Need Assistance?

Latest Blog Posts

Newsletter

For a Free Quote...

Telnet Network News

Telnet Network News - We'll keep you up to date with what's happening in the industry.

A little deception goes a long way in cybersecurity with PacketViper

New innovations in deception can provide proactive network security teams a cost-effective way to strengthen their security posture despite limited resources. Traditional deception approaches such as honeypots have limitations and can be tough to manage. PacketViper's automated, dynamic deception and defense technologies in the Virtual Minefield Zo...
Continue reading
311 Hits
0 Comments

Inspecting SSL Traffic

A delicate balancing act is taking place on networks globally. It is the balance between applying strong protective measures to keep data safe and unintentionally concealing new IT security vulnerabilities. And it all centers on SSL (Secure Socket Layer) encryption. Just as SSL encryption protects certain details of a transaction, it can also conce...
Continue reading
250 Hits
0 Comments

Eight Steps to take when conducting your first threat hunt

Unlike traditional, reactive approaches to detection, hunting is proactive. With hunting, security professionals don't wait to take action until they've received a security alert or, even worse, suffer a data breach. Instead, hunting entails looking for opponents who are already in your environment. Hunting leads to discovering undesirable activity...
Continue reading
269 Hits
0 Comments

Netfort's How to deal with the Locky Ransomware Email Campaign

Locky Ransomware Ransomware has been the number one cyber-security threat in 2017. Outbreaks such as WannaCry have caused massive amounts of damage worldwide. If you want to detect Ransomware such as WannaCry you should watch out for an increase in file renames and deploy technologies such as IDS to identify outbreaks on your network.  Recentl...
Continue reading
276 Hits
0 Comments

Overcoming the #1 Challenge in Security Operations

​"'We can't '80/20' network security. We don't know enough about the alerts we miss. 100% review should be the operational objective for responsible network administrators." -PacketViper The Problem: The overwhelming volume of global IP traffic hitting networks today creates a crushing amount of security alerts. Too frequently, many of these alerts...
Continue reading
408 Hits
0 Comments

Defense in Motion: PacketViper Virtual Minefield Zone (VMZ)

PacketViper customers can build a Virtual Minefield Zone (VMZ) to create a nearly impenetrable network perimeter, and also enforce penalties instantly for any connections falling outside of your defined network guidelines. The VMZ leverages the administrator's advantage, which is the intimate knowledge of their network infrastructure. We then use t...
Continue reading
282 Hits
0 Comments

Prevent Petya Ransomware by disabling SMBv1 on your Network

Petya \ GoldenEye encrypts entire disks  A new variant of Petya ransomware, also known as Petrwrap, NotPetya, or GoldenEye, is spreading rapidly with the help of the same Windows SMBv1 vulnerability that the WannaCry ransomware abused to infect 300,000 systems and servers worldwide in just 72 hours. Petya ransomware has been delivered via phis...
Continue reading
364 Hits
0 Comments

Viavi: Nearly 90 Percent of Enterprise Network Teams Spend Time Troubleshooting Security Issues; 80 Percent Report More Time Spent on Security vs. Last Year

Tenth Annual "State of the Network" Global Survey from Viavi Reveals Network and Security Trends from over 1,000 Network Professionals  In April 2017, Viavi Solutions (NASDAQ: VIAV) released the results of its tenth annual State of the Network global study today. This year's study focused on security threats, perhaps explaining why it gar...
Continue reading
509 Hits
0 Comments

3 Things PacketViper can do that your Firewall Can’t

Three elements of PacketViper that are unique to our Virtual Minefield Zone™ (VMZ) and separate PacketViper from firewalls & NGFWs are the triggers, interceptors and the redirectors. With 'point & click' simplicity these features can be utilized to create the following deterrents that reduce traffic up to 70% and make firewalls, IDS/IPS and...
Continue reading
335 Hits
0 Comments