Logo Teldat
NetFlow collection: A new standard for advanced network monitoring

NetFlow collection: A new standard for advanced network monitoring

Data collection is an essential part of network management to ensure network devices are being efficiently monitored and managed. NetFlow and SNMP (Simple Network Management Protocol) are two widely used techniques for collecting network data. These two approaches are similar in that they both aim to provide valuable information about network traffic and device status. However, there are...

read more
Cyber security in the Railways Industry

Cyber security in the Railways Industry

Cybersecurity has become a real trendy world in everybody’s live either used as a fancy term, to generate confidence associated to high technology topics, or to create panic and generate that sense of fear and urge for protection. We can find this uncomfortable…

read more
Data access security

Data access security

As time goes by, data access security is becoming a more pressing requirement in the technological world. Companies are more aware of how important it is to guarantee that those that access corporate platforms are who they say they are. Since the number of data stored is growing exponentially, the risk of identity theft poses a serious threat. Nowadays, the most common authentication system is...

read more
WPA3: Improved Wi-Fi security

WPA3: Improved Wi-Fi security

The nature of electromagnetic waves is such that anyone in a wireless network can receive the data sent over the air. With high-gain antennas, it is possible to listen in on the data that passes through an office from outside the building. That is why, right from the outset, a great deal of importance has been attached to wireless network security. By 1999, the first version of the IEEE 802.11...

read more
SD-WAN and security implications –Part 2

SD-WAN and security implications –Part 2

In my last blog, I wrote about the origins of SD-WAN and its benefits. However, these advantages are certainly not without their challengers and threats, which all interested companies should consider when analyzing the various options offered by the market. From a security point of view, the main threats arising have to do with the use of unprotected residential broadband networks. Unlike what...

read more
SD-WAN and security implications – Part 1

SD-WAN and security implications – Part 1

I have written an article on SD-WAN for Seguritecnia, an online and print magazine that is very present in the private security sector in Spain. In said article, I explained the concept of SD-WAN and the security implications associated to this technology (as befits a magazine that focuses on safety). Given the enormous interest in SD-WAN, I decided to give our blog readers the opportunity of...

read more