Telnet Network News

Telnet Network News - We'll keep you up to date with what's happening in the industry.

Are Network Packets really becoming increasingly difficult to collect?

By Joel Rudman - Director of Finance and Capital Markets at Keysight Technologies I recently read the Gartner Market Guide for Network Performance Monitoring and Diagnostics (NPMD). Within the report it states that "Network Packets are Becoming Increasing Difficult to Collect" the reasons detailed were: Increased Virtualisation within the Data Cent...
Continue reading
  189 Hits
  0 Comments
189 Hits
0 Comments

Sunburst: The SolarWinds Hack, How You Could be Affected

A high profile attack is not the way to end 2020, but if you are an existing user of SolarWinds you may be one of the 18,000 potential customers breached by the recent hack using FireEye and SolarWinds, and affect your organizations ability to monitor the network. IMPACT On December 13th, Cybersecurity and Infrastructure Agency (CISA) issued direct...
Continue reading
  321 Hits
  0 Comments
321 Hits
0 Comments

Kemp Acquires Flowmon for Predictive Network Performance Monitoring and Network Detection & Response

Flowmon Networks, a global network intelligence company, today announced it has been acquired by Kemp, the leader in powering always-on application experience [AX]. The acquisition brings together application delivery and security services with deep network visibility and automated security incident response. Joining these capabilities together arm...
Continue reading
  422 Hits
  0 Comments
422 Hits
0 Comments

Webinar: Let's Talk Security

Join Network Protocol Specialist Mike Pennacchi for a live network security webinar on Thursday, November 19 at 11:00 am EST. It's the next episode of Sinnot Wolach Technology Group Let's Talk Security Webinar Series, where Mike Pennacchi will demonstrate how to get the right network packets, filtering on GeoIP and analyzing historical data using I...
Continue reading
  587 Hits
  0 Comments
587 Hits
0 Comments

Layers of Defense:Resilient PNT Cybersecurity

For a resilient positioning, navigation and timing (PNT) solution you need to build layers of defense, which includes physical security to RF security, network security, application security and ongoing maintenance/support.. How Orolia Provides Resilient PNT Cybersecurity  Physical Security The simplest Denial of Service attack is to merely di...
Continue reading
  637 Hits
  0 Comments
637 Hits
0 Comments

Continuously Validate Your Cyber Defenses

Even with advanced firewall technology, intrusion prevention systems (IPS), and a wide array of security tools in place, businesses still miss clues and suffer major security breaches every day. In a recent survey, 50% of respondents said that they have experienced a security breach because one or more of their security products was simply not work...
Continue reading
  471 Hits
  0 Comments
471 Hits
0 Comments

Viavi's 13th Annual State of the Network

Viavi's 2020 State of the Network Study results are in. Over 400 IT professionals from around the world, across business size and verticals, completed the survey this year sharing their views on IT in a year that has seen its share of dramatic ups and downs. One significant new insight is the importance of understanding end-user experiences, especi...
Continue reading
  762 Hits
  0 Comments
762 Hits
0 Comments

The Next Generation CISO

Every day we hear of security breaches, which damages the company brand and reputation.  At the present time the advantage has been with the attacker and the CISO is now expected to provide meaningful and actionable security intelligence to board members. So how can CISOs train tomorrow's security executives when today's well-known securi...
Continue reading
  2202 Hits
  0 Comments
2202 Hits
0 Comments

Inspecting SSL Traffic

A delicate balancing act is taking place on networks globally. It is the balance between applying strong protective measures to keep data safe and unintentionally concealing new IT security vulnerabilities. And it all centers on SSL (Secure Socket Layer) encryption. Just as SSL encryption protects certain details of a transaction, it can also conce...
Continue reading
  3701 Hits
  0 Comments
3701 Hits
0 Comments

Eight Steps to take when conducting your first threat hunt

Unlike traditional, reactive approaches to detection, hunting is proactive. With hunting, security professionals don't wait to take action until they've received a security alert or, even worse, suffer a data breach. Instead, hunting entails looking for opponents who are already in your environment. Hunting leads to discovering undesirable activity...
Continue reading
  2872 Hits
  0 Comments
2872 Hits
0 Comments

Ixia Has Your Secret Weapon Against SSL Threats

It has finally happened: thanks to advances in encryption, legacy security and monitoring tools are now useless when it comes to SSL. Read this white paper from Ixia, to learn how this negatively impacts visibility into network applications, such as e-mail, e-commerce, online banking, and data storage. Or even worse, how advanced malware ...
Continue reading
  2694 Hits
  0 Comments
2694 Hits
0 Comments

Viavi: Nearly 90 Percent of Enterprise Network Teams Spend Time Troubleshooting Security Issues; 80 Percent Report More Time Spent on Security vs. Last Year

Tenth Annual "State of the Network" Global Survey from Viavi Reveals Network and Security Trends from over 1,000 Network Professionals  In April 2017, Viavi Solutions (NASDAQ: VIAV) released the results of its tenth annual State of the Network global study today. This year's study focused on security threats, perhaps explaining why it gar...
Continue reading
  3363 Hits
  0 Comments
3363 Hits
0 Comments

Contact Us

Address:

Telnet Networks Inc.
740 Augusta Dr.
Suite 202
Kingston, ON  K7P 0R5
Canada

Phone:

(800) 561-4019

Fax:

613-498-0075

For More Information about Telnet Networks, our products, or our services, or to request a quote please feel free to contact us directly.

Latest Blog Posts

Latest Blog Posts