Telnet Network News

Telnet Network News - We'll keep you up to date with what's happening in the industry.

Network Instruments State of the Network Global Study 2015

Eighth Annual “State of the Network” Global Study from JDSU’s Network Instruments Finds 85 Percent of Enterprise Network Teams Now Involved in Security Investigations Deployment Rates for High-Performance Network Visibility and Software Defined Solutions Expected to Double in Two Years Network Instruments, a JDSU Performance Management Solution released the results of its eighth annual State of the Network global study today. Based on insight gathered from 322 network engineers, IT directors and...

Continue reading
  3778 Hits

Visibility Architectures Enable Real-Time Network Vigilance

A couple of weeks ago, I wrote a blog on how to use a network lifecycle approach to improve your network security. I wanted to come back and revisit this as I’ve had a few people ask me why the visibility architecture is so important. They had (incorrectly, IMO) been told by others to just focus on the security architecture and everything else would work out fine. The reason you need a visibility architecture in place is because if you are attacked, or breached, how will you know? During a DDoS ...

Continue reading
  5067 Hits

Optimizing Networks with Ixia

We work with more than 40 of the top 50 carriers worldwide, as well as many of their largest customers and the companies who provide infrastructure technology for their networks. We’re the “application performance and security resilience” company – we help you make sure technology works the way you expect it to out of the gate, and keeps on doing it throughout the deployment lifecycle. Today’s mobile subscribers are what we call “tough customers”: they expect instant availability and high perfor...

Continue reading
  4255 Hits

Top 5 Network Resolutions for 2015

With the approach of the New Year, water cooler conversation has turned to resolutions. Rather than talk about losing weight by abstaining from Grandma’s fruitcake, pass along these useful tips for ultimate network fitness in 2015. 1) Resolve to play better with the other IT teams. Share your packets Given that every IT initiative runs on the network, it shouldn’t be a huge surprise that the value of a packet’s payload is not limited to the network team. Virtually every IT team from application ...

Continue reading
  3918 Hits

Network Device Backup is a Necessity with Increased Cyber Attacks

In the past few years cyber-attacks have become far more predominant with data, personal records and financial information stolen and sold on the black market in a matter of days. Major companies such as E-Bay, Domino’s, Montana Health Department and even the White House have fallen victim to cyber criminals. Security Breach The most recent scandal was Anthem, one of the country largest health insurers. They recently announced that there systems had been hacked into and over 80 million customer’...

Continue reading
  3881 Hits

Top 5 IT Resolutions for 2015- Resolve to Attain Ultimate Network Fitness Using these Expert Strategies

  PLAY BETTER WITH THE OTHER IT TEAMS. SHARE YOUR PACKETS Raise your IT profile by promoting the packet. Find other teams that might benefit from packet intelligence too. That application developer in the break room might be interested to know the network impact and chattiness of an internal app they’re coding. Performance monitoring solutions like the Observer Platform can provide access to packets and simplify the sharing of analysis with easy-to-read graphical reports and dashboards.&nbs...

Continue reading
  4683 Hits

Enterprises- Ensure Application Performance and Security Resilience

For most every enterprise, the network is your business. Your network and applications are what connects you to your customers. Maintaining network vitality for an optimal user experience is key to business growth and profitability. But today’s networks are under tremendous pressures. User expectations for high performance and innovative applications are ever-increasing. So too are the frequency, magnitude, and sophistication of security attacks that your adversaries are launching to attempt to ...

Continue reading
  5393 Hits

Ixia Brings Application and Threat Intelligence to Network Visibility

Ixia announced enhancements to its network visibility product portfolio, which extends the capabilities of its Visibility Architecture™. With the latest releases incorporating Ixia’s Application and Threat Intelligence, comprehensive solutions come together to meet the needs of enterprises for simplified and actionable network insight. In an increasingly dynamic environment, network administrators are striving for complete network visibility. This level of awareness requires a robust visibility ...

Continue reading
  4615 Hits

Improving Network Visibility – Part 3: Automated Real-Time Response Capability

In parts one and two of this blog, I answered an often asked customer question – “What can really be done to improve network visibility?” – with discussions on data and packet conditioning and advanced filtering. In the third part of this blog series, I’ll reveal a third set of features that can further improve network visibility and deliver even more verifiable benefits. Too quickly summarize this multi-part blog covers an in-depth view of various features that deliver true network visibility b...

