Need Assistance?

Latest Blog Posts

Newsletter

For a Free Quote...

Telnet Network News

Telnet Network News - We'll keep you up to date with what's happening in the industry.

Infosim® provides any-to-any IoT management with StableNet®

The unprecedented complexity of IoT is bringing together a universe of "things" that were not designed to work together or share data. Data is increasing exponentially. Competitive edge often depends on getting new services to market quickly. New management systems can take years to roll out.  Now there's StableNet® — an innovative, flexible p...
Continue reading
280 Hits
0 Comments

Eight Steps to take when conducting your first threat hunt

Unlike traditional, reactive approaches to detection, hunting is proactive. With hunting, security professionals don't wait to take action until they've received a security alert or, even worse, suffer a data breach. Instead, hunting entails looking for opponents who are already in your environment. Hunting leads to discovering undesirable activity...
Continue reading
279 Hits
0 Comments

Infosim: Go with the flow – choose the right tool though!

NetFlow is a handy tool in the daily work of Network Admins and Analysts. It can be used to measure traffic in networks from an End-to-End perspective, and allows the filtering by several types of data: ​ Time  Source/destination IP  Source/destination port numbers (at least for UDP and TCP)  Ingress interface SNMP ifIndex TOS inform...
Continue reading
213 Hits
0 Comments

Ixia Has Your Secret Weapon Against SSL Threats

It has finally happened: thanks to advances in encryption, legacy security and monitoring tools are now useless when it comes to SSL. Read this white paper from Ixia , to learn how this negatively impacts visibility into network applications, such as e-mail, e-commerce, online banking, and data storage. Or even worse, how advanced malware...
Continue reading
296 Hits
0 Comments

Viavi's On-Demand Application Dependency Mapping Central to Latest Observer Update

New Observer Apex offers faster loading speeds, connection dynamics functionality for packet visibility, on-demand application dependency mapping (ADM), improved widget editor for faster insights, VoIP service-level agreement assurance based on threshold monitoring, faster alarms, and more. On-Demand ADM On-demand ADM offers fast discovery of appli...
Continue reading
286 Hits
0 Comments

PacketPushers Podcast: Cloud-native monitoring and security

PacketPushers Greg Ferro and Ethan Banks bring their irreverent approach to networking to this podcast. This podcast covers how to access packet data in the cloud for security and monitoring. Just as north-south network traffic has given way to east-west network traffic, the traditional data center is yielding to the cloud. While this shift ha...
Continue reading
280 Hits
0 Comments

NMSaaS' The Importance of Network Performance Monitoring

In 2017, any drop in your network's performance will affect your enterprise's overall productivity. Ensuring the optimal performance of your network, in turn, requires sophisticated network performance monitoring. Through exceptional reporting and optimization, a high-quality network performance monitoring service can ensure that every aspect of yo...
Continue reading
412 Hits
0 Comments

Prevent Petya Ransomware by disabling SMBv1 on your Network

Petya \ GoldenEye encrypts entire disks  A new variant of Petya ransomware, also known as Petrwrap, NotPetya, or GoldenEye, is spreading rapidly with the help of the same Windows SMBv1 vulnerability that the WannaCry ransomware abused to infect 300,000 systems and servers worldwide in just 72 hours. Petya ransomware has been delivered via phis...
Continue reading
379 Hits
0 Comments

Best Practices for using NetFlow for Network Forensics Webinar 2

Join us for the latest NetFlow Best Practices Webinar. In this Webinar, we will discuss Best Practices for using NetFlow for Network Forensics.  In this webinar, Netflow Auditor will discuss the following: ​ How to know where your network is compromised? How to achieve pervasive monitoring with sufficient forensics to comply How does...
Continue reading
302 Hits
0 Comments

How to detect SMBv1 use on your Network

How can I find out if SMBv1 is being used on my network?  Even if you disable SMBv1 on all clients and servers, it is still good practice to check if any systems on your network are using this protocol. You many have unmanaged systems like personal laptops or embedded operating systems within other network connected devices. These are the most...
Continue reading
700 Hits
0 Comments

Managing Phantom Devices on Your Network

Managing Phantom Devices on Your Network
{jcomments on} Detecting Phantom Devices on Your Network So you run a network discovery and you notice devices that you are not familiar with. A phantom device is a device that is unmanaged that should be monitored by your Network Management System (NMS) It seems these devices show up even though you have processes in place to prevent this type of behavior. These could be devices connected to the wrong network, printers, BYOD etc. A phantom device is invisible to you so you are unaware of the de...
Continue reading
1721 Hits
0 Comments

