Skip to content

In today’s modern networking infrastructure, great care is taken to ensure that networks are reliable, highly available and most of all, secure. Cybersecurity has emerged as a critical area in all facets of the internet. It’s an area that companies spend millions on each year. Yet still, there are often-overlooked areas that degrade security. One example of this is time.

As simple as it sounds, time plays a critical role in synchronizing core business and network systems. It supports authentication protocols as well as accurate log files critical for an audit trail, which are necessary for any cyber forensics program. As such, synchronization is often a requirement for network security standards.

This White Paper discusses the differences between a time source from within the network as compared to a time source from outside the network, with considerations for traceability for a network deployment of Network Time Protocol (NTP)​

The Traceability of Time Synchronization: Why Internet Time Isn’t Good Enough

Thank you to Jeremy Onyan of Orolia for the article.

Related Posts

Telnet Networks’ Approach to Zero Trust: A Practical Guide for Modern Enterprises

Telnet Networks’ Approach to Zero Trust: A Practical Guide for Modern Enterprises

Zero Trust has quickly evolved from a niche cybersecurity concept into a foundational strategy for organizations looking to secure increasingly…
SecureSync 1200 & Netclock 9483 2 Year End of Life Reminder and Upgrade Recommendation

SecureSync 1200 & Netclock 9483 2 Year End of Life Reminder and Upgrade Recommendation

Since its launch in 2009, the SecureSync 1200 Series and Netclock 9483 have been trusted, high-performance solutions for organizations requiring…
Why Choose an Anti-Jamming Antenna Over a Standard Antenna

Why Choose an Anti-Jamming Antenna Over a Standard Antenna

Signal integrity is the backbone of modern communication and navigation systems. In fields like defense, transportation, and logistics, even brief…
Everything You Need to Know About Flyaway Kits — And How to Build One for IT and OT Networks

Everything You Need to Know About Flyaway Kits — And How to Build One for IT and OT Networks

In the world of network performance and cybersecurity, the ability to move fast can make the difference between a quick…
Why Use an In-House NTP Server Over Public

Why Use an In-House NTP Server Over Public

Accurate time synchronization is a critical part of keeping modern networks running smoothly. Every log entry, security event, and data…