Newsletter

 

For a Free Quote...

Latest Blog Posts

Telnet Network News

Telnet Network News - We'll keep you up to date with what's happening in the industry.

5 Reasons Why You Should Include LAN Switches in Your NCCM Scope

We’ve been doing a lot of blogging around here lately about NCCM and the importance of having an automated configuration and change management system. We’ve even published a Best practices guide for NCCM. One of the main points in any NCCM system is having consistent and accurate configuration backups of all of your “key” devices. When I ask Network Managers to name their key devices, they generally start with WAN / Internet routers and Firewalls. This makes sense of course because, in a modern ...
Continue reading
  2627 Hits
  0 Comments
2627 Hits
0 Comments

5 Perks of Network Performance Management

Network performance management is something that virtually every business needs, but not something that every business is actively doing, or even aware of. And why should they? While understanding the technical side of things is best left to the IT department, understanding the benefits of a properly managed network is something that will help get the business managers on board, especially when good performance management solutions might be a cost that hadn't been considered. So what are the ben...
Continue reading
  3182 Hits
  0 Comments
3182 Hits
0 Comments

Key Factors in NCCM and CMDB Integration - Part 1 Discovery

Part I Discovery “I am a rock, I am an Island…” These lyrics by Simon and Garfunkel pretty appropriately summarize what most IT companies would like you to believe about their products. They are islands that stand alone and don’t need any other products to be useful. Well, despite what they want, the truth is closer to the lyrics by the Rolling Stones – “We all need someone we can lean on”. Music history aside, the fact is that interoperability and integration is one of the most important keys t...
Continue reading
  5413 Hits
  0 Comments
5413 Hits
0 Comments

Benefits of Network Security Forensics

The networks that your business operates on are often open and complex. Your IT department is responsible for mitigating network risks, managing performance and auditing data to ensure functionality. Using NetFlow forensics can help your IT team maintain the competitiveness and reliability of the systems required to run your business. In IT, network security forensics involves the monitoring and analysis of your network's traffic to gather information, obtain legal evidence and detect network in...
Continue reading
  4239 Hits
  0 Comments
4239 Hits
0 Comments

5 Reasons Why You Must Back Up Your Routers and Switches

I’ve been working in the Network Management business for over 20 years, and in that time I have certainly seen my share of networks. Big and small, centralized and distributed, brand name vendor devices in shiny datacenters, and no-name brands in basements and bunkers. The one consistent surprise I continue to encounter is how many of these organization (even the shiny datacenter ones) lack a backup system for their network device configurations. I find that a little amazing, since I also can’t ...
Continue reading
  3048 Hits
  0 Comments
3048 Hits
0 Comments

NetFlow Auditor - Best Practices for Network Traffic Analysis Webinar

In this Webinar John Olson, from NetFlow Auditor, discusses the top 10 Best Practices for using Netflow data to analyse, report and alert on multiple aspects of Network traffic. These best practices include: Understanding where is the best place in your network to collect netflow data from How long you should retain your flow data Why you should archive more than just the top 100 flows When static thresholds should be replaced by adaptive thresholds More... Thanks to NetFlow Auditor for the...
Continue reading
  4416 Hits
  0 Comments
4416 Hits
0 Comments

CIO Review - Infosim Unified Solution for Automated Network Management

CIO Review 20 Most Promising Networking Solution Providers Virtualization has become the life blood of the networking industry today. With the advent of technologies such as software-defined networking and network function virtualization, the black box paradigm or the legacy networking model has been shattered. In the past, the industry witnessed networking technology such as Fiber Distributed Data Interface (FDDI), which eventually gave way to Ethernet, the predominant network of choice. This p...
Continue reading
  2913 Hits
  0 Comments
2913 Hits
0 Comments

3 Reasons for Real Time Configuration Change Detection

So far, we have explored what NCCM is, and taken a deep dive into device policy checking – in this post we are going to be exploring Real Time Configuration Change Detection (or just Change Detection as I will call it in this blog). Change Detection is the process by which your NCCM system is notified - either directly by the device or from a 3rd party system that a configuration change has been made on that device. Why is this important? Let’s identify 3 main reasons that Change Detection is a ...
Continue reading
  7579 Hits
  0 Comments
7579 Hits
0 Comments

The Importance of State

Ixia recently added passive SSL decryption to the ATI Processor (ATIP). ATIP is an optional module in several of our Net Tool Optimizer (NTO) packet brokers that delivers application-level insight into your network with details such as application ID, user location, and handset and browser type. ATIP gives you this information via an intuitive real-time dashboard, filtered application forwarding, and rich NetFlow/IPFIX. Adding SSL decryption to ATIP was a logical enhancement, given the increasin...
Continue reading
  4632 Hits
  0 Comments
4632 Hits
0 Comments

Virtualization Visibility

See Virtual with the Clarity of Physical The cost-saving shift to virtualization has challenged network teams to maintain accurate views. While application performance is often the first casualty when visibility is reduced, the right solution can match and in some cases even exceed the capabilities of traditional monitoring strategies. Virtual Eyes Network teams are the de facto “first responders” when application performance degrades. For this reason, it’s critical to maintain visibility into a...
Continue reading
  3096 Hits
  0 Comments
3096 Hits
0 Comments