Continue reading
  8597 Hits

5 Ways to Use APM for Post-Event Security Forensics

Most security experts agree that the rapidly changing nature of malware, hack attacks and government espionage practically guarantees your IT infrastructure will be compromised. According to the 2014 Cost of Data Breach Study conducted by the Ponemon Institute, the average detection, escalation and notification costs for a breach is approximately $1 million. Post-incident costs averaged $1.6 million. Once an attacker is within the network, it can be very difficult to identify and elimi...

Continue reading
  5120 Hits

Improving Network Visibility – Part 2: Advanced Filtering

In part 1 of this blog, I mentioned that our customers often ask the question “What can really be done to improve network visibility?” I answered the question with regards to data and packet conditioning. In the 2nd part of this discussion, I’ll continue to answer the question with a second set of features that will deliver even more verifiable benefits to improve network visibility. I’ll provide you an in-depth view of features that will deliver true benefits. There are 5 fundamental feature se...

Continue reading
  6412 Hits

Improving Network Visibility – Part 1: Data and Packet Conditioning

“What can really be done to improve network visibility?” This is a question that our customers often ask us. They’ve heard about this and that and something else but are often left confused as to what capabilities actually exist in the market to solve their network visibility problems. In this multi-part blog, I’ll provide you an in-depth view of features that will deliver true benefits. There are 5 fundamental feature sets that we’ll cover: Data and packet conditioning Advanced packet filtering...

Continue reading
  6984 Hits

Data Security and Performance Management from Network Instruments

Is your performance management solution a target for attackers? With increasingly creative exploits, it is important to stay ahead of the curve when it comes to data protection. Performance monitoring tools that do not keep pace can leave your information vulnerable. TOTAL PERFORMANCE MANAGEMENT The Observer® Performance Management Platform is a fully integrated solution, purpose-built to support the highest level of network security. Its features include: TLS-based 256-bit encryption for data i...

Continue reading
  4562 Hits

The 5 Main Questions You Have to Ask in Network Management

Although many people may perceive Network Management as an extremely complicated and diverse area of specialty, there really are only 5 questions that every Network Manager needs to think about. The main components behind every problem in Network Management, are as follows: What do I have? If you don’t know what you have how can you manage or monitor it. Most of the time in Network Management you’re trying to track down potential issues and how you’re going to resolve these issues. This is a ver...

Continue reading
  4427 Hits

Security & Compliance Monitoring

High-stakes Monitoring Global finance moves fast. When data and transactions don't take place as smoothly or securely as expected, the company's revenues and reputation may instantly suffer, causing valued customers to seek more reliable providers. Regulatory requirements are also growing, creating a greater need for security and compliance monitoring. To mitigate risk and ensure performance, Ixia's network visibility solutions deliver the ongoing data needed to dynamically detect, avoid, and ad...

Continue reading
  5531 Hits

Leveraging APM Solutions to Protect Payment Card Information

Security breaches are common today – from computer viruses, such as Bash Bug or Heartbleed, undermining the security of millions of websites, to credit card cyber theft experienced by big retailers. One effort to protect cardholder information is Payment Card Industry (PCI) Data Security Standard (DSS), which was created in October 2008 to protect personal cardholder information whenever used in a financial transaction. PCI DSS, which is applied wherever cardholder data is stored, processed or t...

Continue reading
  4823 Hits

Inline Security Solutions from Ixia/Net Optics

Protect Your Critical Traffic with Fail-Safe Inline Security In our rapidly evolving landscape, networks must deliver more services and carry ever-higher volumes of multiprotocol traffic as data rates soar. Voice, data, and streaming video now travel on one wire, raising many security and compliance issues. All of this dynamic activity calls for inline monitoring and security tools to assess every packet and thwart incoming threats before they can manifest and do their damage. Inline monitoring ...

Continue reading
  4846 Hits

The Real Secret to Securing Your Network

The key concept is that security isn’t something you purchase, it’s something you need to do – preferably on an everyday basis. There is no perfect security product that can stop intruders in their tracks. It needs to be a concerted process of best practices that are put into place and maintained. The first step is to put a visibility architecture in place that supports your security plan. A visibility architecture is essentially a cost-effective design that provides access to network traffic, i...

Continue reading
  4279 Hits

Contact Us

Address:

Telnet Networks Inc.
1324 Andersen Drive
Kingston, ON  K7P 0C6
Canada

Phone:

(800) 561-4019

Fax:

613-498-0075

For More Information about Telnet Networks, our products, or our services, or to request a quote please feel free to contact us directly.