Teldat Blog
Read our latest Teldat´s Blog Posts
EU Digitalization Goals: 5G networks rise & shutdown of 3G/2G technologies
The 5G revolution goes ahead All telecommunication carriers offering mobile solutions are competing to deploy the new 5G network as soon as...
6G technology – Next Generation Networks
It’s hard to figure out what we can achieve with the technology that will one day replace 5G. Technological advances are growing at an exorbitant...
Digital Transformation and Fiber Deployment in Europe
The digital transformation in the decade between 2020 and 2030 is clearly a priority for EU authorities. Large public investments have been approved...
NetFlow collection: A new standard for advanced network monitoring
Data collection is an essential part of network management to ensure network devices are being efficiently monitored and managed. NetFlow and SNMP...
Who will manage SD-WAN?
SD-WAN (Software-defined Wide Area Network) technology makes it easier for businesses and organizations to manage the complexity of the WAN networks...
Why buses need to be protected from cyberattacks
It is a fact that Internet communications are ever more present in our entertainment, work and social interactions. As a result, the...
IoT Cybersecurity for Smart Cities
We are currently living in a time where Spain’s municipalities are receiving lots of aid through European Next Generation funds including, among...
Main cybersecurity threats for SMEs – Cyberattacks
For the production fabric in general and for Spain in particular, SMEs play an important role. According to CEPYME (Spanish SMEs business...
Choosing an SD-WAN Solution Model: Cloud vs On-Premise
Large and medium-sized companies have been implementing SD-WAN solutions for some years now, and recent studies confirm that the SD-WAN market is...
Railway hardware standards and certifications
Railway vehicle manufacturers, suppliers and rolling stock operating companies are required to meet mandatory, voluntary and contractual...
Easy network deployment with Corporate ZTP
Zero Touch Provisioning is a method that can be implemented in different types of businesses, whereby the implementation of some technological parts...
Limitations of Traditional Cybersecurity Solutions
Traditional cybersecurity solutions, such as firewalls and antivirus software, have been the mainstay of cybersecurity for decades. However, these...





















