All Blogs About NTP

By Denis Reilly, Technical Lead Engineer
 
Network experts already know that distributing the correct time is key to maintaining their critical infrastructure programs. However, keeping accurate time is also fundamental to many cybersecurity applications. Over the last few years, there has been significant research into ways that the NTP protocol can be secured from malicious attackers.
By Jeremy Onyan, Director of Time Sensitive Networks
 
In today’s modern networking infrastructure, great care is taken to ensure that networks are reliable, highly available and most of all, secure. Cybersecurity has emerged as a critical area in all facets of the internet. It’s an area that companies spend millions on each year. Yet still, there are often-overlooked areas that degrade security. One example of this is time.
By Pritam Kandel, Applications Engineer
 
Network time service is not something many businesses think about as a key component of their critical infrastructures. In fact, it is often overlooked entirely, and in error. As a result, the network architect or engineer often defaults to an easy alternative: using a server or network switch as the source of the network clock and synchronizing these sources to Internet time servers using Network Time Protocol (NTP). This white paper discusses the risks of, and alternative solutions to, "NTP Over the Internet."