Newsletter

 

For a Free Quote...

Latest Blog Posts

Telnet Networks News

Telnet Networks News - We'll keep you up to date with what's happening in the industry.

Making Time Sensitive Networks Resilient Against Threats: Recent Advances

Today's time sensitive networks rely on available and accurate positioning, navigation and timing (PNT) signals to provide leaders with the information required to make timely and effective decisions. The proliferation of GNSS-degrading and denying devices across state and non-state actors put this critical information capability in jeopardy. Learn...

Continue reading
  3959 Hits

Freedom Mobile expands VoLTE availability

 Canada's fourth largest cellco Freedom Mobile, a subsidiary of Shaw Communications, last week expanded the availability of VoLTE services to additional smartphones including the Samsung Galaxy S9/S9+ and the LG V30/Q6/Q Stylo+/X Power 3, having initially launched VoLTE in mid-August (supported by LG G6/G7 phones, and Samsung Galaxy S8/S8 Plus...

Continue reading
  3771 Hits

Network Security Resilience Reduces Breach Risk and Cost

 It has been stated many times that for most companies it's not a question of IF you will be breached, but WHEN. The good news is that being forewarned makes you forearmed. So now that you know, what will you do about it? Doing nothing won't help your company and it won't help your career either. Common wisdom says that you should invest milli...

Continue reading
  3067 Hits

Bell completes acquisition of Axia NetMedia, takes full control of Alberta SuperNet

Bell Canada Enterprises (BCE) yesterday completed its acquisition of Axia NetMedia Corporation, the Calgary-based operator of SuperNet, the Alberta broadband network connecting thousands of provincial and municipal offices, Indigenous communities, schools, libraries, healthcare institutions, businesses and ISPs throughout the province. In addition ...

Continue reading
  3296 Hits

The Unexpected Benefits Of Contact Center Load Testing Setup

 Are you launching a new contact center and thinking of running a load test to make sure it works? Load Testing is not just about throwing 100 or 1,000 or even 10,000 calls at a solution to see what happens. That's taking the "let's see if this breaks it!" approach, and like I've mentioned before, that becomes a self-fulfilling prophecy. Many ...

Continue reading
  3063 Hits

DEFENDING NETWORKS WITH "BEST OF BOTH WORLDS"

 More and more organisations are struggling to keep up with the rapid IT developments and the increasing number of attacks. One thing is for sure, neither are going to get any less. That is why it is important to implement a strategy and solutions that are flexible and scalable in order to continuously anticipate changes. In terms of secu...

Continue reading
  3149 Hits

How Much Would You Pay for Free Software?

In the past few years, open-source software (OSS) has experienced a real boom. Driven from its free availability and the spirit of dedicated communities, OSS managed to spread like a wildfire and made its way into various sectors: healthcare, science, engineering, and the food industry, just to name a few. It is no wonder as the benefits are tempti...

Continue reading
  3044 Hits

Network Security Conference Data Connectors – September 6, 2018

 Come join Telnet Networks and ProfiTap at Data Connectors in Montreal being held at Hotel Omni Mont-Royal on September 6th. This Cyber Security Conference will feature vendor displays and educational speakers discussing current cyber-security issues such as cloud security, email security, VoIP, LAN Security, wireless security and more. We wil...

Continue reading
  3575 Hits

Firewall Configuration/Network Configuration and Change Management (NCCM)

Turn on any "techy" TV show or movie these days and you are bound to see some reference to hackers trying to break into corporate or government networks by breaching firewalls. While many of the scenarios are unrealistic as they are portrayed onscreen, the real-life battle between security vendors and hackers does go on. In their effort to defeat t...

Continue reading
  3241 Hits

VIAVI'S State of the Network Study 2018

As hybrid IT migration escalates, 65 percent of IT teams are responsible for resolving cloud issues, according to 11th annual State of the Network Study. ​ VIAVI released the results of its 11th annual State of the Network global study. Findings demonstrate that a significant portion of enterprise IT teams are unsure how to handle cloud migration c...

