
Telenium Security Controls
We understand that the integrity of your network should never be compromised. This is why Telenium® utilizes a variety of network security controls features in order protect your network from intentional and unintentional tampering.
Multiple External Authentication Protocols Supported


Telenium® supports a variety of authentication protocols, including LDAP, Kerberos, and RADIUS, ensuring secure and flexible user access management.
Multiple Levels of Access


Users can be configured for no access, read-only access or read/write access to the database. Users with read/write access can be further limited to write privileges on specific fields only.
User Authentication Tracking


All of a user’s activity, such as logins, login failures, writes to the database, notifications, etc. is tracked in the database and is held in the historical files of the database for reference.