Latest Blog Posts

Newsletter

 

For a Free Quote...

Telnet Network News

Telnet Network News - We'll keep you up to date with what's happening in the industry.

VIAVI Solutions - State of the Network 2019

NetOps and SecOps Collide Over 600 IT professionals weigh in on the workloads, challenges, data sources and team collaboration required to safeguard critical corporate assets. Study Highlights: Network team role in security increases: Over 80% of network teams play a role in security efforts including investigations and clean-up, implementation and...
Continue reading
  234 Hits
  0 Comments
234 Hits
0 Comments

The Best Way To Optimize Load Balancing for Inline Security Appliances

​ In today's 24x7, "always on" world, the company's data network must be as reliable as possible. Otherwise, revenue reduction and productivity losses are not only possible, but probable. This includes inline security and monitoring tools which can become a single point of failure. Security and monitoring tool survivability is often thought about i...
Continue reading
  163 Hits
  0 Comments
163 Hits
0 Comments

What is hidden in encrypted internet traffic streams

​ Full internet encryption is on the horizon and with it the risk that hackers will gain access to your computer network. When you open any website today, it is highly probable you will see a small padlock in front of the address. For the everyday internet user, this is the only visible sign that the site is secure and communication with the site i...
Continue reading
  160 Hits
  0 Comments
160 Hits
0 Comments

Orolia Product Notification for SecureSync and NetClock 9400

​ Orolia would like to take this opportunity to inform our customers of a Preventative Maintenance Action (PMA) to your SecureSync 1200 and NetClock 9400 appliances. This PMA is being executed to prevent unexpected failures caused by flash memory corruption within these appliances. Our SecureSync 1200 and NetClock 9400 line of products have an inte...
Continue reading
  387 Hits
  0 Comments
387 Hits
0 Comments

5 predictions for cyber security in 2019

​Last year completely refuted doubts about the increasing cyber security risks. Hackers, obtained sensitive data on hundreds of German politicians, including Chancellor Merkel and accessed data relating to tens of millions of Facebook accounts. The year also confirmed that hacking has become a means for political activists and an effective tool for...
Continue reading
  257 Hits
  0 Comments
257 Hits
0 Comments

Basic Rules for Network Data Visualization Access

More and more managers and system admins feel challenged when dealing with the mass of information and volume of data that passes through their network each day. Network data visualization access tools help network admins keep an eye on what is always happening on the their network. This means these tools play an important role in any complex ...
Continue reading
  296 Hits
  0 Comments
296 Hits
0 Comments

Ixia, a Keysight Business, Delivers Scalable Visibility for Data Centers Today and Tomorrow

​Ixia's Vision X network packet broker offers a high-density, modular platform to keep pace with evolving data center needs "Today's network and security operations teams are faced with increasing data volumes and velocity that are exceeding human scale," said Bob Laliberte, Sr. Analyst at ESG. "It is impossible to effectively manage the security a...
Continue reading
  310 Hits
  0 Comments
310 Hits
0 Comments

Webinar - Do You Have a Strategy for IoT?

 When Thursday, June 27th, 2019 at 2pm EST Due to the popular demand of our IoT webinar in March, we have decided to run another for those who could not make the first.  Join us on Thursday June 27th @ 2pm EST for an in-depth look at how our customers are using NMSaaS to monitor and report on all kinds of new data outside of the tradition...
Continue reading
  326 Hits
  0 Comments
326 Hits
0 Comments

All You Need to Know About the Network Packet Brokers

​ The last decade experienced an overwhelming increase in network size, bandwidth, and traffic. IT companies were, therefore, forced to adapt by developing the next-generation of security and network monitoring tools. This new wave of tools exposed a greater need for advanced network visibility, one that traditional data center monitoring devices c...
Continue reading
  550 Hits
  0 Comments
550 Hits
0 Comments

An Inline Security Primer

​Anyone in network security knows that it is a complicated and involved process. The clear goal is to prevent security breaches. How do you go about that though? There are so many schools of thought, methods, and configurations. Here are just a few examples: Cyber range training Cyber resilience Defense in depth Encryption Endpoint security Firewal...
Continue reading
  657 Hits
  0 Comments
657 Hits
0 Comments

