Newsletter

 

For a Free Quote...

Latest Blog Posts

Telnet Networks News

Telnet Networks News - We'll keep you up to date with what's happening in the industry.

Sector2019 - Canada's Premier IT Security Conference!

 OCT 7-10 2019 Telnet Networks and InfoSim are proud sponsors this year of Canada's largest IT Security Conference, SecTor. SecTor2019 takes place in the South Building of the Metro Toronto Convention Centre (MTCC) on October 9 and 10, with the newly extended two-day training on October 7 and 8. As you continue to deploy new technology such as...

Continue reading
  4095 Hits

Key Components of an APM Solution

​Managing and troubleshooting applications or APM is a key reality for managing your network today. APM is understanding the application response time. In reality, there is a lot more that goes into ensuring applications are delivered on-time and meeting user expectations. To understand application response time you need to measure, quantify, and r...

Continue reading
  3124 Hits

Capturing In Time-Sensitive Networking Environments with ProfiShark

Time-Sensitive Networking (TSN) is a set of standards defining mechanisms for the time-sensitive transmission of data over Ethernet networks. Deterministic communication is critical to multiple industries (Audio Video Bridging, Automotive, Industrial and Power automation, Mobile Fronthaul Networks). The purpose of this feature b...

Continue reading
  3777 Hits

Capturing in Time-Sensitive Networking Environments with ProfiShark

Time-Sensitive Networking (TSN) is a set of standards  defining mechanisms for the time-sensitive transmission of data over Ethernet networks. Deterministic communication is critical to multiple industries (Audio Video Bridging, Automotive, Industrial and Power automation, Mobile Fronthaul Networks). The purpose of this feature brief...

Continue reading
  2931 Hits

End-User Experience: An IT Troubleshooting Revolution

What do you do when all your network performance indicators are green, but users are still complaining?  IT teams are drowning in hundreds of measurements and metrics and according to Forrester Research, one-third of user complaints linger without resolution for a month or are never resolved.  We've been approaching network performance mo...

Continue reading
  3553 Hits

It's Time to Prepare Your Network For the Effect of Rogue IOT Devices

One of the most common forms of network threats today is distributed denial of service (DDoS). An attack involves flooding networks and servers with false internet traffic, thereby blocking access to genuine devices. Sometimes used to target specific businesses, cyber-attacks can bring down entire telecoms networks, as was the case in the attack on...

Continue reading
  3101 Hits

Shaw Business introduces 1Gbps speeds across Western Canada

 Shaw Business – part of cableco Shaw Communications – announced on 7 March 2019 the availability of 1Gbps (download) internet speeds for B2B customers across Western Canada alongside upload speeds of up to 125Mbps 'in select areas'. In addition, from the same date business customers on eligible Shaw Business Internet and SmartWiFi 150 and 300...

Continue reading
  3277 Hits

Cybersecurity Checklist for Secure Timing

Network cybersecurity is top of mind these days for both government agencies and commercial enterprise. As the heart of network synchronization, time and frequency systems should include a standard suite of security features that give network administrators confidence in the cybersecurity protocols of their time servers. This is our philosophy at O...

Continue reading
  3367 Hits

CRTC launches mobile market review

The Canadian Radio-television and Telecommunications Commission (CRTC) has launched a review to examine the state of the mobile market and whether further action is required to improve choice and affordability for Canadians. The CRTC is also seeking comments on its preliminary view that MVNOs should have mandated access to the networks of the natio...

Continue reading
  3176 Hits

How to Bypass 5 Major Security Risks

 Bypass Risk.  Save time an Money Your businesses continue to invest in advanced security defenses, like next-generation firewalls and intrusion prevention systems (NGFW and NGIPS), data loss prevention (DLP), and other inline tools. These tools can significantly strengthen security, but may also add complexity, operational cost, and...

