Newsletter

 

For a Free Quote...

Latest Blog Posts

Telnet Networks News

Telnet Networks News - We'll keep you up to date with what's happening in the industry.

Firewall Primer: Best Practices for Avoiding Downtime

Written by Jerry Dillard, CTO and Co-founder of Garland Technology Firewalls are the most recognized security tool for safeguarding your network and are a critical component of any security infrastructure. Firewalls are considered the gatekeeper for most network security architectures, allowing only defined traffic on the network. Basically, a fire...

Continue reading
  2112 Hits

Guide to Inline Security: Avoid the Pitfalls

We know security is top of mind these days. And, pressure from executives is growing because security can: Impact revenueIncrease corporate riskAdversely affect customer satisfactionJeopardize regulatory compliance initiatives An inline security solution is one way to address these concerns, but it takes more than simply installing an appliance — p...

Continue reading
  1905 Hits

5 Reason’s to add Keysight Visibility Solutions to Cisco Security deployments

Photo by Jordan Harrison on Unsplash" /> Doug Hurd Manager of Cisco Secure Technical Alliance discusses how to eliminate five common problems in security deployments. Maintain tools without taking down the network – as it is never a good time to take the network down a visibility fabric allows you to architect the network to avoid this Avoid ...

Continue reading
  2126 Hits

Total Network Visibility with No Blind Spots

Network Visibility Architecture  - The Missing Ingredient for each of your teams Network Security Team Even with all the latest and cutting-edge technology we have in the network today, customer records continue to be stolen, and the worst of it some of these records will not even be detected as stolen. So this means that data is being stolen ...

Continue reading
  2035 Hits

How to Bypass 5 Major Security Risks

Businesses continue to invest in advanced security defenses like next-generation firewalls, intrusion prevention systems (NGFW and NGIPS), data loss prevention (DLP), and other inline tools. These tools can significantly strengthen security, but may also add complexity, operational cost, and even risk. Mitigate these and other challenges ...

Continue reading
  2385 Hits

Packet Brokers: One Device, Five Benefits to IT

If the term Network Packet Broker (NPB) is not familiar, now is the time to get acquainted with this invaluable and frequently overlooked device. Think of NPBs as helpful middlemen that sort, distribute, and optimize the flow of network data going to your monitoring and security tools. By receiving only the data they need and eliminating irrelevant...

Continue reading
  1995 Hits

Are Network Packets really becoming increasingly difficult to collect?

By Joel Rudman - Director of Finance and Capital Markets at Keysight Technologies I recently read the Gartner Market Guide for Network Performance Monitoring and Diagnostics (NPMD). Within the report it states that "Network Packets are Becoming Increasing Difficult to Collect" the reasons detailed were: Increased Virtualisation within the Data Cent...

Continue reading
  2211 Hits

Sunburst: The SolarWinds Hack, How You Could be Affected

A high profile attack is not the way to end 2020, but if you are an existing user of SolarWinds you may be one of the 18,000 potential customers breached by the recent hack using FireEye and SolarWinds, and affect your organizations ability to monitor the network. IMPACT On December 13th, Cybersecurity and Infrastructure Agency (CISA) issued direct...

Continue reading
  2389 Hits

Webinar: Let's Talk Security

Join Network Protocol Specialist Mike Pennacchi for a live network security webinar on Thursday, November 19 at 11:00 am EST. It's the next episode of Sinnot Wolach Technology Group Let's Talk Security Webinar Series, where Mike Pennacchi will demonstrate how to get the right network packets, filtering on GeoIP and analyzing historical data using I...

Continue reading
  2438 Hits

Layers of Defense:Resilient PNT Cybersecurity

For a resilient positioning, navigation and timing (PNT) solution you need to build layers of defense, which includes physical security to RF security, network security, application security and ongoing maintenance/support.. How Orolia Provides Resilient PNT Cybersecurity  Physical Security The simplest Denial of Service attack is to merely di...

Continue reading
  3094 Hits

Continuously Validate Your Cyber Defenses

Even with advanced firewall technology, intrusion prevention systems (IPS), and a wide array of security tools in place, businesses still miss clues and suffer major security breaches every day. In a recent survey, 50% of respondents said that they have experienced a security breach because one or more of their security products was simply not work...

Continue reading
  2208 Hits

Viavi's 13th Annual State of the Network

Viavi's 2020 State of the Network Study results are in. Over 400 IT professionals from around the world, across business size and verticals, completed the survey this year sharing their views on IT in a year that has seen its share of dramatic ups and downs. One significant new insight is the importance of understanding end-user experiences, especi...

Continue reading
  2839 Hits

Cybersecurity Checklist for Secure Timing

​Network cybersecurity is top of mind these days for both government agencies and commercial enterprise. As the heart of network synchronization, time and frequency systems should include a standard suite of security features that give network administrators confidence in the cybersecurity protocols of their time servers. This is our philosophy at ...

Continue reading
  3283 Hits

How to Implement Security Monitoring For Critical Infrastructure

​I ran across an interesting statistic a couple weeks ago. According to a Ponemon Institute, report titled "The State of Cybersecurity in the Oil & Gas Industry", 68 percent of security and risk managers reported losing confidential information or experiencing disruption over the previous year. The existence of security breaches for the last fi...

Continue reading
  3239 Hits

Ixia - Exposing Hidden Security Threats and Network Attacks

How do you ensure maximum service availability while protecting and securing your enterprise? IT departments have been wrestling with this problem for years. Virtualization and mobility are expanding the traditional network boundary, which means data and assets no longer sit in a single location behind a firewall.  Network security monitoring ...

Continue reading
  3520 Hits

Orolia Case Study - Banking on BroadShield

​Why This Case Study is Relevant It demonstrates the importance of installing anti-jam and anti-spoofing software. Background  ​A major international financial services provider was experiencing issues in their lab environment with its GNSS-based timing systems. GNSS reception was being intermittently lost and the customer didn't know why. Rat...

Continue reading
  3465 Hits

The Best Way To Optimize Load Balancing for Inline Security Appliances

In today's 24x7, "always on" world, the company's data network must be as reliable as possible. Otherwise, revenue reduction and productivity losses are not only possible, but probable. This includes inline security and monitoring tools which can become a single point of failure. Security and monitoring tool survivability is often thought about in ...

Continue reading
  3380 Hits

What is hidden in encrypted internet traffic streams

​Full internet encryption is on the horizon and with it the risk that hackers will gain access to your computer network. When you open any website today, it is highly probable you will see a small padlock in front of the address. For the everyday internet user, this is the only visible sign that the site is secure and communication with the site is...

Continue reading
  3435 Hits

5 predictions for cyber security in 2019

​Last year completely refuted doubts about the increasing cyber security risks. Hackers, obtained sensitive data on hundreds of German politicians, including Chancellor Merkel and accessed data relating to tens of millions of Facebook accounts. The year also confirmed that hacking has become a means for political activists and an effective tool for...

Continue reading
  3278 Hits

How to Optimize Your Security Defenses

​As I mentioned in a blog a couple of months ago, there is an absolute myriad of security architectures and techniques available to the enterprise IT professionals. These strategies all have pros and cons. Lets look at one of the most common ones-a defensive approach. Everyone in the security arena is familiar with this concept. It is sometimes tho...

Continue reading
  3730 Hits

Contact Us

Address:

Telnet Networks Inc.
4145 North Service Rd. Suite 200
Burlington, ON  L7L 6A3
Canada

Phone:

(800) 561-4019

Fax:

613-498-0075

For More Information about Telnet Networks, our products, or our services, or to request a quote please feel free to contact us directly.