Latest Blog Posts

Newsletter

 

For a Free Quote...

Telnet Network News

Telnet Network News - We'll keep you up to date with what's happening in the industry.

GNSS Security and Cybersecurity: What are the Parallels?

​In December 2015, Ukraine suffered sporadic power outages due to cyberattacks against three of their regional power companies. Hackers exploited deficiencies in the companies' network security architecture to disrupt operations and insert malware that would cause issues during restoration efforts. The US National Cybersecurity and Communications I...
Continue reading
  447 Hits
  0 Comments
447 Hits
0 Comments

Monitoring the Industry 4.0 Network Infrastructure with IOTA

​The Internet of Things, commonly known as IoT, is no longer the "next big thing". In the last two decades, the technology has evolved massively transforming the industrial and manufacturing operations. But there are also other hot topics that are just as prevalent, the Industrial Internet of Things (IIoT) and Industry 4.0. Chances are that you mig...
Continue reading
  316 Hits
  0 Comments
316 Hits
0 Comments

NMSaaS - Webinar - IoT Management for Service Providers and Enterprises

​ Date: Thursday December 5th, 2019 Time: 2 pm EST  Join us for an in-depth look at how NMSaaS is empowering Service Providers and Enterprises to fulfill the promise of IoT data. For years IoT has been the "next thing", but until very recently real use cases have been few and far between.Now, NMSaaS can show you how we are delivering real...
Continue reading
  658 Hits
  0 Comments
658 Hits
0 Comments

3 Network Performance Monitoring Metrics to Deal with Performance Degradation

In my 20+ years career, I've worked with two types of technologies. Those that took extensive marketing efforts to communicate their value and failed to deliver it, as well as technologies that proved themselves quickly during a single day. Network performance monitoring using flow data is the second case. In this post, I share my experience with N...
Continue reading
  475 Hits
  0 Comments
475 Hits
0 Comments

Viavi - NetFlow vs Packet Data

​IT managers and engineers are constantly challenged to maintain application performance, stay ahead of security breaches and resolve complex network problems. Two of the more powerful data sources available today are NetFlow (IPFIX) and packet data, which have been helping network and security teams gain clear visibility into the network for years...
Continue reading
  729 Hits
  0 Comments
729 Hits
0 Comments

Spectracom - Latest SecureSync and Netclock 9400 Update Files

Update Files for SecureSync/NetClock 9400 to version 5.8.6 The following files, corresponding to version 5.8.6, are available for download here: the software update file, the update instructions for SecureSync, update instructions for NetClock 9400, release notes for SecureSync and release notes for NetClock 9400. If you have been instructed to "cl...
Continue reading
  575 Hits
  0 Comments
575 Hits
0 Comments

ProfiTap - The Benefits of Using ProfiSight Network Traffic Analyzer

As networks get faster and more complex, new performance issues appear. Conventional network monitoring takes too much time, that's why network analysts are looking for tools that not only help them get to the source of problems as fast as possible, but also optimize their workflow. So, how can we get from a broad view of the network to a pinpoint ...
Continue reading
  511 Hits
  0 Comments
511 Hits
0 Comments

Infosim - Firewall Configuration/Network Configuration and Change Management (NCCM)

​ Turn on any "techy" TV show or movie these days and you are bound to see some reference to hackers trying to break into corporate or government networks by breaching firewalls. While many of the scenarios are unrealistic as they are portrayed onscreen, the real-life battle between security vendors and hackers does go on. In their effort to defeat...
Continue reading
  575 Hits
  0 Comments
575 Hits
0 Comments

Security Spends on prevention, detection and remediation

​ Security is a big concern for every business and yet high-profile breaches continue to hit the headlines. This shows hackers will find a way through the most robust security measures if the prize is lucrative enough.  Preventative security in-depth isn't enough to save you, your data or your reputation. Did you know that organizations curren...
Continue reading
  567 Hits
  0 Comments
567 Hits
0 Comments

Ixia - Exposing Hidden Security Threats and Network Attacks

How do you ensure maximum service availability while protecting and securing your enterprise? IT departments have been wrestling with this problem for years. Virtualization and mobility are expanding the traditional network boundary, which means data and assets no longer sit in a single location behind a firewall.  Network security monitoring ...
Continue reading
  751 Hits
  0 Comments
751 Hits
0 Comments

