Telnet Network News

Telnet Network News - We'll keep you up to date with what's happening in the industry.

Packet Brokers: One Device, Five Benefits to IT

If the term Network Packet Broker (NPB) is not familiar, now is the time to get acquainted with this invaluable and frequently overlooked device. Think of NPBs as helpful middlemen that sort, distribute, and optimize the flow of network data going to your monitoring and security tools. By receiving only the data they need and eliminating irrelevant...
Continue reading
  506 Hits
  0 Comments
506 Hits
0 Comments

What Makes a Network TAP the Right Tool for Monitoring

In today's connected world, your network is one of your most important assets. An underperforming network is something you cannot afford, be it from a performance or from a security standpoint, because it can greatly hinder your business's capabilities.In order to ensure optimum performance and security at all times, network engineers need a clear,...
Continue reading
  1005 Hits
  0 Comments
1005 Hits
0 Comments

Reduce the cost of tool sprawl with smarter network monitoring

By Jason Lackey, Network and Security Marketing, Keysight Technologies Monitoring tools have always been critical for ensuring network performance and security. Top vendors have designed new tools specifically for monitoring networks with virtualization, cloud infrastructure, distributed data centers, and edge computing. Way back in 2016, Enterpris...
Continue reading
  1020 Hits
  0 Comments
1020 Hits
0 Comments

How to Implement Security Monitoring For Critical Infrastructure

​I ran across an interesting statistic a couple weeks ago. According to a Ponemon Institute, report titled "The State of Cybersecurity in the Oil & Gas Industry", 68 percent of security and risk managers reported losing confidential information or experiencing disruption over the previous year. The existence of security breaches for the last fi...
Continue reading
  1868 Hits
  0 Comments
1868 Hits
0 Comments

Hybrid IT Monitoring: The ABCs of Network Visibility

​The recently released 2019 State of the Cloud report by RightScale found that 58% of 800 technical professionals surveyed use a hybrid strategy [1]. Combining on-premises, virtual, and cloud-based resources offers great flexibility, but managing hybrid IT is also more complex. IT teams need new strategies to monitor their hybrid infrastructure eff...
Continue reading
  1920 Hits
  0 Comments
1920 Hits
0 Comments

Ixia - Exposing Hidden Security Threats and Network Attacks

How do you ensure maximum service availability while protecting and securing your enterprise? IT departments have been wrestling with this problem for years. Virtualization and mobility are expanding the traditional network boundary, which means data and assets no longer sit in a single location behind a firewall.  Network security monitoring ...
Continue reading
  2150 Hits
  0 Comments
2150 Hits
0 Comments

iBypass and Thoughts in a Traffic Jam

​Each of us has sat in standstill traffic, trying to understand why this major highway we drive all the time has suddenly backed up, with our phone maps application showing a line of red for the next mile or two. As we crawl towards the bottleneck, we see it: A fender bender with dented cars still blocking a lane of traffic. We see police on the sc...
Continue reading
  1986 Hits
  0 Comments
1986 Hits
0 Comments

Reduce the cost of tool sprawl with smarter network monitoring

Monitoring tools have always been critical for ensuring network performance and security. Top vendors have designed new tools specifically for monitoring networks with virtualization, cloud infrastructure, distributed data centers, and edge computing. Way back in 2016, Enterprise Management Associates found that 24% of enterprises used 6-10 monitor...
Continue reading
  2173 Hits
  0 Comments
2173 Hits
0 Comments

The Best Way To Optimize Load Balancing for Inline Security Appliances

​In today's 24x7, "always on" world, the company's data network must be as reliable as possible. Otherwise, revenue reduction and productivity losses are not only possible, but probable. This includes inline security and monitoring tools which can become a single point of failure. Security and monitoring tool survivability is often thought about in...
Continue reading
  2056 Hits
  0 Comments
2056 Hits
0 Comments

Basic Rules for Network Data Visualization Access

More and more managers and system admins feel challenged when dealing with the mass of information and volume of data that passes through their network each day. Network data visualization access tools help network admins keep an eye on what is always happening on the their network. This means these tools play an important role in any complex ...
Continue reading
  2277 Hits
  0 Comments
2277 Hits
0 Comments

Ixia, a Keysight Business, Delivers Scalable Visibility for Data Centers Today and Tomorrow

