top of page

TELTONIKA NETWORKING DEVICES

Centro De
Seguridad

Cualquier dispositivo conectado a Internet está expuesto a ciberataques. Aquí proporcionamos toda la información sobre cualquier vulnerabilidad de seguridad existente o potencial relacionada con nuestros productos de conectividad.

Teltonika Networks Devices are RED compliant

1/8/25

Teltonika Networks RF capable devices such as RUT, RUTX, RUTM, RUTC, TRB, TAP and OTD are compliant to the latest Radio Equipment Directive Cybersecurity Requirements - Article 3.3 (d), (e). You can find device specific information in our Wiki page, under device certificates, CE/RED.

RUTX50 CE/RED Certification

30/5/25

RUTX50 has successfully achieved the Radio Equipment Directive (RED) harmonized standard certification "EN 18031-1" & "EN 18031-2". For more information please see the following page: https://wiki.teltonika-networks.com/index.php?title=RUTX50_CE/RED

RutOS and RMS third-party penetration testing

26/3/25

In collaboration with third-party penetration testing service providers, we have undergone rigorous security testing for our RutOS platform based RUTX50 device and Remote Management System. You can learn more about these tests here:

RutOS - https://wiki.teltonika-networks.com/view/RutOS_Declaration_of_Software_Security_2025

RMS - https://wiki.teltonika-networks.com/view/RMS_Declaration_of_Software_Security

RUTX50 ETSI EN 303 645

13/1/25

RUTX50, which is based on our RUTOS firmware, has successfully been certified with the ETSI EN 303 645 security certification. You can learn more about this certificate here: https://wiki.teltonika-networks.com/view/RUTX50_ETSI_EN_303_645

Title

Descripción

Title and description

  • Página 1

NEWS & ARTICLES

the-rutx50-5g-router-now-red-certified-article-banner-840xAuto.jpg

2025-06-11 08:55

Visión General de la Seguridad de Nuestro Sistema de Gestión Remota

711530-5g-security-840xAuto.jpg

2024-08-22 13:00

Nos unimos al programa CVE para mejorar la seguridad de las soluciones de red

rms-security-banner-840xAuto.jpg

2024-03-06 15:00

SECURITY VULNERABILITIES IN RMS AND RUT SERIES DEVICES

Secure Software Development Lifecycle

Ensuring the security of our products and services is a top priority at Teltonika. They are designed, developed, and rigorously tested with security and privacy in mind throughout the software development lifecycle of each release.

In addition to performing vulnerability management, reviewing vulnerability reports, routine monitoring of new vulnerabilities, and handling vulnerability remediation, Teltonika’s core Secure Software Development Lifecycle (SSDL) consists of the following phases:

Training

As a pre-requirement of this lifecycle, Teltonika’s security team drafts training materials and developer test on a yearly basis.

Requirements

Baseline security and privacy requirements for the upcoming release are drafted and communicated internally.

Design

Software design reviews are conducted with the goals of understanding the upcoming release, drafting.

Implementation

Static code scanning tools are maintained and code is reviewed.

Verification

Comprehensive fuzzing, penetration, and final security tests are performed.

Release

Documents are finalised, archived, and taken into account for the following cycle.

Everything begins with security.

"In an ever-increasing complexity of globally connected digital devices, ensuring cybersecurity is no longer an optional task. The first step should always be keeping your devices up-to date."

fixed-aspect-ratio-spacer-variants.webp
bottom of page