Orolia Case Study - Banking on BroadShield

​Why This Case Study is Relevant It demonstrates the importance of installing anti-jam and anti-spoofing software. Background  ​A major international financial services provider was experiencing issues in their lab environment with its GNSS-based timing systems. GNSS reception was being intermittently lost and the customer didn't know why. Rat...
Continue reading
  617 Hits
  0 Comments
617 Hits
0 Comments

How To Achieve "Multi-Cloud" Monitoring

Continuing our focus on the challenge of performance monitoring in the Cloud, David Hock, Director of Research at Infosim, discusses their approach to "Multi-Cloud Monitoring." We interviewed David Hock and this is what he had to say. ​You discuss Multi-Cloud monitoring, what do you mean by that term? Sourcing of services from different Cloud servi...
Continue reading
  661 Hits
  0 Comments
661 Hits
0 Comments

Cutting SaaS Troubleshooting Time with Network Performance Metrics

​ With the popularity of SaaS platforms on the rise, network performance metrics become an invaluable tool in the hands of network administrators, who cannot afford to waste time resolving issues that originate outside their network. Office 365, G Suite, Salesforce and many other SaaS platforms are replacing applications operated in-house by IT dep...
Continue reading
  746 Hits
  0 Comments
746 Hits
0 Comments

Orolia - Tech Brief Resiliency in PNT: Cybersecurity

Cybersecurity is the watchword of the day, but what does it mean for Positioning, Navigation and Timing (PNT)? For many, the ability to hack or spoof a GPS/GNSS signal is a cybersecurity issue. At Orolia , we agree, which is why we have a wide array of products to augment, toughen and protect against GNSS vulnerabilities. However, the other aspect ...
Continue reading
  876 Hits
  0 Comments
876 Hits
0 Comments

Deliver Enhanced Traffic Monitoring for Private Clouds and Data Centers

CloudLens Self-Hosted 5.1 provides packet-level visibility into restricted cloud environments to detect security vulnerabilities and increase application and network performance monitoring ​ SANTA ROSA, Calif., July 31, 2019 – Keysight Technologies, Inc. (NYSE: KEYS), a leading technology company that helps enterprises, service providers and govern...
Continue reading
  509 Hits
  0 Comments
509 Hits
0 Comments

VIAVI Solutions - State of the Network 2019

NetOps and SecOps Collide Over 600 IT professionals weigh in on the workloads, challenges, data sources and team collaboration required to safeguard critical corporate assets. Study Highlights: Network team role in security increases: Over 80% of network teams play a role in security efforts including investigations and clean-up, implementation and...
Continue reading
  810 Hits
  0 Comments
810 Hits
0 Comments

The Best Way To Optimize Load Balancing for Inline Security Appliances

​ In today's 24x7, "always on" world, the company's data network must be as reliable as possible. Otherwise, revenue reduction and productivity losses are not only possible, but probable. This includes inline security and monitoring tools which can become a single point of failure. Security and monitoring tool survivability is often thought about i...
Continue reading
  697 Hits
  0 Comments
697 Hits
0 Comments

What is hidden in encrypted internet traffic streams

​ Full internet encryption is on the horizon and with it the risk that hackers will gain access to your computer network. When you open any website today, it is highly probable you will see a small padlock in front of the address. For the everyday internet user, this is the only visible sign that the site is secure and communication with the site i...
Continue reading
  690 Hits
  0 Comments
690 Hits
0 Comments

Orolia Product Notification for SecureSync and NetClock 9400

​ Orolia would like to take this opportunity to inform our customers of a Preventative Maintenance Action (PMA) to your SecureSync 1200 and NetClock 9400 appliances. This PMA is being executed to prevent unexpected failures caused by flash memory corruption within these appliances. Our SecureSync 1200 and NetClock 9400 line of products have an inte...
Continue reading
  941 Hits
  0 Comments
941 Hits
0 Comments

5 predictions for cyber security in 2019

​Last year completely refuted doubts about the increasing cyber security risks. Hackers, obtained sensitive data on hundreds of German politicians, including Chancellor Merkel and accessed data relating to tens of millions of Facebook accounts. The year also confirmed that hacking has become a means for political activists and an effective tool for...
Continue reading
  832 Hits
  0 Comments
832 Hits
0 Comments

Contact Us

Address:

Telnet Networks Inc.
100 Strowger Blvd, Suite 118, Brockville, ON, K6V 5J9, Canada

Phone:

(800) 561-4019

Fax:

613-498-0075

For More Information about Telnet Networks, our products, or our services, or to request a quote please feel free to contact us directly.