Network Security Controls

We understand that the integrity of your network should never be compromised. This is why Telenium® utilizes a variety of network security controls features in order protect your network from intentional and unintentional tampering.

Back to features.

Multiple levels of access



Users can be configured for no access, read-only access or read/write access to the database. Users with read/write access can be further limited to write privileges on specific fields only.




User Authentication Tracking


All of a user’s activity, such as logins, login failures, writes to the database, notifications, etc. is tracked in the database and is held in the historical files of the database for reference.



Local LDAP authentication


Telenium supports Lightweight Directory Access Protocol, giving a dual layer of protection as user account information, excluding passwords, must be defined in the Telenium database as well as the LDAP server.




Back to features.