Need Assistance?

Latest Blog Posts

Newsletter

For a Free Quote...

Telnet Network News

Telnet Network News - We'll keep you up to date with what's happening in the industry.

A little deception goes a long way in cybersecurity with PacketViper

New innovations in deception can provide proactive network security teams a cost-effective way to strengthen their security posture despite limited resources. Traditional deception approaches such as honeypots have limitations and can be tough to manage. PacketViper's automated, dynamic deception and defense technologies in the Virtual Minefield Zo...
Continue reading
350 Hits
0 Comments

Eight Steps to take when conducting your first threat hunt

Unlike traditional, reactive approaches to detection, hunting is proactive. With hunting, security professionals don't wait to take action until they've received a security alert or, even worse, suffer a data breach. Instead, hunting entails looking for opponents who are already in your environment. Hunting leads to discovering undesirable activity...
Continue reading
280 Hits
0 Comments

Ixia Special Edition Network Visibility For Dummies

 Advanced cyber threats, cloud computing, and exploding traffic volume pose significant challenges if you are responsible for your organization's network security and performance management. The concept of 'network visibility' is frequently introduced as the key to improvement. But what exactly is network visibility and how does it help an org...
Continue reading
212 Hits
0 Comments

Ixia Has Your Secret Weapon Against SSL Threats

It has finally happened: thanks to advances in encryption, legacy security and monitoring tools are now useless when it comes to SSL. Read this white paper from Ixia , to learn how this negatively impacts visibility into network applications, such as e-mail, e-commerce, online banking, and data storage. Or even worse, how advanced malware...
Continue reading
296 Hits
0 Comments

Overcoming the #1 Challenge in Security Operations

​"'We can't '80/20' network security. We don't know enough about the alerts we miss. 100% review should be the operational objective for responsible network administrators." -PacketViper The Problem: The overwhelming volume of global IP traffic hitting networks today creates a crushing amount of security alerts. Too frequently, many of these alerts...
Continue reading
428 Hits
0 Comments

PacketPushers Podcast: Cloud-native monitoring and security

PacketPushers Greg Ferro and Ethan Banks bring their irreverent approach to networking to this podcast. This podcast covers how to access packet data in the cloud for security and monitoring. Just as north-south network traffic has given way to east-west network traffic, the traditional data center is yielding to the cloud. While this shift ha...
Continue reading
280 Hits
0 Comments

Defense in Motion: PacketViper Virtual Minefield Zone (VMZ)

PacketViper customers can build a Virtual Minefield Zone (VMZ) to create a nearly impenetrable network perimeter, and also enforce penalties instantly for any connections falling outside of your defined network guidelines. The VMZ leverages the administrator's advantage, which is the intimate knowledge of their network infrastructure. We then use t...
Continue reading
292 Hits
0 Comments

Viavi’s 10th ‘State of the Network’ study probes security threats

 Viavi Solutions today released the results of its 10th annual State of the Network global study, which focuses on the growing issue of security threats. Now available for download, respondents included 1,035 CIOs, IT directors, and network engineers. "Enterprise network teams are expending more time and resources than ever before to battle se...
Continue reading
429 Hits
0 Comments

Private Cloud: The ABCs of Network Visibility

Cloud computing has become the de facto foundation for digital business. As more and more enterprises move critical workloads to private and public clouds, they will face new challenges ensuring security, reliability, and performance of these workloads. If you are responsible for IT security, data center operations, or application performance, make...
Continue reading
405 Hits
0 Comments

Viavi: Nearly 90 Percent of Enterprise Network Teams Spend Time Troubleshooting Security Issues; 80 Percent Report More Time Spent on Security vs. Last Year

Tenth Annual "State of the Network" Global Survey from Viavi Reveals Network and Security Trends from over 1,000 Network Professionals  In April 2017, Viavi Solutions (NASDAQ: VIAV) released the results of its tenth annual State of the Network global study today. This year's study focused on security threats, perhaps explaining why it gar...
Continue reading
514 Hits
0 Comments

Infosim explains how the SaaS model of Network & Services Management can transform your IT operations

 It is really next to impossible to avoid hearing about how "The Cloud" is transforming business everywhere. Well-known technology companies from the old guard like IBM, Oracle, Microsoft, and Adobe, to established tech powerhouses Google and Amazon, to pretty much every new hot startup like Cloudera are all promoting how they are using the cl...
Continue reading
337 Hits
0 Comments

