Telnet Network News

Telnet Network News - We'll keep you up to date with what's happening in the industry.

What is Network Detection and Response and How Does it Work?

By Filip Cerny of Flowmon Network Detection and Response (NDR) is a cybersecurity approach that focuses on identifying and mitigating malicious activities in real-time. NDR is an indispensable piece of an overall security operation strategy. So, what is Network Detection and Response (NDR)? Network Detection and Response uses non-signature-based te...

Continue reading
  240 Hits

5G Security

5G has introduced a number of improvements in security compared to 4G. 5G standards development has adopted 'Secure by Design' principles, using for example Mutual Authentication and acknowledging that all links could be tapped, but making sure that the encrypted information is worthless when intercepted. Security is a wide topic and has different ...

Continue reading
  698 Hits

Tackling security monitoring in high-speed networks 100/400G with Cubro Visibility Solutions

As organizations move towards higher-speed networks like 100/400G, they often encounter unexpected hurdles when it comes to security monitoring. The need for faster data transmission clashes with the limitations of existing tools, leaving them ineffective and struggling to keep up. In this blog, we will explore the challenges faced in security moni...

Continue reading
  946 Hits

Cybereason Sets the New Industry Standard in 2023 MITRE ATT&CK Evaluations: Enterprise

Written by Maranda Cigna, Vice President of Product Marketing at Cybereason Fresh off the press: the results of the 2023 MITRE Engenuity ATT&CK® Evaluations: Enterprise have been published, putting 30 security solutions to the test in real world scenarios that mimic the Turla threat actor. As is customary, many vendors have been in a frenz...

Continue reading
  1215 Hits

KeySight Releases 2023 Security Report

Keysight has released its 2023 Security Report. This report explores the key threats in 2022 and what you can expect in 2023. The key take away discussed in the report. 1. Ransomware will be a constant threat that must be addressed ahead of time by IT security departments Ransomware security attack successes are an indicator of a weakness in m...

Continue reading
  651 Hits

Lack of Visibility is a Killer for Cloud Deployments

A recent Enterprise Management Associates survey (Network Visibility Architecture for the Hybrid, Multi-Cloud Enterprise) found that 46% of IT professionals admitted that their migration to a cloud-based network created blind spots. Furthermore, the number of blind spots increased directly with the increase in the number of cloud networks deployed,...

Continue reading
  949 Hits

Three Key Area's to Address Deploying Inline Security Tools

Anyone in network security knows that it is a complicated and involved process. The clear goal is to prevent security breaches. How do you go about that though? There are so many schools of thought, methods, and configurations. Here are just a few examples: Cyber range trainingCyber resilience Defense in depthEncryptionEndpoint securityFirewallsInl...

Continue reading
  1831 Hits

The difference between network and security monitoring

Network monitoring can be described in many ways, but very often it is defined in the following way: 'Network management is the process of configuring, monitoring and maintaining a reliable network ensuring connectivity between devices and the people or software applications.' Several frameworks have been developed around network monitoring, for ex...

Continue reading
  1264 Hits

Tolly validates Cubro's innovative Custos solution that cost effectively improves network performance, security posture, compliance and planning

Cubro Network Visibility commissioned Tolly, a leading global provider of third-party validation services for vendors of IT products, components and services, to evaluate the usability, storage efficiency and approach to data structure used in Custos. Tests were run by evaluating a live network simultaneously using Cubro Custos and legacy NetFlow/ ...

Continue reading
  1978 Hits

Find Your Security Vulnerability Before Hackers Find It For You

Every Network Has a Security Vulnerability – Where is Yours? One of the top questions on the minds of network security personnel is "how do I reduce my security risk?" Even for smaller organizations, this is important because every network has a weakness. But do you know where you are the most vulnerable? Wouldn't you like to fix the problem now, b...

