top of page

Telenium Security Controls

We understand that the integrity of your network should never be compromised. This is why Telenium® utilizes a variety of network security controls features in order protect your network from intentional and unintentional tampering.

Multiple External Authentication Protocols Supported

Telenium® supports a variety of authentication protocols, including LDAP, Kerberos, and RADIUS, ensuring secure and flexible user access management.

Multiple Levels of Access

Users can be configured for no access, read-only access or read/write access to the database. Users with read/write access can be further limited to write privileges on specific fields only.

User Authentication Tracking

All of a user’s activity, such as logins, login failures, writes to the database, notifications, etc. is tracked in the database and is held in the historical files of the database for reference.

© 2025 Megasys Enterprises Ltd., © 2025 Worth Ventures Ltd. All rights reserved.

Megasys® and Telenium® are registered trademarks of Megasys Enterprises Ltd.

bottom of page