Need Assistance?

Latest Blog Posts

Newsletter

For a Free Quote...

Telnet Network News

Telnet Network News - We'll keep you up to date with what's happening in the industry.

Infosim's SDN/NFV-enabled Security Architecture for Enterprise Networks

 Infosim® together with University of Würzburg, TU Munich & genua mbH Key Learning Objectives  ​ The SarDiNe Research Project  Fine-grained Access Control in SDN Networks Resiliency and Offloading for a Firewall Virtual Network Function  SDN/NFV & Cloud managed by StableNet® The ever-increasing number and complexity of c...
Continue reading
259 Hits
0 Comments

Ixia Special Edition Network Visibility For Dummies

 Advanced cyber threats, cloud computing, and exploding traffic volume pose significant challenges if you are responsible for your organization's network security and performance management. The concept of 'network visibility' is frequently introduced as the key to improvement. But what exactly is network visibility and how does it help an org...
Continue reading
206 Hits
0 Comments

NMSaaS' The Importance of Network Performance Monitoring

In 2017, any drop in your network's performance will affect your enterprise's overall productivity. Ensuring the optimal performance of your network, in turn, requires sophisticated network performance monitoring. Through exceptional reporting and optimization, a high-quality network performance monitoring service can ensure that every aspect of yo...
Continue reading
399 Hits
0 Comments

3 Key Differences Between NetFlow and Packet Capture Performance Monitoring

The increasing density, complexity and expanse of modern networking environments have fueled the ongoing debate around which network analysis and monitoring tools serve the needs of the modern engineer best - placing Packet Capture and NetFlow Analysis at center-stage of the conversation. Granted, both can be extremely valuable tools in ongoing efforts to maintain and optimize complex environments, but as an engineer, I tend to focus on solutions that give me the insights I need without too much...
Continue reading
941 Hits
0 Comments

8 Keys to Understanding NetFlow for Network Security Performance and Overall IT Health

NetFlow Auditor has released a new ebook covering 8 ways companies can leverage the power of NetFlow to achieve top-priority objectives.  Learn about these 8 objectives: Performance Monitoring Security Forensics Traffic Accounting Data Retention Compliance Anomaly Detection End-Point Threat Detection BYOD, Insider Threats, SCADA and the Internet of Things Usage-Based Billing and Peering Analysis   To view this ebook click here .  Thank you to NetFlow Auditor for providing this e-b...
Continue reading
892 Hits
0 Comments

Infosim® Product Called StableNet® Chosen as Athenahealth Consolidates Network Performance Monitoring

Infosim® , the new leader in network performance management , today announced that it has been selected as the supplier of choice to consolidate the IT infrastructure performance monitoring capabilities at Athenahealth . Following an extensive evaluation of the performance management market, the organization identified StableNet® as the only vendor capable of offering a single comprehensive view of the performance and capacity of its IT infrastructure in one unified solution, and with the highes...
Continue reading
1055 Hits
0 Comments

Healthcare IT Reveals Network Rx

Healthcare IT Reveals Network Rx
IT Heroes: A Prescription for Network Health Each and every day, the bold men and women of IT risk it all to deliver critical applications and services. Their stories are unique. Their triumphs inspire. For the first time ever, the IT Heroes Series offers a revealing glimpse into the secrets and strategies that have won accolades for network teams around the world – and could do the same for you. Initial Symptoms Located in South West England, the Northern Devon National Health Service (NHS...
Continue reading
991 Hits
0 Comments

What is Driving Demand for Deeper Traffic Analysis?

During a customer review call last week, we got a very interesting quote from a US based user who offers marketing services to the retail sector: ‘We need greater insight over what is taking place on our internal network, systems, services, and external web farm seen through a single portal. We need to keep downtime to a minimum both internally and on our external customer-facing web farm. We chose LANGuardian because of its integration with SolarWinds and its deep-packet inspection capabilities...
Continue reading
1188 Hits
0 Comments

The Network Design and Equipment Deployment Lifecycle

As we all know, technology has a life cycle of birth, early adoption, mainstream, and then obsoletion. Even the average consumer is very in touch with this lifecycle. However, within this overarching lifecycle there are “mini” lifecycles. One of these mini lifecycles that is particularly important to enterprises is the network design and equipment deployment lifecycle. This lifecycle is the basic roadmap of how equipment gets deployed within a company data network and key a topic of concern for ...
Continue reading
1159 Hits
0 Comments

How to Deal With Unusual Traffic Detected Notifications

If you get an unusual traffic detected notification from Google, it usually means your IP address was or still is sending suspicious network traffic. Google can detect this and has recently implemented security measures to protect against DDoS , other server attacks and SEO rank manipulation . The key thing to remember is that the notification is based on your Internet facing IP address, not your private IP address which is assigned to your laptop\PC\device. If you don’t know what your Internet ...
Continue reading
677 Hits
0 Comments