Continue reading
  1762 Hits

Proactive Threat Simulation to Test Your Cyber Defenses

By Gregory Copeland,  Director - Technical Alliances at Keysight Technologies Cybersecurity is rightfully a top concern for Enterprises and getting more so with all the high-profile breaches making the news. Leaders don't want their company making the news having fallen victim to a massive ransomware attack or denial of service. Consequently, ...

Continue reading
  2218 Hits

Webinar: Learn How to Find Security Threats Before Hackers Find Them For you

Every network has a security vulnerability. Vulnerabilities obviously lead to threats. Do you know where your vulnerabilities and any hidden threats are located? With major security breaches happening every year to businesses and government agencies of every type, don't you want to find (and fix) your network BEFORE a hacker finds and exploits the ...

Continue reading
  1204 Hits

The business case for network visibility

By Paul Brett, Cubro Network Visibility Network visibility solutions help organizations to meet their business and IT objectives by improving network performance, security posture, network planning, business continuity, and the ROI of network infrastructure and network tools. Network visibility products typically include network TAPs, Network ...

Continue reading
  1772 Hits

Ensuring Complete High Availability (HA) Redundancy for Critical Links

Major financial institutions experienced 80% more cyberattacks over the past 12 months, a 13% year-over-year increase, with a 238% surge in cyberattacks against banks during the coronavirus pandemic.1 According to a new analysis by the Federal Reserve Bank of New York, a single cyberattack on one of the top U.S. banks would likely have a major effe...

Continue reading
  1410 Hits

Why Cybersecurity Relies on Redundancy to Ensure Network Availability

By Chris Bihary Today, 50% of large enterprises are spending over $1 million annually on cybersecurity. The worldwide information security market is forecast to reach over $170 billion by 2022, as enterprises are making huge investments when it comes to securing mission-critical applications and data-center performance quality. This result reflects...

Continue reading
  1367 Hits

Prevent Cybersecurity Blind Spots by Improving Network Visibility

By Geoff Perkins Cybersecurity and network visibility go hand in hand. Without a holistic, complete view of every packet that travels in and out of your company, even the best, most advanced security tools will fail to provide adequate protection. Unfortunately, network blind spots are all too common. As networks grow in both size and complexity, m...

Continue reading
  1269 Hits

Firewall Primer: Best Practices for Avoiding Downtime

Written by Jerry Dillard, CTO and Co-founder of Garland Technology Firewalls are the most recognized security tool for safeguarding your network and are a critical component of any security infrastructure. Firewalls are considered the gatekeeper for most network security architectures, allowing only defined traffic on the network. Basically, a fire...

Continue reading
  1536 Hits

Guide to Inline Security: Avoid the Pitfalls

We know security is top of mind these days. And, pressure from executives is growing because security can: Impact revenueIncrease corporate riskAdversely affect customer satisfactionJeopardize regulatory compliance initiatives An inline security solution is one way to address these concerns, but it takes more than simply installing an appliance — p...

Continue reading
  1447 Hits

5 Reason’s to add Keysight Visibility Solutions to Cisco Security deployments

Photo by Jordan Harrison on Unsplash" /> Doug Hurd Manager of Cisco Secure Technical Alliance discusses how to eliminate five common problems in security deployments. Maintain tools without taking down the network – as it is never a good time to take the network down a visibility fabric allows you to architect the network to avoid this Avoid ...

Continue reading
  1672 Hits

Total Network Visibility with No Blind Spots

Network Visibility Architecture  - The Missing Ingredient for each of your teams Network Security Team Even with all the latest and cutting-edge technology we have in the network today, customer records continue to be stolen, and the worst of it some of these records will not even be detected as stolen. So this means that data is being stolen ...

Continue reading
  1588 Hits

Contact Us

Address:

Telnet Networks Inc.
1324 Andersen Drive
Kingston, ON  K7P 0C6
Canada

Phone:

(800) 561-4019

Fax:

613-498-0075

For More Information about Telnet Networks, our products, or our services, or to request a quote please feel free to contact us directly.

Latest Blog Posts

Latest Blog Posts