Check out all of our upcoming events

Blog

Latest cybersecurity news, insights and commentary by Telesoft engineers and specialists

3 Reasons why you should try Suricata

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Monday, 25 April 2016. Posted in Cyber

Top 3 Reasons You Should Try Suricata:

1. Highly Scalable

Suricata is multi threaded. This means you can run one instance and it will balance the load of processing across every processor on a sensor Suricata is configured to use. This allows commodity hardware to achieve 10 gigabit speeds on real life traffic without sacrificing ruleset coverage.

Leveraging IPFIX Headers for Complete Network Visibility

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Thursday, 14 April 2016. Posted in Cyber

IPFIX currently defines over 50 fields relating to packet header, the standard also allows for flexibility so vendors are free to export any combination of fields they choose.

RSA 2016: Insider threats and visibility at the network core

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Wednesday, 23 March 2016. Posted in Cyber, Events

The organisers, the thought leaders and exhibiting organizations, like Telesoft are here to provide answers to the questions asked last year. Not quick off the cuff pontifications but real, researched, and actionable solutions. Over the 4 days, over 40,000 attendees experienced keynotes, peer-to-peer sessions, track sessions, tutorials and seminars all telling the same story, innovation and collaboration are going to shape the future of the cyber security industry.

RSA 2016: Cyber defence, taking back control

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Thursday, 03 March 2016. Posted in Cyber, Events

One of the key points of Amit’s keynote was the need for comprehensive visibility of our environments. When the threat is unknown, or zero-day, one option for detection is analysis of traffic for anomalies. Massive traffic volumes inside ultra-scale data centres mean that detailed inspection of every packet would require a doubling of processing capacity. The commonly taken approach is to collect information on each data session or flow, and analyse flow records for unusual behaviour or anomalies, indicating a potential attack or infection.

Flocon 2016: In Review

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Friday, 22 January 2016. Posted in Cyber, Company News, Events

It is not news that to make measurable improvements to network data security, organisations need to invest in the most current tools and share key knowledge, Flocon 2016 featured a full technical programme which not only highlighted some of the most critical issues surrounding analytics but also outlined actionable solutions. We fielded a number of questions from delegates regarding the growth of external and internal network data, what to do with that information and how it is now the ‘insider threat’ that poses the most risk. The fast paced nature of cybercrime means that cyber security professionals need to find a way to match the threat actors pace, to ensure that threat detection can be turned in to quick incident response.

Building cost effective 40Gbps IDS in to commodity servers

Posted by

Steve Patton

Steve Patton

Steve is an experienced technical B2B cyber security specialist and Director. Steve is a frequent speaker on topics including security breaches, big data analytics, audit and compliance, and IT forensics.

on Thursday, 14 January 2016. Posted in Cyber

A signature based IDS, such as Suricata, monitors packets on the network and compares them against a database of signatures or attributes from known malicious threats. Multi-threading and load balancing across CPU cores provides performance gains, however, one of the largest CPU consumers is signature scanning, which can consume up to 80% of CPU load. By offloading signature scanning to an accelerator card, cost effective IDS systems can be built for breach detection and forensics in the network core.

Telesoft adds LR4 capabilities to their existing MPAC-IP 7000 Series

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Monday, 26 October 2015. Posted in Cyber, Company News

The MPAC-IP 7000 series features variable offset 7 layer deterministic pattern matching at line rate and controlled using Telesoft’s rapid development API, both our 100GbE and 4x10GbE solutions allows operators to maintain ultra-high-speed links ensuring high-performance, security and compliance.

Extending IDS and IPS Throughput Capacity

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Thursday, 24 September 2015. Posted in Cyber

Financially motivated hackers look to exploit vulnerable networks to steal data, money, or disrupt network operations for those willing to pay for the service. It’s no longer just hobbyist hackers looking to infiltrate networks for fun. If IDS and IPS systems, a vital component of any network security architecture, become saturated any worms, spyware, or disruptive packets can bypass security measures entirely, infiltrating the network and causing damage whilst remaining undetected. At best, with fail-closed IPS, the network is disrupted. At worst, your network is the latest to be featured in the news for being hacked.

NFV Series: Network Function Virtualisation, maximising your potential

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Thursday, 27 August 2015. Posted in Telecom

The obvious advantages of an NFV network architecture are reduced capital expenditure (CAPEX) and operating expenditure (OPEX). Whereas the old paradigm required bespoke hardware devices for each network function – hardware devices that quickly became obsolete as average hardware capabilities surpassed them – NFV allows network functions to be virtualised and run on commercial off the shelf (COTS) servers.

Hardware Accelerator cards, a cost effective solution for expanding network capabilities

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Friday, 21 August 2015. Posted in Cyber

To reduce operating expenditure (OPEX) and minimise rack space usage hardware accelerator cards can be implemented into existing Commercial off the Shelf (COTS) servers or integrated into new systems. Offloading processing to a hardware accelerator card, such as the MPAC-IP 7000 Series from Telesoft, enables the host COTS server to maximise processing power for third party applications without the need for an expensive overhaul of existing infrastructure. Resources can then be freed up and re-purposed or used to extend processing capabilities, reducing capital expenditure (CAPEX).

<<  10 11 12 13 14 [1516  >>  

Information cookies

Cookies are short reports that are sent and stored on the hard drive of the user's computer through your browser when it connects to a web. Cookies can be used to collect and store user data while connected to provide you the requested services and sometimes tend not to keep. Cookies can be themselves or others.

There are several types of cookies:

  • Technical cookies that facilitate user navigation and use of the various options or services offered by the web as identify the session, allow access to certain areas, facilitate orders, purchases, filling out forms, registration, security, facilitating functionalities (videos, social networks, etc..).
  • Customization cookies that allow users to access services according to their preferences (language, browser, configuration, etc..).
  • Analytical cookies which allow anonymous analysis of the behavior of web users and allow to measure user activity and develop navigation profiles in order to improve the websites.

So when you access our website, in compliance with Article 22 of Law 34/2002 of the Information Society Services, in the analytical cookies treatment, we have requested your consent to their use. All of this is to improve our services. We use Google Analytics to collect anonymous statistical information such as the number of visitors to our site. Cookies added by Google Analytics are governed by the privacy policies of Google Analytics. If you want you can disable cookies from Google Analytics.

However, please note that you can enable or disable cookies by following the instructions of your browser.