Need Assistance?

Latest Blog Posts

Newsletter

For a Free Quote...

Telnet Network News

Telnet Network News - We'll keep you up to date with what's happening in the industry.

Bell Q3 service revenue climbs 5.9%; LTE coverage reaches 99%

Bell Canada Enterprises ( BCE ) reports that its total revenue grew 5.0% year-on-year in Q3 2017 to CAD5.678 billion (USD4.425 billion), whilst underlying service revenue climbed 5.9%. Adjusted EBITDA was up 5.9% in three months ended 30 September 2017, yielding an improved EBITDA margin of 41.7%, on continued strong wireless growth, improved wirel...
Continue reading
206 Hits
0 Comments

Shaw reports 8.1% revenue growth in fiscal year; Freedom unit deploys new LTE spectrum

Canadian quad-play cableco and mobile group Shaw Communications has reported its consolidated financial results for its fiscal fourth quarter and year ended 31 August 2017. Revenue from continuing operations of CAD1.24 billion (USD968 million) for the quarter and CAD4.88 billion for the year increased by 2.6% and 8.1%, respectively, over the compar...
Continue reading
231 Hits
0 Comments

Infosim® provides any-to-any IoT management with StableNet®

The unprecedented complexity of IoT is bringing together a universe of "things" that were not designed to work together or share data. Data is increasing exponentially. Competitive edge often depends on getting new services to market quickly. New management systems can take years to roll out.  Now there's StableNet® — an innovative, flexible p...
Continue reading
356 Hits
0 Comments

Feds ditch 80,000 PSTN lines for Telus VoIP; replace Rogers with Bell in CAD432m mobile deal

Telus Communications has won a CAD176 million (USD140.6 million) seven-year contract with the Canadian federal government's Shared Services Canada to provide VoIP telephony, instant messaging and desktop videoconferencing. The deal is in conjunction with a federal decision to axe 80,000 traditional landlines in favour of VoIP; Shared Services Canad...
Continue reading
354 Hits
0 Comments

Infosim's SDN/NFV-enabled Security Architecture for Enterprise Networks

 Infosim® together with University of Würzburg, TU Munich & genua mbH Key Learning Objectives  ​ The SarDiNe Research Project  Fine-grained Access Control in SDN Networks Resiliency and Offloading for a Firewall Virtual Network Function  SDN/NFV & Cloud managed by StableNet® The ever-increasing number and complexity of c...
Continue reading
347 Hits
0 Comments

A little deception goes a long way in cybersecurity with PacketViper

New innovations in deception can provide proactive network security teams a cost-effective way to strengthen their security posture despite limited resources. Traditional deception approaches such as honeypots have limitations and can be tough to manage. PacketViper's automated, dynamic deception and defense technologies in the Virtual Minefield Zo...
Continue reading
383 Hits
0 Comments

Telus claims Canada-first LAA test on live commercial network

Telus has completed tests of Licensed Assisted Access (LAA) on indoor and outdoor live LTE-Advanced (LTE-A) networks in Canada, claiming a national first. The tests delivered download speeds of 970Mbps indoors and 966Mbps outdoors using 80MHz of aggregated spectrum, and Telus noted that LAA is one of the key LTE-Advanced Pro technologies that will ...
Continue reading
492 Hits
0 Comments

Spectracom Product Software Notification

Telnet Networks is pleased to notify you of the availability of a new version of software for Spectracom's SecureSync and NetClock 9400 series synchronization systems.  Download the V5.7.1 release below featuring: ​ The Talen-X BroadShield feature requiring license SS-OPT-BSH. This optional functionality offers spoofing and jamming protection ...
Continue reading
468 Hits
0 Comments

Inspecting SSL Traffic

A delicate balancing act is taking place on networks globally. It is the balance between applying strong protective measures to keep data safe and unintentionally concealing new IT security vulnerabilities. And it all centers on SSL (Secure Socket Layer) encryption. Just as SSL encryption protects certain details of a transaction, it can also conce...
Continue reading
993 Hits
0 Comments