Network Flow Monitoring: The ABCs of Network Visibility

​This is another in a series of blogs on the important concepts of network management. Today's topic is flow monitoring. A network flow is the series of messages exchanged between the opening and closing of a communication session. Flow data is used by tools like network flow analyzers and flow collectors to generate insight into network performanc...
Continue reading
  492 Hits
  0 Comments
492 Hits
0 Comments

Network Security Works Only If You See The Right Traffic

Security is nowadays an important part of network management . Secure networks are vital for running an uninterrupted business, preventing data loss and maintaining the overall image of the business. Security challenges are increasing because networking is getting more complex, more dynamic and virtual. The existing approach of network visibility l...
Continue reading
  453 Hits
  0 Comments
453 Hits
0 Comments

How to Detect if a Rootkit Compromised Your System

​ The importance of having a quality network test access port (TAP) when conducting Digital Forensics and Incident Response (DFIR) has been covered in a white paper by Profitap, titled " Special Tool for Special Forces: Tapping into real-time threats in the cyberspace ". In addition to the points presented in the white paper, I would like to provid...
Continue reading
  503 Hits
  0 Comments
503 Hits
0 Comments

Network Security Resilience – What Is It?

In a recent webinar, Best Practices for Security Resilience, Jon Oltsik (an analyst from ESG Research Group) and I discussed the topic of network security resilience. The basic concept is that it is not a question of "IF" your company network will be breached, but "WHEN". The real question for you to answer is, "How painful do you want that breach ...
Continue reading
  473 Hits
  0 Comments
473 Hits
0 Comments

The Traceability of Time Synchronization: Why Internet Time Isn’t Good Enough

In today's modern networking infrastructure, great care is taken to ensure that networks are reliable, highly available and most of all, secure. Cybersecurity has emerged as a critical area in all facets of the internet. It's an area that companies spend millions on each year. Yet still, there are often-overlooked areas that degrade security. One e...
Continue reading
  488 Hits
  0 Comments
488 Hits
0 Comments

How to Improve Enterprise Network Visibility

Network requirements are constantly changing in enterprises. The network goal of every enterprise is to be more efficient and cost-effective while embracing the changes. There are several network visibility solutions/vendors available in the market. However, each network has a different requirement and not solutions fit every network architecture. ...
Continue reading
  507 Hits
  0 Comments
507 Hits
0 Comments

Webinar - Hybrid and Multi - Cloud Integrated IP Address Management from NMSaas

When:  What time: Thursday, May 16th, 2019 2pm  EST  ​Are you using Cloud Integration to manage your IP Addresses? Our Latest version of NMSaaS , now provides new capabilities for IPAM/DNS/DHCP with native integrated support for: Azure DNSA Amazon Route 53 Akamai Fast DNS  ​In this webinar we will discuss: Multiple account suppo...
Continue reading
  490 Hits
  0 Comments
490 Hits
0 Comments

Where Should I Place My TAP?

Two common methods to copy traffic to your monitoring or security tools is a Span port or network tap. Span can be convenient for quick troubleshooting, remote locations or when you do not have access to the physical infrastructure. The risk of using a span port is that It can be over subscribed, and the lowest priority when it comes to forwarding ...
Continue reading
  512 Hits
  0 Comments
512 Hits
0 Comments

Ixia's 2019 Security Report

Welcome to the third annual Security Report issued by Ixia, a Keysight business. Each year, the Ixia Application and Threat Intelligence (ATI) Research Centre summarizes the most interesting and prominent internet security trends. We analyze ATI data to help organizations understand where they can improve. We also analyze the data to predict the bi...
Continue reading
  508 Hits
  0 Comments
508 Hits
0 Comments

WEBINAR - 4 Gaps to Fix in Your Security Detection and Response with VIAVI Solutions

​Join VIAVI on April 24th when we host a roundtable discussion with expert security threat hunters who will reveal the top pitfalls they see in enterprise security strategies. As their decades of experience converge, common themes appear, identifying the gaps that put their clients at risk for being the next news headline. Reserve your spot now to ...
Continue reading
  594 Hits
  0 Comments
594 Hits
0 Comments

Contact Us

Address:

Telnet Networks Inc.
100 Strowger Blvd, Suite 118, Brockville, ON, K6V 5J9, Canada

Phone:

(800) 561-4019

Fax:

613-498-0075

For More Information about Telnet Networks, our products, or our services, or to request a quote please feel free to contact us directly.