​Ixia's Vision X network packet broker offers a high-density, modular platform to keep pace with evolving data center needs "Today's network and security operations teams are faced with increasing data volumes and velocity that are exceeding human scale," said Bob Laliberte, Sr. Analyst at ESG. "It is impossible to effectively manage the security a...
Continue reading
  2664 Hits
  0 Comments
2664 Hits
0 Comments

All You Need to Know About the Network Packet Brokers

​The last decade experienced an overwhelming increase in network size, bandwidth, and traffic. IT companies were, therefore, forced to adapt by developing the next-generation of security and network monitoring tools. This new wave of tools exposed a greater need for advanced network visibility, one that traditional data center monitoring devices co...
Continue reading
  2453 Hits
  0 Comments
2453 Hits
0 Comments

An Inline Security Primer

​Anyone in network security knows that it is a complicated and involved process. The clear goal is to prevent security breaches. How do you go about that though? There are so many schools of thought, methods, and configurations. Here are just a few examples: Cyber range trainingCyber resilienceDefense in depthEncryptionEndpoint securityFirewallsInl...
Continue reading
  11065 Hits
  0 Comments
11065 Hits
0 Comments

Network Security Works Only If You See The Right Traffic

Security is nowadays an important part of network management. Secure networks are vital for running an uninterrupted business, preventing data loss and maintaining the overall image of the business. Security challenges are increasing because networking is getting more complex, more dynamic and virtual. The existing approach of network visibility li...
Continue reading
  2181 Hits
  0 Comments
2181 Hits
0 Comments

How to Detect if a Rootkit Compromised Your System

​The importance of having a quality network test access port (TAP) when conducting Digital Forensics and Incident Response (DFIR) has been covered in a white paper by Profitap, titled "Special Tool for Special Forces: Tapping into real-time threats in the cyberspace". In addition to the points presented in the white paper, I would like to provide a...
Continue reading
  2391 Hits
  0 Comments
2391 Hits
0 Comments

What to do when traffic overwhelms your monitoring tools

​Growing traffic volume is a challenge for NetOps and SecOps as they work to ensure high-quality network performance and network security. As traffic volume exceeds a monitoring tool's capacity, congestion at the data port can cause a tool to slow down, start dropping packets, or even stop working altogether. While you wait for budget approval to a...
Continue reading
  2600 Hits
  0 Comments
2600 Hits
0 Comments

How to Improve Enterprise Network Visibility

Network requirements are constantly changing in enterprises. The network goal of every enterprise is to be more efficient and cost-effective while embracing the changes. There are several network visibility solutions/vendors available in the market. However, each network has a different requirement and not solutions fit every network architecture. ...
Continue reading
  2249 Hits
  0 Comments
2249 Hits
0 Comments

Where Should I Place My TAP?

Two common methods to copy traffic to your monitoring or security tools is a Span port or network tap. Span can be convenient for quick troubleshooting, remote locations or when you do not have access to the physical infrastructure. The risk of using a span port is that It can be over subscribed, and the lowest priority when it comes to forwarding ...
Continue reading
  2433 Hits
  0 Comments
2433 Hits
0 Comments

Ixia's 2019 Security Report

Welcome to the third annual Security Report issued by Ixia, a Keysight business. Each year, the Ixia Application and Threat Intelligence (ATI) Research Centre summarizes the most interesting and prominent internet security trends. We analyze ATI data to help organizations understand where they can improve. We also analyze the data to predict the bi...
Continue reading
  2120 Hits
  0 Comments
2120 Hits
0 Comments

IXIA Presents: VISION Edge 1S: Unlocking Opportunity at the Network Edge

The network edge is changing fast, and rapid change brings opportunity. With more applications and devices running at branch locations, performance monitoring and analysis must move closer to the customer - and so must visibility. Ixia's Vision E1S, the latest addition to their "Vision Edge" network packet broker (NPB) series, meets fast-growing de...
Continue reading
  2026 Hits
  0 Comments
2026 Hits
0 Comments

Contact Us

Address:

Telnet Networks Inc.
1324 Andersen Drive
Kingston, ON  K7P 0C6
Canada

Phone:

(800) 561-4019

Fax:

613-498-0075

For More Information about Telnet Networks, our products, or our services, or to request a quote please feel free to contact us directly.

Latest Blog Posts