where latent errors germinate, and pre-attack activity lurks. Stressed-out monitoring systems make it hard, if not impossible, to keep up with traffic and filter data "noise" at a rate that they were not designed to handle. Network blind spots have beco...
Continue reading
  2701 Hits
  0 Comments
2701 Hits
0 Comments

Application Visibility—Going Beyond Network Visibility

Managing networks is no longer about bits, bytes, and packets, but about application behavior and user experience. Managing applications and user experience drives the need for deeper visibility into your network, which comes from making higher-value data available to your network monitoring tools. Most network packet brokers offer functions that include granular filtering, load balancing, and deduplication, and some even have a packet capture/decode function. But Ixia’s solution goes beyond the...
Continue reading
  2763 Hits
  0 Comments
2763 Hits
0 Comments

Ixia Network Visibility Solution Troubleshoots Availability Problems

New Packet Capture Module helps customers quickly resolve network issues by capturing targeted packets for rapid resolution Ixia introduced its Packet Capture Module (PCM), the newest addition to its Visibility Architecture, which provides network engineers with the ability to capture and quickly analyze packets associated with service outages and establish root cause. Designed to take advantage of the single plane of glass user interface (UI), the packet capture and decode capabilities enable u...
Continue reading
  2385 Hits
  0 Comments
2385 Hits
0 Comments

Ixia Advances Network Visibility with Real-Time Network and Application Intelligence

New Application and Threat Intelligence Processor delivers smart contextual metadata to monitoring tools enabling customers to make better decisions Ixia introduced its Application and Threat Intelligence (ATI) Processor, which enhances the network, application and security insights IT organizations get from their existing monitoring tools. This is the first product of its kind and provides Ixia’s Visibility Architecture with the ability to provide real-time information about users and applicati...
Continue reading
  2547 Hits
  0 Comments
2547 Hits
0 Comments

Ixia’s v7.8 Director and Director Pro Release Empowers Customers with More Flexibility and Security Controls

The Net Optics Director family of smart filtering appliances (Network Packet Brokers) directs traffic of interest to monitoring tools in order to relieve oversubscription, leverage tool investment across groups, and centralize monitoring in the NOC. As part of the new Director 7.8 software release, we are introducing several new key features for the Director and Director Pro product lines: Port behavior configuration options are enabled for customers: Previously, network ports were bi-directiona...
Continue reading
  2649 Hits
  0 Comments
2649 Hits
0 Comments

A Visibility Architecture For The New Network At InfoSec

Today's networks are growing in both size and complexity, presenting new challenges for IT and network administrators. More mobile devices are now connecting to more data from more sources—and much of that is due to virtualization. IT challenges are further complicated by increasingly high customer expectations for always onaccess and immediate application response. This complexity creates network “blind spots” where latent errors germinate, and pre-attack activity lurks. Blind spots are commonl...
Continue reading
  3011 Hits
  0 Comments
3011 Hits
0 Comments

Contact Us

Address:

Telnet Networks Inc.
740 Augusta Dr.
Suite 202
Kingston, ON  K7P 0R5
Canada

Phone:

(800) 561-4019

Fax:

613-498-0075

For More Information about Telnet Networks, our products, or our services, or to request a quote please feel free to contact us directly.

Latest Blog Posts

Latest Blog Posts