Eight Steps to take when conducting your first threat hunt

Unlike traditional, reactive approaches to detection, hunting is proactive. With hunting, security professionals don't wait to take action until they've received a security alert or, even worse, suffer a data breach. Instead, hunting entails looking for opponents who are already in your environment. Hunting leads to discovering undesirable activity...
Continue reading
340 Hits
0 Comments

Ixia Special Edition Network Visibility For Dummies

 Advanced cyber threats, cloud computing, and exploding traffic volume pose significant challenges if you are responsible for your organization's network security and performance management. The concept of 'network visibility' is frequently introduced as the key to improvement. But what exactly is network visibility and how does it help an org...
Continue reading
259 Hits
0 Comments

Northwestel building Nunavut backbone satellite network with government funding

Innovation, Science and Economic Development Canada (ISED) announced yesterday that CAD50 million (USD41 million) of government funding has been allocated to a project to deploy a backbone satellite network supporting higher-speed internet for all 25 communities across Nunavut, the far northern region governed by indigenous peoples. The funding – p...
Continue reading
323 Hits
0 Comments

Candela Releases LANforge Version 5.3.6.

Candela Technologies has released 5.3.6 for its LANforge Fire and ICE. LANforge-FIRE generates stateful network traffic at various speeds with the ability to monitor packets for throughput and correctness. LANforge-FIRE sits on the edge of your network and tests your network core. LANforge-ICE emulates networks by connecting virtual route...
Continue reading
479 Hits
0 Comments

Netfort's How to deal with the Locky Ransomware Email Campaign

Locky Ransomware Ransomware has been the number one cyber-security threat in 2017. Outbreaks such as WannaCry have caused massive amounts of damage worldwide. If you want to detect Ransomware such as WannaCry you should watch out for an increase in file renames and deploy technologies such as IDS to identify outbreaks on your network.  Recentl...
Continue reading
361 Hits
0 Comments

Infosim: Go with the flow – choose the right tool though!

NetFlow is a handy tool in the daily work of Network Admins and Analysts. It can be used to measure traffic in networks from an End-to-End perspective, and allows the filtering by several types of data: ​ Time  Source/destination IP  Source/destination port numbers (at least for UDP and TCP)  Ingress interface SNMP ifIndex TOS inform...
Continue reading
260 Hits
0 Comments

Ixia Has Your Secret Weapon Against SSL Threats

It has finally happened: thanks to advances in encryption, legacy security and monitoring tools are now useless when it comes to SSL. Read this white paper from Ixia , to learn how this negatively impacts visibility into network applications, such as e-mail, e-commerce, online banking, and data storage. Or even worse, how advanced malware...
Continue reading
356 Hits
0 Comments

CRTC interim wholesale broadband access rates take effect in Ontario, Quebec

The Canadian Radio-television and Telecommunications Commission (CRTC) has imposed interim rates for 'disaggregated' wholesale high speed access services in Ontario and Quebec, applicable to the two provinces' largest copper/fibre access network operator Bell Canada, as well as the three largest cablecos in Ontario/Quebec – Rogers, Videotron and Co...
Continue reading
350 Hits
0 Comments

Viavi's On-Demand Application Dependency Mapping Central to Latest Observer Update

New Observer Apex offers faster loading speeds, connection dynamics functionality for packet visibility, on-demand application dependency mapping (ADM), improved widget editor for faster insights, VoIP service-level agreement assurance based on threshold monitoring, faster alarms, and more. On-Demand ADM On-demand ADM offers fast discovery of appli...
Continue reading
326 Hits
0 Comments

Infosim's Veni, Vidi, Vici: Seeing as an integral part of conquering your network Webinar

Infosim's Global Webinar  Julius Caesar knew that, in order to conquer an issue, you need to get a good overview of the situation you are facing. In this Webinar, Infosim shows you how an ideal visualization solution can help you conquer your network issues.  Join Paul Krochenski, Sales Manager at Infosim®, and Jason Farrer...
Continue reading
385 Hits
0 Comments

Overcoming the #1 Challenge in Security Operations

​"'We can't '80/20' network security. We don't know enough about the alerts we miss. 100% review should be the operational objective for responsible network administrators." -PacketViper The Problem: The overwhelming volume of global IP traffic hitting networks today creates a crushing amount of security alerts. Too frequently, many of these alerts...
Continue reading
486 Hits
0 Comments