Skip to content

In today’s modern network infrastructure, millions of dollars are spent to ensure that networks are reliable, highly available, and most of all, secure! Cybersecurity has emerged as the critical area in all facets of the internet, yet still, there are often-overlooked areas which can degrade security measures meant to protect. One such example is time synchronization.

As simple as it sounds, time plays a critical role in synchronizing core business applications, and network systems. It supports authentication protocols as well as ensuring accurate log files critical for an audit trail, and absolutely necessary for cyber forensic tools. Having accurate, reliable, and secure timing throughout your network improves several different network security applications like:

  • Intrusion detection and forensic analysis
  • Log file accuracy, auditing and monitoring
  • Network fault diagnosis and recovery
  • Access security and authentication
  • Scheduled and automated operations

Accurate time is available from one or more publicly available time servers, via the internet. These public time servers act as a source for Universal Coordinated Time (UTC), an internationally recognized time standard. This may seem like a good idea, and an easy way to get accurate time however, using time from the internet usually requires opening up port 123 for NTP traffic through your firewall(s). Essentially, this means leaving a well known door open and from a security perspective, is a big problem.

This White Paper discusses the differences between time sources; internal vs. external, with considerations for traceability for a network deployment of Network Time Protocol (NTP)

Related Posts

Beyond the "Perfect" Lab: Simulating Real-World Network Chaos Before Deployment

Beyond the "Perfect" Lab: Simulating Real-World Network Chaos Before Deployment

It is the classic IT paradox: your application performed flawlessly in the staging lab, but the moment it was deployed…
UNDERSTANDING ZERO TRUST -- WHY VISIBILITY IS THE BEDROCK OF “NEVER TRUST, ALWAYS VERIFY”

UNDERSTANDING ZERO TRUST -- WHY VISIBILITY IS THE BEDROCK OF “NEVER TRUST, ALWAYS VERIFY”

In our first post, we demystified the core philosophy of Zero Trust—shifting from the outdated “castle-and-moat” perimeter to a model…
Precision Timing Applications in Healthcare and Emergency Services

Precision Timing Applications in Healthcare and Emergency Services

Precision timing is often associated with telecommunications, financial trading, or power grids, but its role in healthcare and emergency services…
Understanding Precision Timing in 5G and O-RAN Networks

Understanding Precision Timing in 5G and O-RAN Networks

5G is doing more than just speeding up our downloads—it’s completely changing how mobile networks are architected. Unlike the LTE…
The Heartbeat of Quantum: How White Rabbit Synchronization is Moving Innovation from the Lab to the Network

The Heartbeat of Quantum: How White Rabbit Synchronization is Moving Innovation from the Lab to the Network

Why Sub-Nanosecond Timing is the Missing Link for Distributed Quantum Computing and QKD For quantum scientists and researchers, the challenge…