Blog

Get news about our products, which events we are attending plus industry insights and commentary

Automated Testing during development

Posted by

Telesoft Engineer

Telesoft Engineer

The Engineers here at Telesoft are tackling the most challenging issues facing the Cyber and Telecom industries, working on problems that no one is even thinking about yet. 

The 'Tech Talk' blog has been created to give our Research and Development, Hardware and Software Engineering Teams a voice, creating posts that detail what technologies and techniques we are using to create our cutting edge products. So expect lots of interesting and varied subject matters.  

Created by Engineers, for Engineers.

on Wednesday, 31 October 2018. Posted in 'Tech Talk' Blog, Company News

Here at Telesoft we ensure our products are tested to the highest quality using the most efficient tools

100G PCAP recording

Posted by

Telesoft Engineer

Telesoft Engineer

The Engineers here at Telesoft are tackling the most challenging issues facing the Cyber and Telecom industries, working on problems that no one is even thinking about yet. 

The 'Tech Talk' blog has been created to give our Research and Development, Hardware and Software Engineering Teams a voice, creating posts that detail what technologies and techniques we are using to create our cutting edge products. So expect lots of interesting and varied subject matters.  

Created by Engineers, for Engineers.

on Wednesday, 24 October 2018. Posted in 'Tech Talk' Blog, Company News

It became apparent whilst testing our new 4x100G Triton test tool, as well as other future capabilities, that it would be beneficial to be able to record traffic as well as generate it

Multi-rate 10-100G MAC Compatibility

Posted by

Telesoft Engineer

Telesoft Engineer

The Engineers here at Telesoft are tackling the most challenging issues facing the Cyber and Telecom industries, working on problems that no one is even thinking about yet. 

The 'Tech Talk' blog has been created to give our Research and Development, Hardware and Software Engineering Teams a voice, creating posts that detail what technologies and techniques we are using to create our cutting edge products. So expect lots of interesting and varied subject matters.  

Created by Engineers, for Engineers.

on Wednesday, 24 October 2018. Posted in 'Tech Talk' Blog, Company News

Our new Stratix 10 Hambledon card now supports four different MACs

Securing Both North & South and East & West Datacentre Traffic

Posted by

Steve Patton

Steve Patton

Steve is an experienced technical B2B cyber security specialist and Director. Steve is a frequent speaker on topics including security breaches, big data analytics, audit and compliance, and IT forensics.

on Tuesday, 23 October 2018. Posted in Cyber

Generally speaking, "East-West" (EW) traffic refers to server to server traffic within a datacentre and "North-South" (NS) to traffic that is routed either to or from anything outside the datacentre.  Depending on the function of a datacentre, EW traffic can be significantly higher than the NS (e.g in a computationally intensive environment), or NS may be the same as or greater than EW (if there are multiple access points) for a data I/O intensive application such as media streaming.

Datacentre Cyber Security: 5th Datacentre India 2018 International Conference

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Monday, 08 October 2018. Posted in Cyber

Rohit Singh, Country Manager – AsiaPAC & India, Telesoft Technologies sat on a panel at the recent 5th Data Centre India 2018 International Conference to moderate a session and discuss all things cyber security and risk in the datacentre. Together with industry experts from Tata Projects, Juniper and Sterling & Wilson, Rohit and the panel discussed how datacentres are the backbone of today’s digital economy and are vulnerable to advanced persistent cyber-attacks, despite continued investment.

Breaking Down DDoS UDP Flood Attacks

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Wednesday, 03 October 2018. Posted in Cyber

A UDP flood is a type of volume based DDoS (Distributed Denial of Service) attack, where large numbers of UDP (User Datagram Protocol) packets are sent to a target server, limiting its ability to carry out its functions. UDP traffic doesn’t require a three-way handshake to make a connection like TCP (Transmission Control Protocol), it runs with lower overhead and is ideal to carry data that doesn’t need to be checked and rechecked, such as VoIP. This means it is easier for attackers to generate large traffic volumes with tools like Low Orbit Ion Cannon (LOIC) and UDP Unicorn.