3 Things PacketViper can do that your Firewall Can’t

Three elements of PacketViper that are unique to our Virtual Minefield Zone™ (VMZ) and separate PacketViper from firewalls & NGFWs are the triggers, interceptors and the redirectors. With 'point & click' simplicity these features can be utilized to create the following deterrents that reduce traffic up to 70% and make firewalls, IDS/IPS and...
Continue reading
346 Hits
0 Comments

How to detect SMBv1 use on your Network

How can I find out if SMBv1 is being used on my network?  Even if you disable SMBv1 on all clients and servers, it is still good practice to check if any systems on your network are using this protocol. You many have unmanaged systems like personal laptops or embedded operating systems within other network connected devices. These are the most...
Continue reading
700 Hits
0 Comments

How to detect the presence of WannaCry Ransomware and SMBv1 servers on your network

How to detect the presence of WannaCry Ransomware and SMBv1 servers  WannaCry Ransomware has become very active in May 2017. It looks to be targeting servers using the SMBv1 protocol. SMBv1 is an outdated protocol that should be disabled on all networks. One of the big lessons from this Ransomware outbreak is that it is vital that you have mon...
Continue reading
419 Hits
0 Comments

3 Key Differences Between NetFlow and Packet Capture Performance Monitoring

The increasing density, complexity and expanse of modern networking environments have fueled the ongoing debate around which network analysis and monitoring tools serve the needs of the modern engineer best - placing Packet Capture and NetFlow Analysis at center-stage of the conversation. Granted, both can be extremely valuable tools in ongoing efforts to maintain and optimize complex environments, but as an engineer, I tend to focus on solutions that give me the insights I need without too much...
Continue reading
955 Hits
0 Comments

8 Keys to Understanding NetFlow for Network Security Performance and Overall IT Health

NetFlow Auditor has released a new ebook covering 8 ways companies can leverage the power of NetFlow to achieve top-priority objectives.  Learn about these 8 objectives: Performance Monitoring Security Forensics Traffic Accounting Data Retention Compliance Anomaly Detection End-Point Threat Detection BYOD, Insider Threats, SCADA and the Internet of Things Usage-Based Billing and Peering Analysis   To view this ebook click here .  Thank you to NetFlow Auditor for providing this e-b...
Continue reading
905 Hits
0 Comments

ThreatARMOR Reduces Your Network’s Attack Surface

2014 saw the creation of more than 317 million new pieces of malware. That means an average of nearly one million new threats were released each day. Here at Ixia we’ve been collecting and organizing threat intelligence data for years to help test the industry’s top network security products. Our Application and Threat Intelligence (ATI) research center maintains one of the most comprehensive lists of malware, botnets, and network incursions for exactly this purpose. We’ve had many requests to l...
Continue reading
847 Hits
0 Comments

How to Deal With Unusual Traffic Detected Notifications

If you get an unusual traffic detected notification from Google, it usually means your IP address was or still is sending suspicious network traffic. Google can detect this and has recently implemented security measures to protect against DDoS , other server attacks and SEO rank manipulation . The key thing to remember is that the notification is based on your Internet facing IP address, not your private IP address which is assigned to your laptop\PC\device. If you don’t know what your Internet ...
Continue reading
692 Hits
0 Comments

Two Ways Networks Are Transformed By NetFlow

According an article in techtarget.com "Your routers and switches can yield a mother lode of information about your network--if you know where to dig." The article goes on to say that excavating and searching through endless traffic data and logs manufactured by your network system is a lot like mining for gold, and punching random holes to look for a few nuggets of information isn't very efficient. Your search will be much more fruitful if you know where to look and what it will look like. Fort...
Continue reading
703 Hits
0 Comments

Don’t Be Lulled to Sleep with a Security Fable. . .

Once upon a time, all you needed was a firewall to call yourself “secure.” But then, things changed. More networks are created every day, every network is visible to the others, and they connect with each other all the time—no matter how far away or how unrelated. And malicious threats have taken notice . . . As the Internet got bigger, anonymity got smaller. It’s impossible to go “unnoticed” on the Internet now. Everybody is a target. Into today’s network landscape, every network is under the t...
Continue reading
796 Hits
0 Comments