Skip to content

In today’s modern networking infrastructure, great care is taken to ensure that networks are reliable, highly available and most of all, secure. Cybersecurity has emerged as a critical area in all facets of the internet. It’s an area that companies spend millions on each year. Yet still, there are often-overlooked areas that degrade security. One example of this is time.

As simple as it sounds, time plays a critical role in synchronizing core business and network systems. It supports authentication protocols as well as accurate log files critical for an audit trail, which are necessary for any cyber forensics program. As such, synchronization is often a requirement for network security standards.

This White Paper discusses the differences between a time source from within the network as compared to a time source from outside the network, with considerations for traceability for a network deployment of Network Time Protocol (NTP)​

The Traceability of Time Synchronization: Why Internet Time Isn’t Good Enough

Thank you to Jeremy Onyan of Orolia for the article.

Related Posts

Cybereason vs. CrowdStrike, SentinelOne, Microsoft Defender, Trellix: A Head-to-Head Comparison

Cybereason vs. CrowdStrike, SentinelOne, Microsoft Defender, Trellix: A Head-to-Head Comparison

As cyber threats evolve, Canadian businesses need a cybersecurity solution that goes beyond traditional endpoint protection. Cybereason has emerged as…
Welcoming Bodet to the Telnet Networks Partner Ecosystem

Welcoming Bodet to the Telnet Networks Partner Ecosystem

We’re thrilled to announce a new partnership that brings precision, reliability, and European craftsmanship to our time synchronization solutions. Telnet…
Network Time Synchronization: A Complete Guide

Network Time Synchronization: A Complete Guide

Learn how accurate network time synchronization is crucial for operations, security, and performance in various applications, from finance to IoT.
Network Visibility: Security Applications of Network TAPs, Brokers and Bypass Switches

Network Visibility: Security Applications of Network TAPs, Brokers and Bypass Switches

Security starts with awareness, but what happens when critical traffic slips through unnoticed? For security teams and network administrators alike,…
Why Cheap Standalone Clocks Cost You More: The Case for Synchronized & PoE Clocks

Why Cheap Standalone Clocks Cost You More: The Case for Synchronized & PoE Clocks

Accurate and synchronized timekeeping is crucial for maintaining operational efficiency in any organization. While inexpensive standalone clocks might seem appealing…