Skip to content

In today’s modern networking infrastructure, great care is taken to ensure that networks are reliable, highly available and most of all, secure. Cybersecurity has emerged as a critical area in all facets of the internet. It’s an area that companies spend millions on each year. Yet still, there are often-overlooked areas that degrade security. One example of this is time.

As simple as it sounds, time plays a critical role in synchronizing core business and network systems. It supports authentication protocols as well as accurate log files critical for an audit trail, which are necessary for any cyber forensics program. As such, synchronization is often a requirement for network security standards.

This White Paper discusses the differences between a time source from within the network as compared to a time source from outside the network, with considerations for traceability for a network deployment of Network Time Protocol (NTP)​

The Traceability of Time Synchronization: Why Internet Time Isn’t Good Enough

Thank you to Jeremy Onyan of Orolia for the article.

Related Posts

Holiday 2025 Closures

Holiday 2025 Closures

As the holiday season approaches and we wrap up 2025, our team will be taking a short break to rest,…
2025: A Year in Review

2025: A Year in Review

As the year comes to a close, it’s the perfect time to reflect on the insights, innovations, and milestones that…
StableNet Telco: The Unified OSS Platform Built for Modern Service Providers

StableNet Telco: The Unified OSS Platform Built for Modern Service Providers

Why Service Providers Across Canada Are Choosing Infosim StableNet for Automation, Visibility, and Operational Efficiency For Canadian service providers, the…
Safran Product Update

Safran Product Update

As PNT technology continues to evolve, Safran remains at the forefront of innovation, delivering advanced solutions designed to meet the…
Telnet Networks’ Approach to Zero Trust: A Practical Guide for Modern Enterprises

Telnet Networks’ Approach to Zero Trust: A Practical Guide for Modern Enterprises

Zero Trust has quickly evolved from a niche cybersecurity concept into a foundational strategy for organizations looking to secure increasingly…