Newsletter

 

For a Free Quote...

Latest Blog Posts

Telnet Network News

Telnet Network News - We'll keep you up to date with what's happening in the industry.

IXIA Presents: VISION Edge 1S: Unlocking Opportunity at the Network Edge

The network edge is changing fast, and rapid change brings opportunity. With more applications and devices running at branch locations, performance monitoring and analysis must move closer to the customer - and so must visibility. Ixia's Vision E1S, the latest addition to their "Vision Edge" network packet broker (NPB) series, meets fast-growing de...
Continue reading
  2224 Hits
  0 Comments
2224 Hits
0 Comments

End-User Experience: An IT Troubleshooting Revolution

What do you do when all your network performance indicators are green, but users are still complaining?  IT teams are drowning in hundreds of measurements and metrics and according to Forrester Research, one-third of user complaints linger without resolution for a month or are never resolved.  We've been approaching network performance mo...
Continue reading
  2470 Hits
  0 Comments
2470 Hits
0 Comments

Cost-effective Aggregation with Booster Aggregation TAPs

​Traffic monitoring is a must for IT administrators these days, and an integral part of most enterprise networks. There are many different approaches to getting visibility into the network, but using a TAP has proven to be the most accurate and reliable. Read more here about why a network TAP is better than a SPAN.  Among all these network har...
Continue reading
  2617 Hits
  0 Comments
2617 Hits
0 Comments

Introductory Guide to Network Packet Brokers

 What is a Network Packet Broker? A Network Packet Broker (NPB) is a switch-like network device ranging in size from portables devices to 1 and 2 RU units, up to massive chassis and blade systems. Unlike a switch, a Network Packet Broker does not alter the traffic passing through it in any way unless specifically instructed to do so. An NPB ca...
Continue reading
  2876 Hits
  0 Comments
2876 Hits
0 Comments

Fiber Taps - Y Cables Matter

Passive fiber optic taps are very simple devices. They almost never go wrong. In fact they have MTBF figures calculated in millions of hours. You will certainly die before they will! However Ixia often gets questions from customers of the kind "I've installed your tap, but it does not work - please send me a new one". In almost all cases this is du...
Continue reading
  4192 Hits
  0 Comments
4192 Hits
0 Comments

Why the No Break Feature is Essential in Network Tapping

​Even though experts say that fiber is the future of the 21st century networks, copper is still very important, mostly because of its low cost, high performance and efficiency. These are some of the reasons industries still choose to use Ethernet Cables and why analysts forecast that the global industrial Ethernet cables market will grow at a CAGR ...
Continue reading
  4190 Hits
  0 Comments
4190 Hits
0 Comments

Visibility is Security

While security experts may disagree on exactly how to secure a network, one thing they all agree on is that you cannot defend against what you cannot see. In other words, network visibility IS network security. Visibility needs to be the starting the point. After that, you can implement whatever appliances, processes, and configurations you need to...
Continue reading
  2704 Hits
  0 Comments
2704 Hits
0 Comments

Network Monitoring is Changing

Networking is changing rapidly, speed and bandwidth requirements have grown exponentially, new traffic types appear daily, and now a functioning network is a crucial and necessary part of running a successful large or small business in any market. You are expected to provide critical business applications in a secure, always-up network environment....
Continue reading
  3202 Hits
  0 Comments
3202 Hits
0 Comments

The Choice Between Network Availability and Security

Do you have to give up on network availability when deploying your inline security tools? By using a iBypass switch "YOU DON'T HAVE TO CHOOSE"  When a network monitoring device such as an IPS is deployed inline in a network, it is vital to ensure that traffic continues to flow in all circumstances, even if the IPS loses power, so that mission-...
Continue reading
  3249 Hits
  0 Comments
3249 Hits
0 Comments

Evaluating Inline Security Fabric: Your Key Considerations

Would you like to see and detect more security threats in your production network? The key to inline security monitoring are fail-safe tool deployment, maximum traffic inspection, and super-fast failover. This white paper will show you how ​To access 100% of your network trafficIncrease the efficiency of your security toolsUse security intelligence...
Continue reading
  3583 Hits
  0 Comments
3583 Hits
0 Comments

Inspecting SSL Traffic

A delicate balancing act is taking place on networks globally. It is the balance between applying strong protective measures to keep data safe and unintentionally concealing new IT security vulnerabilities. And it all centers on SSL (Secure Socket Layer) encryption. Just as SSL encryption protects certain details of a transaction, it can also conce...
Continue reading
  4632 Hits
  0 Comments
4632 Hits
0 Comments

