Latest Blog Posts

Newsletter

 

For a Free Quote...

Telnet Network News

Telnet Network News - We'll keep you up to date with what's happening in the industry.

Rogers lights up 5G campus

Rogers Communications and the University of British Columbia (UBC) have switched on Canada's first 5G-powered smart campus, involving 5G base stations throughout UBC's Point Grey campus and an edge computing enabled data centre, which will be used by university researchers to test 5G applications in a real-world setting. Rogers' CTO Jorge Fernandes...
Continue reading
  154 Hits
  0 Comments
154 Hits
0 Comments

3 Network Performance Monitoring Metrics to Deal with Performance Degradation

In my 20+ years career, I've worked with two types of technologies. Those that took extensive marketing efforts to communicate their value and failed to deliver it, as well as technologies that proved themselves quickly during a single day. Network performance monitoring using flow data is the second case. In this post, I share my experience with N...
Continue reading
  122 Hits
  0 Comments
122 Hits
0 Comments

Cybersecurity Checklist for Secure Timing

​ Network cybersecurity is top of mind these days for both government agencies and commercial enterprise. As the heart of network synchronization, time and frequency systems should include a standard suite of security features that give network administrators confidence in the cybersecurity protocols of their time servers. This is our philosophy at...
Continue reading
  205 Hits
  0 Comments
205 Hits
0 Comments

Viavi - NetFlow vs Packet Data

​IT managers and engineers are constantly challenged to maintain application performance, stay ahead of security breaches and resolve complex network problems. Two of the more powerful data sources available today are NetFlow (IPFIX) and packet data, which have been helping network and security teams gain clear visibility into the network for years...
Continue reading
  194 Hits
  0 Comments
194 Hits
0 Comments

Spectracom - Latest SecureSync and Netclock 9400 Update Files

Update Files for SecureSync/NetClock 9400 to version 5.8.6 The following files, corresponding to version 5.8.6, are available for download here: the software update file, the update instructions for SecureSync, update instructions for NetClock 9400, release notes for SecureSync and release notes for NetClock 9400. If you have been instructed to "cl...
Continue reading
  253 Hits
  0 Comments
253 Hits
0 Comments

Cubic Telecom and Rogers Communications to provide connected car service

​ Cubic Telecom and Rogers Communications have teamed up to provide connected car services for Canadians, integrating Cubic's PACE (Platform for Application and Connectivity Enablement) and connected vehicle solution with Rogers' nationwide mobile network, with coverage also provided in the US via roaming. Rogers says it is able to support seamless...
Continue reading
  285 Hits
  0 Comments
285 Hits
0 Comments

ProfiTap - The Benefits of Using ProfiSight Network Traffic Analyzer

As networks get faster and more complex, new performance issues appear. Conventional network monitoring takes too much time, that's why network analysts are looking for tools that not only help them get to the source of problems as fast as possible, but also optimize their workflow. So, how can we get from a broad view of the network to a pinpoint ...
Continue reading
  227 Hits
  0 Comments
227 Hits
0 Comments

Infosim - Firewall Configuration/Network Configuration and Change Management (NCCM)

​ Turn on any "techy" TV show or movie these days and you are bound to see some reference to hackers trying to break into corporate or government networks by breaching firewalls. While many of the scenarios are unrealistic as they are portrayed onscreen, the real-life battle between security vendors and hackers does go on. In their effort to defeat...
Continue reading
  294 Hits
  0 Comments
294 Hits
0 Comments

Security Spends on prevention, detection and remediation

​ Security is a big concern for every business and yet high-profile breaches continue to hit the headlines. This shows hackers will find a way through the most robust security measures if the prize is lucrative enough.  Preventative security in-depth isn't enough to save you, your data or your reputation. Did you know that organizations curren...
Continue reading
  291 Hits
  0 Comments
291 Hits
0 Comments

How to Implement Security Monitoring For Critical Infrastructure

​I ran across an interesting statistic a couple weeks ago. According to a Ponemon Institute, report titled "The State of Cybersecurity in the Oil & Gas Industry" , 68 percent of security and risk managers reported losing confidential information or experiencing disruption over the previous year. The existence of security breaches for the last f...
Continue reading
  284 Hits
  0 Comments
284 Hits
0 Comments

Hybrid IT Monitoring: The ABCs of Network Visibility

​The recently released 2019 State of the Cloud report by RightScale found that 58% of 800 technical professionals surveyed use a hybrid strategy [1]. Combining on-premises, virtual, and cloud-based resources offers great flexibility, but managing hybrid IT is also more complex. IT teams need new strategies to monitor their hybrid infrastructure eff...
Continue reading
  310 Hits
  0 Comments
310 Hits
0 Comments