3 Key Differences Between NetFlow and Packet Capture Performance Monitoring

The increasing density, complexity and expanse of modern networking environments have fueled the ongoing debate around which network analysis and monitoring tools serve the needs of the modern engineer best - placing Packet Capture and NetFlow Analysis at center-stage of the conversation. Granted, both can be extremely valuable tools in ongoing efforts to maintain and optimize complex environments, but as an engineer, I tend to focus on solutions that give me the insights I need without too much...
Continue reading
955 Hits
0 Comments

SDN/NFV – From Theory to Praxis with Infosim® StableNet®

InterComms talks to Marius Heuler, CTO Infosim® , about Infosim® StableNet® and the management and orchestration of SDN and NFV environments Marius Heuler has more than 15 years of experience in network management and optimization. As CTO and founding member of Infosim®, he is responsible for leading the Infosim® technical team in architecting, developing, and delivering StableNet®. He graduated from the University of Würzburg with a degree in Computer Science, holds several Cisco certifications...
Continue reading
1359 Hits
0 Comments

8 Keys to Understanding NetFlow for Network Security Performance and Overall IT Health

NetFlow Auditor has released a new ebook covering 8 ways companies can leverage the power of NetFlow to achieve top-priority objectives.  Learn about these 8 objectives: Performance Monitoring Security Forensics Traffic Accounting Data Retention Compliance Anomaly Detection End-Point Threat Detection BYOD, Insider Threats, SCADA and the Internet of Things Usage-Based Billing and Peering Analysis   To view this ebook click here .  Thank you to NetFlow Auditor for providing this e-b...
Continue reading
905 Hits
0 Comments

Infosim® Product Called StableNet® Chosen as Athenahealth Consolidates Network Performance Monitoring

Infosim® , the new leader in network performance management , today announced that it has been selected as the supplier of choice to consolidate the IT infrastructure performance monitoring capabilities at Athenahealth . Following an extensive evaluation of the performance management market, the organization identified StableNet® as the only vendor capable of offering a single comprehensive view of the performance and capacity of its IT infrastructure in one unified solution, and with the highes...
Continue reading
1068 Hits
0 Comments

Webinar November 24th: Move Your Enterprise Network Management To The Cloud

Webinar November 24th: Move Your Enterprise Network Management To The Cloud
NMSaaS Webinar November 24th at 2:00pm EST Are you tired of "Tool Sprawl" and large CAPEX intestments when trying to deliver Enterprise network Management for Network Monitoring, VoIP Monitoring and Config Management to your organization?  This Wedinar will provide an in depth demonstration on how to move your enterprise network to the cloud using the following solutions: Network Management VoIP monitoring Configuration Management NetFlow Monitoring  
948 Hits
0 Comments

Healthcare IT Reveals Network Rx

Healthcare IT Reveals Network Rx
IT Heroes: A Prescription for Network Health Each and every day, the bold men and women of IT risk it all to deliver critical applications and services. Their stories are unique. Their triumphs inspire. For the first time ever, the IT Heroes Series offers a revealing glimpse into the secrets and strategies that have won accolades for network teams around the world – and could do the same for you. Initial Symptoms Located in South West England, the Northern Devon National Health Service (NHS...
Continue reading
1007 Hits
0 Comments

What is Driving Demand for Deeper Traffic Analysis?

During a customer review call last week, we got a very interesting quote from a US based user who offers marketing services to the retail sector: ‘We need greater insight over what is taking place on our internal network, systems, services, and external web farm seen through a single portal. We need to keep downtime to a minimum both internally and on our external customer-facing web farm. We chose LANGuardian because of its integration with SolarWinds and its deep-packet inspection capabilities...
Continue reading
1196 Hits
0 Comments

ThreatARMOR Reduces Your Network’s Attack Surface

2014 saw the creation of more than 317 million new pieces of malware. That means an average of nearly one million new threats were released each day. Here at Ixia we’ve been collecting and organizing threat intelligence data for years to help test the industry’s top network security products. Our Application and Threat Intelligence (ATI) research center maintains one of the most comprehensive lists of malware, botnets, and network incursions for exactly this purpose. We’ve had many requests to l...
Continue reading
847 Hits
0 Comments

The Network Design and Equipment Deployment Lifecycle

As we all know, technology has a life cycle of birth, early adoption, mainstream, and then obsoletion. Even the average consumer is very in touch with this lifecycle. However, within this overarching lifecycle there are “mini” lifecycles. One of these mini lifecycles that is particularly important to enterprises is the network design and equipment deployment lifecycle. This lifecycle is the basic roadmap of how equipment gets deployed within a company data network and key a topic of concern for ...
Continue reading
1172 Hits
0 Comments