top of page

製品

事例集

サポート

リソース

会社

Keep your network safe - the essentials of cybersecurity(日本語)

Keep your network safe - the essentials of cybersecurity(日本語)

2022年3月30日水曜日 8:00:00 UTC

Online security must always be the highest priority, and lately, even more so than ever. The scale of damage made by a security breach could be way more significant than you ever thought. The awareness of IoT security has increased to another level due to recent global events. In this webinar, we will present a checklist of required measures to improve network security and prevent cyber threats.


Icon_play.png

SPEAKERS

Pranas Aksamitauskas

Pranas Aksamitauskas

Operational Marketing Projects Executive(日本語)

Tomas Mikolaitis

Tomas Mikolaitis

Product Development Coordinator

Questions & Answers

There are some examples from device manufacturers in other countries (example: Routers) with built in features to send Your data to 3rd unknown party or back to themselves. How do we get to know about it? How do we know where our data is being sent? What tools should be used to prevent this in case we want to continue using the device, but keep our data secure?(日本語)

With Teltonika Networks devices, it is possible (using TCP dump) to capture communications packets, which went in and out of the router WAN interface. Later with tools like 'Wireshark', you can analyze traffic and block unwanted communication in the firewall. Another option is to look for publicly available research about devices security and take action by disabling data sending or blocking traffic in the firewall.


How can i convince myself that my hosting provider has a high level of protection against cyberattacks? Is there any certification/qualification ?(日本語)

A good practice is talking with providers about their capabilities and mitigation plans for different cyberattacks. Also, check publicly available information about the hosting provider and its track records.


Is there a best practice guide for security config of teltonika routers for application types, i.e. polling data logger (PC) via public IP?(日本語)

Teltonika Networks out of the factory comes with number of security options activated: disabled public access, limited attempts for WebUI, SSH attemps and others.


WEBINAR RECORDINGS

default-image.jpg

Libera el potencial del 5G en Latinoamérica: Descubre el portafolio y los casos de uso de Teltonika.

default-image-person.jpg

Name S.

default-image-person.jpg

+1

Speakers

es

default-image.jpg

Libera el potencial del 5G en Latinoamérica: Descubre el portafolio y los casos de uso de Teltonika(日本語)

default-image-person.jpg

Name S.

default-image-person.jpg

+1

Speakers

es

default-image.jpg

Transforming Transportation & Urban Spaces with IoT(日本語)

default-image-person.jpg

Name S.

default-image-person.jpg

+1

Speakers

en

bottom of page