How to Protect Your NTP Server from Cyberattacks

​ Network experts already know that distributing the correct time is key to maintaining their critical infrastructure programs. However, keeping accurate time is also fundamental to many cybersecurity applications. Certificates have an expiration date attached to them, and system logs frequently contain time stamps that operators rely on for diagno...
Continue reading
  316 Hits
  0 Comments
316 Hits
0 Comments

Ixia - Exposing Hidden Security Threats and Network Attacks

How do you ensure maximum service availability while protecting and securing your enterprise? IT departments have been wrestling with this problem for years. Virtualization and mobility are expanding the traditional network boundary, which means data and assets no longer sit in a single location behind a firewall.  Network security monitoring ...
Continue reading
  438 Hits
  0 Comments
438 Hits
0 Comments

Orolia Case Study - Banking on BroadShield

​Why This Case Study is Relevant It demonstrates the importance of installing anti-jam and anti-spoofing software. Background  ​A major international financial services provider was experiencing issues in their lab environment with its GNSS-based timing systems. GNSS reception was being intermittently lost and the customer didn't know why. Rat...
Continue reading
  329 Hits
  0 Comments
329 Hits
0 Comments

Xplornet expanding Eastern Ontario ‘5G-ready’ fixed-wireless broadband with federal assistance

​ Canada's leading rural fixed-wireless broadband provider Xplornet Communications has announced an initiative to deploy '5G-ready' 100Mbps services to an additional 80,000 rural homes and businesses in Eastern Ontario, supported by rollout of over 600km of fibre infrastructure. Assisted by a contribution of up to CAD16 million (USD12.2 million) fr...
Continue reading
  397 Hits
  0 Comments
397 Hits
0 Comments

Webinar - Orolia GPS/GNSS Spoofing & Jamming: Threats and Countermeasures

When: Thursday, September 12, 2019  ​At: 1:00 pm Eastern Daylight Time Join John Fischer, Omer Sharar, and John Pottle as they describe common threats rot GPS/GNSS signals as well as solutions to detect and mitigate interference such as jamming and spoofing for critical systems. You'll hear from industry experts who will present commercial and...
Continue reading
  423 Hits
  0 Comments
423 Hits
0 Comments

iBypass and Thoughts in a Traffic Jam

​Each of us has sat in standstill traffic, trying to understand why this major highway we drive all the time has suddenly backed up, with our phone maps application showing a line of red for the next mile or two. As we crawl towards the bottleneck, we see it: A fender bender with dented cars still blocking a lane of traffic. We see police on the sc...
Continue reading
  378 Hits
  0 Comments
378 Hits
0 Comments

How To Achieve "Multi-Cloud" Monitoring

Continuing our focus on the challenge of performance monitoring in the Cloud, David Hock, Director of Research at Infosim, discusses their approach to "Multi-Cloud Monitoring." We interviewed David Hock and this is what he had to say. ​You discuss Multi-Cloud monitoring, what do you mean by that term? Sourcing of services from different Cloud servi...
Continue reading
  420 Hits
  0 Comments
420 Hits
0 Comments

Reduce the cost of tool sprawl with smarter network monitoring

Monitoring tools have always been critical for ensuring network performance and security. Top vendors have designed new tools specifically for monitoring networks with virtualization, cloud infrastructure, distributed data centers, and edge computing. Way back in 2016, Enterprise Management Associates found that 24% of enterprises used 6-10 monitor...
Continue reading
  477 Hits
  0 Comments
477 Hits
0 Comments

Cutting SaaS Troubleshooting Time with Network Performance Metrics

​ With the popularity of SaaS platforms on the rise, network performance metrics become an invaluable tool in the hands of network administrators, who cannot afford to waste time resolving issues that originate outside their network. Office 365, G Suite, Salesforce and many other SaaS platforms are replacing applications operated in-house by IT dep...
Continue reading
  511 Hits
  0 Comments
511 Hits
0 Comments

Contact Us

Address:

Telnet Networks Inc.
100 Strowger Blvd, Suite 118, Brockville, ON, K6V 5J9, Canada

Phone:

(800) 561-4019

Fax:

613-498-0075

For More Information about Telnet Networks, our products, or our services, or to request a quote please feel free to contact us directly.

Latest Blog Posts

Latest Blog Posts (copy)