Ixia Special Edition Network Visibility For Dummies

 Advanced cyber threats, cloud computing, and exploding traffic volume pose significant challenges if you are responsible for your organization's network security and performance management. The concept of 'network visibility' is frequently introduced as the key to improvement. But what exactly is network visibility and how does it help an org...
Continue reading
  3896 Hits
  0 Comments
3896 Hits
0 Comments

Private Cloud: The ABCs of Network Visibility

Cloud computing has become the de facto foundation for digital business. As more and more enterprises move critical workloads to private and public clouds, they will face new challenges ensuring security, reliability, and performance of these workloads. If you are responsible for IT security, data center operations, or application performance, make...
Continue reading
  3718 Hits
  0 Comments
3718 Hits
0 Comments

Ixia's new hyperscale visibility with cost effective pricing

Vision Edge 100 & Vision Edge 40 ​Expanding your hyperscale data center? Adding microscale data centers to provide a better experience for end users? Be sure to see everything, in every cluster—whether it is a part of your core infrastructure or a remote site—with the latest in Ixia's Vision Portfolio of network packet brokers (NPBs). Ixia has ...
Continue reading
  4132 Hits
  0 Comments
4132 Hits
0 Comments

Ixia Debuts New Network Tap

Among the most useful pieces of physical hardware that networking professionals can utilize is a network tap. With a network tap, physical networks can be monitored for outliers as well as potential injection attacks. Network security vendor Ixia is now expanding its portfolio of network taps with the new Flex Tap Secure+. Kevin Formby, VP of market development at Ixia, told Enterprise Networking Planet that the new Flex Tap Secure+ is a net new addition to Ixia's portfolio and doesn't replace a...
Continue reading
  4650 Hits
  0 Comments
4650 Hits
0 Comments

ThreatARMOR Reduces Your Network’s Attack Surface

2014 saw the creation of more than 317 million new pieces of malware. That means an average of nearly one million new threats were released each day. Here at Ixia we’ve been collecting and organizing threat intelligence data for years to help test the industry’s top network security products. Our Application and Threat Intelligence (ATI) research center maintains one of the most comprehensive lists of malware, botnets, and network incursions for exactly this purpose. We’ve had many requests to l...
Continue reading
  4142 Hits
  0 Comments
4142 Hits
0 Comments

Don’t Be Lulled to Sleep with a Security Fable. . .

Once upon a time, all you needed was a firewall to call yourself “secure.” But then, things changed. More networks are created every day, every network is visible to the others, and they connect with each other all the time—no matter how far away or how unrelated. And malicious threats have taken notice . . . As the Internet got bigger, anonymity got smaller. It’s impossible to go “unnoticed” on the Internet now. Everybody is a target. Into today’s network landscape, every network is under the t...
Continue reading
  4562 Hits
  0 Comments
4562 Hits
0 Comments

The State of Enterprise Security Resilience - An Ixia Research Report

Ixia, an international leader in application performance and security resilience technology, conducted a survey to better understand how network security resilience solutions and techniques are used within the modern enterprise. While information exists on security products and threats, very little is available on how it is actually being used and the techniques and technology to ensure that security is completely integrated into the corporate network structure. This report presents the research...
Continue reading
  3629 Hits
  0 Comments
3629 Hits
0 Comments

The Importance of State

Ixia recently added passive SSL decryption to the ATI Processor (ATIP). ATIP is an optional module in several of our Net Tool Optimizer (NTO) packet brokers that delivers application-level insight into your network with details such as application ID, user location, and handset and browser type. ATIP gives you this information via an intuitive real-time dashboard, filtered application forwarding, and rich NetFlow/IPFIX. Adding SSL decryption to ATIP was a logical enhancement, given the increasin...
Continue reading
  5158 Hits
  0 Comments
5158 Hits
0 Comments

Ixia Taps into Visibility, Access and Security in 4G/LTE

The Growing Impact of Social Networking Trends on Lawful Interception Lawful Interception (LI) is the legal process by which a communications network operator or Service Provider (SP) gives authorized officials access to the communications of individuals or organizations. With security threats mushrooming in new directions, LI is more than ever a priority and major focus of Law Enforcement Agencies (LEAs). Regulations such as the Communications Assistance for Law Enforcement Act (CALEA), mandate...
Continue reading
  3984 Hits
  0 Comments
3984 Hits
0 Comments

Contact Us

Address:

Telnet Networks Inc.
1324 Andersen Drive
Kingston, ON  K7P 0C6
Canada

Phone:

(800) 561-4019

Fax:

613-498-0075

For More Information about Telnet Networks, our products, or our services, or to request a quote please feel free to contact us directly.