NETWORK SECURITY CONTROLS

We understand that the integrity of your network should never be compromised. This is why Telenium® utilizes a variety of network security controls features in order protect your network from intentional and unintentional tampering.

MULTIPLE LEVELS OF ACCESS

Users can be configured for no access, read-only access or read/write access to the database. Users with read/write access can be further limited to write privileges on specific fields only.

USER AUTHENTICATION TRACKING

All of a user’s activity, such as logins, login failures, writes to the database, notifications, etc. is tracked in the database and is held in the historical files of the database for reference.

LOCAL LDAP AUTHENTICATION

Telenium supports Lightweight Directory Access Protocol, giving a dual layer of protection as user account information, excluding passwords, must be defined in the Telenium database as well as the LDAP server.