Teldat Blog
Read our latest Teldat´s Blog Posts
NetFlow collection: A new standard for advanced network monitoring
Data collection is an essential part of network management to ensure network devices are being efficiently monitored and managed. NetFlow and SNMP...
Who will manage SD-WAN?
SD-WAN (Software-defined Wide Area Network) technology makes it easier for businesses and organizations to manage the complexity of the WAN networks...
Why buses need to be protected from cyberattacks
It is a fact that Internet communications are ever more present in our entertainment, work and social interactions. As a result, the...
IoT Cybersecurity for Smart Cities
We are currently living in a time where Spain’s municipalities are receiving lots of aid through European Next Generation funds including, among...
Main cybersecurity threats for SMEs – cyberattacks
For the production fabric in general and for Spain in particular, SMEs play an important role. According to CEPYME (Spanish SMEs business...
Choosing an SD-WAN Solution Model: Cloud vs On-Premise
Large and medium-sized companies have been implementing SD-WAN solutions for some years now, and recent studies confirm that the SD-WAN market is...
Railway hardware standards and certifications
Railway vehicle manufacturers, suppliers and rolling stock operating companies are required to meet mandatory, voluntary and contractual...
Easy network deployment with Corporate ZTP
Zero Touch Provisioning is a method that can be implemented in different types of businesses, whereby the implementation of some technological parts...
Limitations of Traditional Cybersecurity Solutions
Traditional cybersecurity solutions, such as firewalls and antivirus software, have been the mainstay of cybersecurity for decades. However, these...
The Rail Industry in the EU: Towards digitalization
When it comes to transportation, the train represents a symbol of pride for many European countries, reflecting the progress of industrial...
The importance of Network Traffic Analysis – NTA tools in implementing cybersecurity in companies
Network Traffic Analysis - NTA tools and cybersecurity are two key areas of IT security. Both are essential to protect an organization’s systems and...
Artificial Intelligence with Machine Learning and Deep Learning applied to Cybersecurity
Artificial Intelligence - AI and cybersecurity are two terms that are becoming increasingly popular in today's digital age. While AI refers to the...