Continue reading
  3106 Hits

Cybersecurity – the Rising Challenge of the 21st Century

The internet has grown to a point where we cannot imagine life without it. From the beginning of the 21st century, we've seen an incredible growth in the amount of people that have access to the internet, with around 40% of the world population having an internet connection today. In 1995, it was less than 1%. While mankind benefits enormously from...

Continue reading
  3331 Hits

Xplornet Announces Mobile Launch Plan

Canadian rural fixed-wireless broadband operator Xplornet yesterday revealed that it will launch 4G LTE mobile network services in Manitoba this autumn under the Xplore Mobile brand. Xplornet obtained mobile 700MHz/1700MHz/2500MHz frequencies for the province in March 2017 in a windfall from Bell Canada's takeover of Manitoba Telecom Services, unde...

Continue reading
  3438 Hits

The Associated Expenses That Add To The Cost of a Ransomware Attack

Organizations typically consider two figures when attempting to calculate the cost of a ransomware attack: the ransom demand and the cost of recovering data. But more goes into restoring a system than those two factors, judging from the recovery efforts organizations mounted following recent ransomware attacks. Temporary staff increases, consu...

Continue reading
  3226 Hits

Business Benefits of Network Behavior Analysis

When we talk about the business value of a tool or a system that (at first point) may seem like a "nice to have" or "helpful but not absolutely necessary" technology or system, it is good idea to start this discussion by putting some things in perspective. Business in this day and age depend on ensuring (at least) confidentiality, integrity and ava...

Continue reading
  3125 Hits

One Way To Stop The IT Blame Game

How well does your company communicate internally? Specifically, how well do your IT departments communicate with each other? Enterprises typically contain four or more IT sub departments (Security, Network Operations, Virtual DC, Capacity Planning, Service Desk, Compliance, etc.) and it's quite common for them to be at odds with each other, even i...

Continue reading
  3021 Hits

Why is Timestamping Important for Packet Capture

Everything happening on the network is time sensitive, that's why timestamps are extremely important when we're talking about packet capture and analysis. This feature can not only prevent and analyze cyber attacks, but it can also allow you to examine trends and network latency.  Network packet timestamping can be used to investigate various ...

Continue reading
  3903 Hits

DNS Traffic Analysis - Make networks more secure

It's quite easy to overlook the Domain Name System (DNS) and the critical role it plays across the internet and in local intranets. This is largely because, despite our everyday reliance on DNS, it is basically transparent to users and it's taken for granted that it will just work. When an ordinary person opens a web browser and types in something ...

Continue reading
  3576 Hits

The Advent of Tightly Synchronized Clocks in Distributed Systems

The last decade has brought a paradigm shift in computing systems from single processor devices whose performance plateaued to distributed computing systems. In distributed systems, nodes execute concurrently with limited information about what the other nodes are executing at the moment. Thus, a fundamental problem in distributed sy...

Continue reading
  3640 Hits

Network Configuration & Change Management Best Practices with StableNet®

Solution Strengths comprehensive solution for Configuration, Performance and Fault Management unified code base eliminates need for fault prone module/product integration ultra scalable architecture, nothing gets added that could impact scalability End-to-End awareness delivers automated dependencies, root cause and delivers massive automation benefits ROI in months, not years A truly ‘‘VendorAgnostic“ Solution supports many different network hardware manufacturers, including Cisco, Huawei, Juni...

Continue reading
  4032 Hits

Measuring Device Latency with the ProfiShark

Mike Penacchi shows us how to use the SPAN mode of the ProfiShark while determining and comparing the latency introduced by a Microtik configured to use NAT; determining the latency that a device adds to the network can be difficult. In this video, Mike with Network Protocol Specialists, LLC; shows how the ProfiShark can be used to a...

Continue reading
  3458 Hits

Contact Us

Address:

Telnet Networks Inc.
4145 North Service Rd. Suite 200
Burlington, ON  L7L 6A3
Canada

Phone:

(800) 561-4019

Fax:

613-498-0075

For More Information about Telnet Networks, our products, or our services, or to request a quote please feel free to contact us directly.