Playing PCAP at 400 gig

Posted by

Telesoft Engineer

Telesoft Engineer

The Engineers here at Telesoft are tackling the most challenging issues facing the Cyber and Telecom industries, working on problems that no one is even thinking about yet. 

The 'Tech Talk' blog has been created to give our Research and Development, Hardware and Software Engineering Teams a voice, creating posts that detail what technologies and techniques we are using to create our cutting edge products. So expect lots of interesting and varied subject matters.  

Created by Engineers, for Engineers.

on Friday, 28 September 2018. Posted in 'Tech Talk' Blog, Company News

Here at Telesoft our latest line of products, such as the 4x100G IP Flow Probe, perform at such high rate there aren’t many options when it comes to test equipment; so we made our own.

SIP-INFO DTMF for STM-1 SIP OKEFORD

Posted by

Telesoft Engineer

Telesoft Engineer

The Engineers here at Telesoft are tackling the most challenging issues facing the Cyber and Telecom industries, working on problems that no one is even thinking about yet. 

The 'Tech Talk' blog has been created to give our Research and Development, Hardware and Software Engineering Teams a voice, creating posts that detail what technologies and techniques we are using to create our cutting edge products. So expect lots of interesting and varied subject matters.  

Created by Engineers, for Engineers.

on Thursday, 27 September 2018. Posted in 'Tech Talk' Blog, Company News

The STM-1 SIP OKEFORD now supports the receipt and transmission of out-of-band DTMF via the legacy SIP INFO method.

High availability and SIP Load Balancer added to OKEFORD 5500 IVR for Satellite Network Operator migration

Posted by

Telesoft Engineer

Telesoft Engineer

The Engineers here at Telesoft are tackling the most challenging issues facing the Cyber and Telecom industries, working on problems that no one is even thinking about yet. 

The 'Tech Talk' blog has been created to give our Research and Development, Hardware and Software Engineering Teams a voice, creating posts that detail what technologies and techniques we are using to create our cutting edge products. So expect lots of interesting and varied subject matters.  

Created by Engineers, for Engineers.

on Thursday, 27 September 2018. Posted in 'Tech Talk' Blog, Company News

We are supporting a Satellite Network Operator customer with legacy equipment through their ongoing process of migration to second-generation satellite data terminals

Attackers only care about what is effective

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Tuesday, 25 September 2018. Posted in Cyber

…they do not care about vulnerability scores.

The point being that attackers and attacks are constantly changing, often moving at a pace that cyber defenders cannot keep up with, because in order to remain profitable and/or notorious, criminals need to remain one step ahead. Value from illegal online activity can be measured in different ways but almost always it’s about direct financial gain derived from the sale of stolen private data or payments from ransomware.

<<  1 [23 4 5 6  >>  

Information cookies

Cookies are short reports that are sent and stored on the hard drive of the user's computer through your browser when it connects to a web. Cookies can be used to collect and store user data while connected to provide you the requested services and sometimes tend not to keep. Cookies can be themselves or others.

There are several types of cookies:

  • Technical cookies that facilitate user navigation and use of the various options or services offered by the web as identify the session, allow access to certain areas, facilitate orders, purchases, filling out forms, registration, security, facilitating functionalities (videos, social networks, etc..).
  • Customization cookies that allow users to access services according to their preferences (language, browser, configuration, etc..).
  • Analytical cookies which allow anonymous analysis of the behavior of web users and allow to measure user activity and develop navigation profiles in order to improve the websites.

So when you access our website, in compliance with Article 22 of Law 34/2002 of the Information Society Services, in the analytical cookies treatment, we have requested your consent to their use. All of this is to improve our services. We use Google Analytics to collect anonymous statistical information such as the number of visitors to our site. Cookies added by Google Analytics are governed by the privacy policies of Google Analytics. If you want you can disable cookies from Google Analytics.

However, please note that you can enable or disable cookies by following the instructions of your browser.