Key Factors in NCCM and CMDB Integration - Part 2 – Change Configuration and Backup

In Part 1 of this series I discussed how an NCCM solution and a CMDB can work together to create a more effective IT inventory system. In this post, I will be taking that a step further and show how your change configuration process will benefit from integration with that same CMDB. In general, the process of implementing IT infrastructure change happens at 3 separate stages of an assets lifecycle. Initial deployment / provisioning In production / changes Decommissioning / removal In each of the...
Continue reading
666 Hits
0 Comments

Infosim® Announces Release of StableNet® 7.5

Infosim® , the technology leader in automated Service Fulfillment and Service Assurance solutions, today announced the release of version 7.5 of its award-winning software suite StableNet® for Telco and Enterprise customers. StableNet® 7.5 provides a significant number of powerful new features, including: Dynamic Rule Generation (DRG); a new and revolutionary Fault Management concept REST interface supporting the new StableNet® iPhone (and upcoming Android) app Highly customizable dashboard...
Continue reading
775 Hits
0 Comments

How Can We Monitor Traffic Associated with Remote Sites?

Many IT teams are now tasked with managing remote sites without having the luxury of local IT support. Business owners expect everything to be done remotely, we do live in the connected age, don’t we? Is it possible to see what is happening in these networks without the need for installing client or agent software everywhere? You can gather some network performance information using SNMP or WMI but you will be limited to alerts or high level information. What you need is some form of deeper traf...
Continue reading
735 Hits
0 Comments

Two Ways Networks Are Transformed By NetFlow

According an article in techtarget.com "Your routers and switches can yield a mother lode of information about your network--if you know where to dig." The article goes on to say that excavating and searching through endless traffic data and logs manufactured by your network system is a lot like mining for gold, and punching random holes to look for a few nuggets of information isn't very efficient. Your search will be much more fruitful if you know where to look and what it will look like. Fort...
Continue reading
688 Hits
0 Comments

Webinar- Best Practices for NCCM

Most networks today have a “traditional” IT monitoring solution in place which provides alarming for devices, servers and applications. But as the network evolves, so does the complexity and security risks and it now makes sense to formalize the process, procedures, and policies that govern access and changes to these devices. Vulnerability and lifecycle management also plays an important role in maintaining the security and integrity of network infrastructure. Network Configuration and Change M...
Continue reading
654 Hits
0 Comments

SDN/NFV – From Theory to Praxis with Infosim® StableNet®

InterComms talks to Marius Heuler, CTO Infosim®, about Infosim® StableNet® and the management and orchestration of SDN and NFV environments Marius Heuler has more than 15 years of experience in network management and optimization. As CTO and founding member of Infosim®, he is responsible for leading the Infosim® technical team in architecting, developing, and delivering StableNet®. He graduated from the University of Würzburg with a degree in Computer Science, holds several Cisco certifications,...
Continue reading
717 Hits
0 Comments

5 Reasons Why You Should Include LAN Switches in Your NCCM Scope

We’ve been doing a lot of blogging around here lately about NCCM and the importance of having an automated configuration and change management system. We’ve even published a Best practices guide for NCCM . One of the main points in any NCCM system is having consistent and accurate configuration backups of all of your “key” devices. When I ask Network Managers to name their key devices, they generally start with WAN / Internet routers and Firewalls. This makes sense of course because, in a modern...
Continue reading
661 Hits
0 Comments

5 Perks of Network Performance Management

Network performance management is something that virtually every business needs, but not something that every business is actively doing, or even aware of. And why should they? While understanding the technical side of things is best left to the IT department, understanding the benefits of a properly managed network is something that will help get the business managers on board, especially when good performance management solutions might be a cost that hadn't been considered. So what are the ben...
Continue reading
638 Hits
0 Comments

Key Factors in NCCM and CMDB Integration - Part 1 Discovery

Part I Discovery “I am a rock, I am an Island…” These lyrics by Simon and Garfunkel pretty appropriately summarize what most IT companies would like you to believe about their products. They are islands that stand alone and don’t need any other products to be useful. Well, despite what they want, the truth is closer to the lyrics by the Rolling Stones – “We all need someone we can lean on”. Music history aside, the fact is that interoperability and integration is one of the most important keys t...
Continue reading
1244 Hits
0 Comments

Benefits of Network Security Forensics

The networks that your business operates on are often open and complex. Your IT department is responsible for mitigating network risks, managing performance and auditing data to ensure functionality. Using NetFlow forensics can help your IT team maintain the competitiveness and reliability of the systems required to run your business. In IT, network security forensics involves the monitoring and analysis of your network's traffic to gather information, obtain legal evidence and detect network in...
Continue reading
728 Hits
0 Comments