Telnet Network News

Telnet Network News - We'll keep you up to date with what's happening in the industry.

Total Network Visibility with No Blind Spots

Network Visibility Architecture  - The Missing Ingredient for each of your teams Network Security Team Even with all the latest and cutting-edge technology we have in the network today, customer records continue to be stolen, and the worst of it some of these records will not even be detected as stolen. So this means that data is being stolen ...
Continue reading
  219 Hits
  0 Comments
219 Hits
0 Comments

How to Bypass 5 Major Security Risks

Businesses continue to invest in advanced security defenses like next-generation firewalls, intrusion prevention systems (NGFW and NGIPS), data loss prevention (DLP), and other inline tools. These tools can significantly strengthen security, but may also add complexity, operational cost, and even risk. Mitigate these and other challenges ...
Continue reading
  347 Hits
  0 Comments
347 Hits
0 Comments

Ixia Threat Armor Integration with Flowmon ADS

An easy way to relieve your security teams and strengthen overall enterprise security. The evergrowing number of threats and attacks starts to represent an issue to overall enterprise security. Various tools are deployed to provide multi-layered security and protect business assets. To not overwhelm security teams with thousands of alerts, a script...
Continue reading
  295 Hits
  0 Comments
295 Hits
0 Comments

Packet Brokers: One Device, Five Benefits to IT

If the term Network Packet Broker (NPB) is not familiar, now is the time to get acquainted with this invaluable and frequently overlooked device. Think of NPBs as helpful middlemen that sort, distribute, and optimize the flow of network data going to your monitoring and security tools. By receiving only the data they need and eliminating irrelevant...
Continue reading
  169 Hits
  0 Comments
169 Hits
0 Comments

Are Network Packets really becoming increasingly difficult to collect?

By Joel Rudman - Director of Finance and Capital Markets at Keysight Technologies I recently read the Gartner Market Guide for Network Performance Monitoring and Diagnostics (NPMD). Within the report it states that "Network Packets are Becoming Increasing Difficult to Collect" the reasons detailed were: Increased Virtualisation within the Data Cent...
Continue reading
  398 Hits
  0 Comments
398 Hits
0 Comments

Sunburst: The SolarWinds Hack, How You Could be Affected

A high profile attack is not the way to end 2020, but if you are an existing user of SolarWinds you may be one of the 18,000 potential customers breached by the recent hack using FireEye and SolarWinds, and affect your organizations ability to monitor the network. IMPACT On December 13th, Cybersecurity and Infrastructure Agency (CISA) issued direct...
Continue reading
  523 Hits
  0 Comments
523 Hits
0 Comments

Kemp Acquires Flowmon for Predictive Network Performance Monitoring and Network Detection & Response

Flowmon Networks, a global network intelligence company, today announced it has been acquired by Kemp, the leader in powering always-on application experience [AX]. The acquisition brings together application delivery and security services with deep network visibility and automated security incident response. Joining these capabilities together arm...
Continue reading
  588 Hits
  0 Comments
588 Hits
0 Comments

Webinar: Let's Talk Security

Join Network Protocol Specialist Mike Pennacchi for a live network security webinar on Thursday, November 19 at 11:00 am EST. It's the next episode of Sinnot Wolach Technology Group Let's Talk Security Webinar Series, where Mike Pennacchi will demonstrate how to get the right network packets, filtering on GeoIP and analyzing historical data using I...
Continue reading
  788 Hits
  0 Comments
788 Hits
0 Comments

Layers of Defense:Resilient PNT Cybersecurity

For a resilient positioning, navigation and timing (PNT) solution you need to build layers of defense, which includes physical security to RF security, network security, application security and ongoing maintenance/support.. How Orolia Provides Resilient PNT Cybersecurity  Physical Security The simplest Denial of Service attack is to merely di...
Continue reading
  854 Hits
  0 Comments
854 Hits
0 Comments

Continuously Validate Your Cyber Defenses

Even with advanced firewall technology, intrusion prevention systems (IPS), and a wide array of security tools in place, businesses still miss clues and suffer major security breaches every day. In a recent survey, 50% of respondents said that they have experienced a security breach because one or more of their security products was simply not work...
Continue reading
  598 Hits
  0 Comments
598 Hits
0 Comments

Viavi's 13th Annual State of the Network

Viavi's 2020 State of the Network Study results are in. Over 400 IT professionals from around the world, across business size and verticals, completed the survey this year sharing their views on IT in a year that has seen its share of dramatic ups and downs. One significant new insight is the importance of understanding end-user experiences, especi...
Continue reading
  907 Hits
  0 Comments
907 Hits
0 Comments

The Next Generation CISO

Every day we hear of security breaches, which damages the company brand and reputation.  At the present time the advantage has been with the attacker and the CISO is now expected to provide meaningful and actionable security intelligence to board members. So how can CISOs train tomorrow's security executives when today's well-known securi...
Continue reading
  2362 Hits
  0 Comments
2362 Hits
0 Comments

Inspecting SSL Traffic

A delicate balancing act is taking place on networks globally. It is the balance between applying strong protective measures to keep data safe and unintentionally concealing new IT security vulnerabilities. And it all centers on SSL (Secure Socket Layer) encryption. Just as SSL encryption protects certain details of a transaction, it can also conce...
Continue reading
  3853 Hits
  0 Comments
3853 Hits
0 Comments

Eight Steps to take when conducting your first threat hunt

Unlike traditional, reactive approaches to detection, hunting is proactive. With hunting, security professionals don't wait to take action until they've received a security alert or, even worse, suffer a data breach. Instead, hunting entails looking for opponents who are already in your environment. Hunting leads to discovering undesirable activity...
Continue reading
  3039 Hits
  0 Comments
3039 Hits
0 Comments

Ixia Has Your Secret Weapon Against SSL Threats

It has finally happened: thanks to advances in encryption, legacy security and monitoring tools are now useless when it comes to SSL. Read this white paper from Ixia, to learn how this negatively impacts visibility into network applications, such as e-mail, e-commerce, online banking, and data storage. Or even worse, how advanced malware ...
Continue reading
  2835 Hits
  0 Comments
2835 Hits
0 Comments

Viavi: Nearly 90 Percent of Enterprise Network Teams Spend Time Troubleshooting Security Issues; 80 Percent Report More Time Spent on Security vs. Last Year

Tenth Annual "State of the Network" Global Survey from Viavi Reveals Network and Security Trends from over 1,000 Network Professionals  In April 2017, Viavi Solutions (NASDAQ: VIAV) released the results of its tenth annual State of the Network global study today. This year's study focused on security threats, perhaps explaining why it gar...
Continue reading
  3565 Hits
  0 Comments
3565 Hits
0 Comments

Contact Us

Address:

Telnet Networks Inc.
740 Augusta Dr.
Suite 202
Kingston, ON  K7P 0R5
Canada

Phone:

(800) 561-4019

Fax:

613-498-0075

For More Information about Telnet Networks, our products, or our services, or to request a quote please feel free to contact us directly.

Latest Blog Posts

Latest Blog Posts