Don’t Miss the Forest for the Trees: Taps vs. SPAN

These days, your network is as important to your business as any other item—including your products. Whether your customers are internal or external, you need a dependable and secure network that grows with your business. Without one, you are dead in the water. IT managers have a nearly impossible job. They must understand, manage, and secure the network all the time against all problems. Anything less than a 100 percent working network is a failure. There is a very familiar saying: Don’t miss t...
Continue reading
  3677 Hits
  0 Comments
3677 Hits
0 Comments

A Deeper Look Into Network Device Policy Checking

In our last blog post “Why you need NCCM as part of your Network Management Platform” I introduced the many reasons that growing networks should investigate and implement an NCCM solution. One of the reasons is that an NCCM system can help with automation in a key area which is related to network security as well as compliance and availability – Policy Checking. So, in this post, I will be taking a deeper dive into Network Device Policy Checking which will (hopefully) shed some light onto what I...
Continue reading
  2846 Hits
  0 Comments
2846 Hits
0 Comments

Infosim® Global Webinar - Why is this App So Terribly Slow?

Infosim® Global Webinar Day Why is this app so terribly slow? How to achieve full Application Monitoring with StableNet® Join Matthias Schmid, Director of Project Management with Infosim® for a Webinar and Live Demo on “How to achieve full Application Monitoring with StableNet®”.     This Webinar will provide insight into: Why you need holistic monitoring for all your company applications How the technologies offered by StableNet® will help you master this challenge Furthermo...
Continue reading
  2909 Hits
  0 Comments
2909 Hits
0 Comments

Is Network Function Virtualization (NFV) Ready to Deliver?

There is no doubt that virtualization is one of the hottest technology topics with communication service providers (CSPs) today. Nearly all the forecasts suggest that widespread NFV adoption will happen over the next few years, with CSPs benefitting from significantly reduced operational costs and much higher revenues resulting from increased service flexibility and velocity. So much for the hype – but where do NFV standards, guidelines and technology implementations stand today and when will th...
Continue reading
  3211 Hits
  0 Comments
3211 Hits
0 Comments

Why You Need NCCM As Part Of Your Network Management Platform

In the landscape of Enterprise Network Management most products (and IT Professionals) tend to focus on “traditional” IT monitoring. By that I mean the monitoring of devices, servers, and applications for performance issues and faults. That makes sense because most networks evolve in a similar fashion. They are first built out to accommodate the needs of the business. This primarily involves supporting access for people to applications they need to do their jobs. Once the initial buildout is don...
Continue reading
  4064 Hits
  0 Comments
4064 Hits
0 Comments

Cloud, Virtualization Solution - Example of Innovation

Our team is excited to represent Viavi Solutions during an industy (IT and cloud-focused) event, VMworld, in San Francisco at booth #2235. We’ll be showcasing our latest innovation – the GigaStor Software Edition designed for managing performance in virtual, cloud, and remote environments. Here are some topline thoughts about why this product matters for our customers and core technologies trending today, what a great time it is for the industry and to be Viavi! For starters, the solution is abl...
Continue reading
  3115 Hits
  0 Comments
3115 Hits
0 Comments

Do You Have a Network Operations Center Strategy?

The working definition of a Network Operations Center (NOC) varies with each customer we talk with; however, the one point which remains unified is that the NOC should be the main point of visibility for key functions that combine to provide business services. The level at which a NOC ‘product’ is interactive depends on individual customer goals and requirements. Major equipment vendors trying to increase revenue are delving into management and visibility solutions with acquisitions and mergers,...
Continue reading
  3160 Hits
  0 Comments
3160 Hits
0 Comments

Ixia Taps into Visibility, Access and Security in 4G/LTE

The Growing Impact of Social Networking Trends on Lawful Interception Lawful Interception (LI) is the legal process by which a communications network operator or Service Provider (SP) gives authorized officials access to the communications of individuals or organizations. With security threats mushrooming in new directions, LI is more than ever a priority and major focus of Law Enforcement Agencies (LEAs). Regulations such as the Communications Assistance for Law Enforcement Act (CALEA), mandate...
Continue reading
  3719 Hits
  0 Comments
3719 Hits
0 Comments

The Case for an All-In-One Network Monitoring Platform

There are many famous debates in history: dogs vs cats, vanilla vs chocolate & Coke vs Pepsi just to name a few. In the IT world, one of the more common debates is “single platform vs point solution”. That is, when it comes to the best way to monitor and manage a network, is it better to have a single management platform that can do multiple things, or would it be better to have an array of tools that are each specialized for a job? The choice can be thought of as being between Multitaskers ...
Continue reading
  3377 Hits
  0 Comments
3377 Hits
0 Comments

Viavi Solutions Launches GigaStor Software Edition for Virtual and Cloud Environments

Viavi Solutions Launches GigaStor Software Edition for Virtual and Cloud Environments Solution Delivers Fast and Accurate Troubleshooting and Assurance in Next Generation Network Architecture (NASDAQ: VIAV) Viavi Solutions Inc. (“Viavi”) today announced it is expanding its portfolio of software-defined network test and monitoring solutions with the new GigaStor Software Edition to manage performance and user experience in virtual and cloud environments. The new software configurations, which Via...
Continue reading
  3117 Hits
  0 Comments
3117 Hits
0 Comments

Contact Us

Address:

Telnet Networks Inc.
1324 Andersen Drive
Kingston, ON  K7P 0C6
Canada

Phone:

(800) 561-4019

Fax:

613-498-0075

For More Information about Telnet Networks, our products, or our services, or to request a quote please feel free to contact us directly.