Newsletter

 

For a Free Quote...

Latest Blog Posts

Telnet Network News

Telnet Network News - We'll keep you up to date with what's happening in the industry.

Top 10 Key Metrics for NetFlow Monitoring

NetFlow is a feature that was introduced on Cisco routers that provides the ability to collect IP network traffic as it enters or exits an interface. By analyzing the data provided by NetFlow, a network administrator can determine things such as the source and destination of traffic, class of service, and the causes of congestion. There are numerous key metrics when it comes to Netflow Monitoring: 1-Netflow Top Talkers The flows that are generating the heaviest system traffic are known as the "t...
Continue reading
  2739 Hits
  0 Comments
2739 Hits
0 Comments

NTO Now Provides Twice the Network Visibility

Ixia is proud to announce that we are expanding one of the key capabilities in Ixia xStream platforms, “Double Your Ports,” to our Net Tool Optimizers (NTO) family of products. As of our 4.3 release, this capability to double the number of network and monitor inputs is now available on the NTO platform. If you are not familiar with Double Your Ports, it is a feature that allows you to add additional network or tool ports to your existing NTO by allowing different devices to share a single port. ...
Continue reading
  3657 Hits
  0 Comments
3657 Hits
0 Comments

Improving Network Visibility – Part 4: Intelligent, Integrated, and Intuitive Management

In the three previous blogs in this series, I answered an often asked customer question – “What can really be done to improve network visibility?” – with discussions on data and packet conditioning, advanced filtering, and automated data center capability. In the fourth part of this blog series, I’ll reveal another set of features that can further improve network visibility and deliver even more verifiable benefits. Too quickly summarize, this multi-part blog covers an in-depth view of various f...
Continue reading
  3878 Hits
  0 Comments
3878 Hits
0 Comments

JDSU's Network Instruments Launches GigaStor Portable 10 Gb Wire Speed

Mobile Forensics Unit Streams Packets to Disk 5 Times Faster than Previous Generation Network Instruments, a JDSU Performance Management Solution (NASDAQ: JDSU), announced today the launch of its new GigaStor Portable 10 Gb Wire Speed retrospective network analysis (RNA) appliance. The new portable configuration utilizes solid state drive (SSD) technology to stream traffic to disk at full line rate on full-duplex 10 Gb links without dropping packets. “For network engineers, remotely troubleshoot...
Continue reading
  3165 Hits
  0 Comments
3165 Hits
0 Comments

“Who Makes the Rules?” The Hidden Risks of Defining Visibility Policies

Imagine what would happen if the governor of one state got to change all the laws for the whole country for a day, without the other states or territories ever knowing about it. And then the next day, another governor gets to do the same. And then another. Such foreseeable chaos is precisely what happens when multiple IT or security administrators define traffic filtering policies without some overarching intelligence keeping tabs on who’s doing what. Each user acts from their own unique perspec...
Continue reading
  4039 Hits
  0 Comments
4039 Hits
0 Comments

NMSaaS Webinar: Transform your MSP by offering high end Network Management Services with NMSaaS

Please join NMSaaS CTO John Olson for a demonstration of how NMSaaS can help your business break into the high-value enterprise MSP market. NMSaaS is a highly-scalable platform for Service Providers looking to break into the enterprise market. With NMSaaS you can: 1. Offer world class Network Discovery and Asset Management (vulnerability and lifecycle management) 2. Backup, Configure, and Policy Check network device configurations 3. Monitor high-value IT devices like Core Routers, Switches, Fir...
Continue reading
  2822 Hits
  0 Comments
2822 Hits
0 Comments

Advanced Packet Filtering with Ixia’s Advanced Filtering Modules (AFM)

An important factor in improving network visibility is the ability to pass the correct data to monitoring tools. Otherwise, it becomes very expensive and aggravating for most enterprises to sift through the enormous amounts of data packets being transmitted (now and in the near future). Bandwidth requirements are projected to continue increasing for the foreseeable future – so you may want to prepare now. As your bandwidth needs increase, complexity increases due to more equipment being added to...
Continue reading
  5899 Hits
  0 Comments
5899 Hits
0 Comments

Introducing the First Self-Regulating Root Cause Analysis: Dynamic Rule Generation with StableNet® 7

Infosim®, a leading manufacturer of automated Service Fulfillment and Service Assurance solutions for Telcos, ISPs, MSPs and Corporations, today announced a proprietary new technology called Dynamic Rule Generation (DRG) with StableNet® 7. The challenge: The legacy Fault Management approach includes a built-in dilemma: Scalability vs. Aggregation. On the one hand, it is unfeasible to pre-create all possible rules while on the other hand, not having enough rules will leave NOC personnel with insu...
Continue reading
  3327 Hits
  0 Comments
3327 Hits
0 Comments

Security Breaches Keep Network Teams Busy

Network Instruments study shows that network engineers are spending more of their day responding to breaches and deploying security controls. This should come as no big surprise to most network teams. As security breaches and threats proliferate, they're spending a lot of time dealing with security issues, according to a study released Monday. Network Instruments' eighth annual state of the network report shows that network engineers are increasingly consumed with security chores, including inve...
Continue reading
  2857 Hits
  0 Comments
2857 Hits
0 Comments

How Not to Rollout New Ideas, or How I Learned to Love Testing

I was recently reading an article in TechCrunch titled “The Problem With The Internet Of Things,” where the author lamented how bad design or rollout of good ideas can kill promising markets. In his example, he discussed how turning on the lights in a room, through the Internet of Things (IoT), became a five step process rather than the simple one step process we currently use (the light switch). This illustrates the problem between the grand idea, and the practicality of the market: it’s awesom...
Continue reading
  3768 Hits
  0 Comments
3768 Hits
0 Comments

Load Balancing Your Security Solution for Fun and Profit!

