TELDAT Blog

Communicate with us

Long live ALL IP – Part 2

Long live ALL IP – Part 2

As already announced in our previous blog entry, we will have a closer look into the two ALL IP approaches: migrating the ISDN PBX or replacing it via a new IP-based voice and data solution. Migrating the ISDN PBX Migration means continuing with the already existing PBX whilst a media gateway takes care of the ISDN connection from the PBX’s point of view. The biggest advantage related to...

read more
Dismantling the ISDN and POTS networks

Dismantling the ISDN and POTS networks

How can we help carriers dismantle their ISDN networks easily, economically and above all, transparently? Traditional ISDN and POTS communication networks are now obsolete.  Deployments using old technology, the devices making up these networks, etc., have reached, in many cases, the end of their lives.  Another influencing factor is that experts and technicians in this field are approaching, or...

read more
R.I.P. ISDN

R.I.P. ISDN

We live in a digital world. Entertainment, work, information, social relations... today everything is digital. The benefits are obvious. Digital information is much easier to store, transfer and handle than analog and is more powerful.  If we think about it we can find many fields where digitalization has had a remarkable impact. In this article, however, we will only consider the impact on...

read more
VoIP Security

VoIP Security

Some countries switch off their telephone network in the near future. ALL IP is as previously mentioned one of the main buzz words. The shift to VoIP has already started and now is the right time to ask ourselves: “Do we need VoIP security?” VoIP security in this context doesn’t relate to firewalls, firewall problems in VoIP protocols or anything like that, but refers to the basic problem of...

read more
The ABC of SBC: definition, characteristics and advantages

The ABC of SBC: definition, characteristics and advantages

The Firewall is the quintessential element providing network security when you need to interconnect with other networks, allowing outgoing traffic and blocking unsolicited incoming traffic. The Firewall is a necessary element, although it is insufficient for security purposes since some threats are hidden from network firewalls within legitimate-appearing traffic, thus resulting in the need for...

read more
floating-i
Contact us