Continue reading
  3557 Hits

Global Webinar Day – StableNet® in the Mining Industry

Date: January 31st, 2019  Time: 4:00 pm (GMT +1)  Join Rinat Bedretdinov, Senior Engineer at CROC, and Dmitry Scherbakov, Regional Presales Manager at Infosim®, for a glistening webinar on how our Unified Network and Services Management solution StableNet® can make your business shine.We will illustrate how one of the global top gold prod...

Continue reading
  3020 Hits

Making The Shift to Network Security Resilience

​In the webinar above,the concept of network security resilience and how to implement it is explained. However, successful implementation relies upon making the fundamental mind shift to the strategy. One cannot expect to see the benefits if they don't embrace change. ​However, change is easier said than done. It seems like many security engineers,...

Continue reading
  3065 Hits

Building Business Cases for Investing in Network Performance Management

 In today's digital economy, network performance often determines business performance. Unfortunately, many network managers lack the right tools to manage performance. They have an incomplete picture, especially as networks scale and grow in complexity and applications migrate to the cloud. Monitoring service health and network availability i...

Continue reading
  2829 Hits

Adventures of a Network Monitoring Newbie: The Final Network Security Frontier

The last part of everything is always hard, they say. I suppose it has to do with having to let go. And, in my case, with deciding what to write about or what's the best way to end the series. Lately I've been reading a lot about cybersecurity, and how it affects everybody, on a personal and a professional level. That's how the idea for this last e...

Continue reading
  3145 Hits

APPLICATION DEPENDENCY MAPPING: CRITICAL TO ENSURING BUSINESS AVAILABILITY

In 2013, in a legal case that sent waves through the IT industry, Sears Holding Corp. filed lawsuits against two IT vendors involved in maintaining and providing equipment for the company's data center. Sears alleged that, as a result of multiple power outages and ongoing issues, the company had lost an estimated $2.2 million in profits and another...

Continue reading
  3299 Hits

Discover Application Performance Issues Before Your Business Does!

Availability issues. Slow response times. Performance bottlenecks. Also web applications have problems that affect the satisfaction of your employees and customers. Identify and troubleshoot them before they impact your business with Flowmon APM, an agent-less solution to proactively drive user experience and application value.   Applicat...

Continue reading
  3226 Hits

SNMP: The ABCs of Network Visibility

Network management and monitoring is a large topic. It includes device monitoring and management, device cluster monitoring and management,network monitoring and management, application monitoring and management, problem resolution, and elements of network security as well. In this blog, I wanted to focus on device monitoring. Devices are often ref...

Continue reading
  3204 Hits

Twelve applicants for Canadian 600MHz auction

Innovation, Science & Economic Development Canada has published the final list of twelve applicants for the upcoming national mobile frequency auction in the 600MHz band. Alongside the big three nationwide mobile operators Rogers Communications, Bell Mobility (part of Bell Canada) and Telus, the other nine applicants are: Freedom Mobile (owned ...

Continue reading
  2910 Hits

Can Flow Monitoring Work on Encrypted Traffic?

Encrypted traffic is on the rise. It's no longer possible to inspect the content of the communication. What does this mean for network traffic monitoring? Encrypted traffic is on the rise. In 2016, NSS Labs found out that 97% of surveyed enterprises saw an increase in encrypted web traffic. Both Let's Encrypt and Google  currently re...

Continue reading
  3556 Hits

Candela - LANforge FIRE & ICE 5.3.8 has been Released

Release 5.3.8 adds REST automation API support, improved wave-2 WiFi performance and stability, an improved RF RADAR generator and more. See the Release Notes for more details. Click here for more releases.  New Features & Improvements Release 5.3.8 (November 13, 2018) ​ Support Virtual Router Function (VRF) in kernel 4.16 and higher....

Continue reading
  3619 Hits

Contact Us

Address:

Telnet Networks Inc.
4145 North Service Rd. Suite 200
Burlington, ON  L7L 6A3
Canada

Phone:

(800) 561-4019

Fax:

613-498-0075

For More Information about Telnet Networks, our products, or our services, or to request a quote please feel free to contact us directly.