Maximizing the Value and Resiliency of Your Deployed Enterprise Security Solution with Intelligent Load Balancing Correctly implementing your security solution in the presence of complex, high-volume user traffic has always been a difficult challenge for network architects. The data in transit on your network originates from many places and fluctuates with respect to data rates, complexity, and the occurrence of malicious events. Internal users create vastly different network traffic than extern...
Continue reading
  4282 Hits
  0 Comments
4282 Hits
0 Comments

End User Experience Testing Made Easier with NMSaaS

End user experience & QoS are consistently ranked at the top of priorities for Network Management teams today. According to research over 60% of companies today say that VoIP is present in a significant amount of their networks, this is the same case with streaming media within the organization. As you can see having effective end user experience testing is vital to any business. If you have a service model, whether you’re an actual service provider like a 3rd party or you’re a corporation w...
Continue reading
  3119 Hits
  0 Comments
3119 Hits
0 Comments

Infosim® Global Webinar Day May 28th, 2015

The Future of Network Performance Management: How to take advantage of Automation, Cloud and IoT!Join Dr. Stefan Köhler, CEO Infosim and a leading authority in the network management field for a Webinar on The Future of Network Performance Management. This Webinar will provide insight into: Next Generation Automated Fault Management How to fix your network issues fast and efficiently using automation? How to get to the next level of Root Cause Analysis (RCA) with Dynamic Rule Gene...
Continue reading
  2819 Hits
  0 Comments
2819 Hits
0 Comments

Avoid Network Performance Problems with Automated Monitoring

Network administrators can streamline the troubleshooting process by deploying automated monitoring systems. With automated monitoring in place, admins can get early warnings about emerging problems and address them before the adverse effects continue for too long. In addition, automated monitoring can help maintain up to date information about network configuration and devices on the network that can be essential for diagnosing network performance problems. An automated network monitoring regim...
Continue reading
  2781 Hits
  0 Comments
2781 Hits
0 Comments

Flow-Based Network Intelligence You Can Depend On

NetFlow Auditor is a complete and flexible toolkit for flow based network analysis, which includes real-time analysis, long-term trending and base-lining. NetFlow Auditor uses NetFlow based analysis as opposed to the traditional network analysis products which focus on the health of network gateway devices with basic information and overview trends. Netflow analysis looks at end-to-end performance using a technological approach that is largely independent of the underlying network infrastructure...
Continue reading
  3863 Hits
  0 Comments
3863 Hits
0 Comments

Avoid the VM Blackout: A Guide to Effective Server Monitoring

When it comes to IT services, business value and user satisfaction are both dependent upon the server, network, and applications all working together seamlessly. Failure to adequately monitor each of these and their interactions, means that you could be flying blind – susceptible to degraded service levels. While application and network monitoring receive a lot of the attention, it is important to also understand what’s going on with the server. Virtualization changes the face of service deliver...
Continue reading
  2866 Hits
  0 Comments
2866 Hits
0 Comments

Solving 3 Key Network Security Challenges

With high profile attacks from 2014 still fresh on the minds of IT professionals and almost half of companies being victims of an attack during the last year, it’s not surprising that security teams are seeking additional resources to augment defenses and investigate attacks. As IT resources shift to security, network teams are finding new roles in the battle to protect network data. To be an effective asset in the battle, it’s critical to understand the involvement and roles of network professi...
Continue reading
  2790 Hits
  0 Comments
2790 Hits
0 Comments

The State of the Network 2015

Speedier network pipes that carry more information faster than ever before can be a windfall for enterprises looking to derive more business value from their underlying infrastructure. But there's a nefarious lining in there – when things speed up, they can get harder to manage. Packets carrying crucial application information and content whizzing by in a blur can pose real visibility challenges IT pros haven't encountered before. Network and application performance management is undergoing swee...
Continue reading
  2983 Hits
  0 Comments
2983 Hits
0 Comments

State of Networks: Faster, but Under Attack

Two recent studies that look at the state of mobile and fixed networks show that while networks are getting ever faster, security is a paramount concern that is taking up more time and resources. Akamai recently released its fourth quarter 2014 State of the Internet report. Among the findings: In terms of network security, high tech and public sector targets saw increased numbers of attacks from 2013 to 2014, while enterprise targets had fewer attacks over the course of the year – except Q4, whe...
Continue reading
  3059 Hits
  0 Comments
3059 Hits
0 Comments

See How Ixia’s NTO 7300 Vastly Outperforms the Closest Competitor in 100GbE Visibility, Scalability, Capacity, and Cost-Efficiency

Visibility Is an Urgent Challenge Lack of visibility is behind the worst of IT headaches, leaving the network open to malicious intrusions, as well as compliance, availability, and performance problems. Today’s soaring traffic volumes are bringing greater complexity, proliferating apps and devices, and rising virtual traffic—in fact, “east-west” traffic between virtual machines now makes up half of all traffic on the network. Virtual traffic is the culprit that spawns unmonitored "blind spots," ...
Continue reading
  3480 Hits
  0 Comments
3480 Hits
0 Comments

Contact Us

Address:

Telnet Networks Inc.
740 Augusta Dr.
Suite 202
Kingston, ON  K7P 0R5
Canada

Phone:

(800) 561-4019

Fax:

613-498-0075

For More Information about Telnet Networks, our products, or our services, or to request a quote please feel free to contact us directly.