Visit us at MWC 2019 in Hall 7 on stand 7C64

Blog

Get news about our products, which events we are attending plus industry insights and commentary

Telesoft adds LR4 capabilities to their existing MPAC-IP 7000 Series

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Monday, 26 October 2015. Posted in Cyber, Company News

The MPAC-IP 7000 series features variable offset 7 layer deterministic pattern matching at line rate and controlled using Telesoft’s rapid development API, both our 100GbE and 4x10GbE solutions allows operators to maintain ultra-high-speed links ensuring high-performance, security and compliance.

Extending IDS and IPS Throughput Capacity

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Thursday, 24 September 2015. Posted in Cyber

Financially motivated hackers look to exploit vulnerable networks to steal data, money, or disrupt network operations for those willing to pay for the service. It’s no longer just hobbyist hackers looking to infiltrate networks for fun. If IDS and IPS systems, a vital component of any network security architecture, become saturated any worms, spyware, or disruptive packets can bypass security measures entirely, infiltrating the network and causing damage whilst remaining undetected. At best, with fail-closed IPS, the network is disrupted. At worst, your network is the latest to be featured in the news for being hacked.

NFV Series: Network Function Virtualisation, maximising your potential

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Thursday, 27 August 2015. Posted in Telecom

The obvious advantages of an NFV network architecture are reduced capital expenditure (CAPEX) and operating expenditure (OPEX). Whereas the old paradigm required bespoke hardware devices for each network function – hardware devices that quickly became obsolete as average hardware capabilities surpassed them – NFV allows network functions to be virtualised and run on commercial off the shelf (COTS) servers.

Hardware Accelerator cards, a cost effective solution for expanding network capabilities

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Friday, 21 August 2015. Posted in Cyber

To reduce operating expenditure (OPEX) and minimise rack space usage hardware accelerator cards can be implemented into existing Commercial off the Shelf (COTS) servers or integrated into new systems. Offloading processing to a hardware accelerator card, such as the MPAC-IP 7000 Series from Telesoft, enables the host COTS server to maximise processing power for third party applications without the need for an expensive overhaul of existing infrastructure. Resources can then be freed up and re-purposed or used to extend processing capabilities, reducing capital expenditure (CAPEX).

NFV Series - Network Function Virtualisation (NFV), a disruption to the status quo

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Friday, 07 August 2015. Posted in Telecom

Stringent standards for protocol adherence and stability meant development of these hardware devices was slow but despite the time spent developing them the continual acceleration of hardware capabilities, as described by Moore’s law, meant they soon became obsolete. This resulted in operators continually having to repeat the cycle of design, integrate and deploy just to keep up with competitors. Not only is this expensive, it does little if anything to bring in additional revenue as customers come to expect the services offered by the new hardware platforms as standard.

Find your Network Breakpoint, before someone else does

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Thursday, 30 July 2015. Posted in Cyber

Sophisticated cyber-attacks, orchestrated by well organised and financially motivated criminal groups, look to take advantage of holes in network security that become vulnerable as networks increase in complexity. The goal of such attacks is to steal valuable data, money or to cause general network disruption but the effects extend beyond the immediate damage caused by the attack. The potential ramifications such as loss of credibility, reputation, customer trust and legal breaches could have a significant lasting negative impact for businesses and organisations.

The Network Packet Broker, answering the challenge of increasing data rates

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Thursday, 09 July 2015. Posted in Cyber

A recent whitepaper from Telesoft looked at the enormous increase in high bandwidth services, in particular video, and the difficulties this creates for monitoring and analysis systems. Many providers are finding that it’s not commercially sustainable to keep purchasing more hardware and software in response to demand for high bandwidth services which are projected to keep increasing.

Successful Implementation of the Telesoft OKEFORD 5500 Media Platform

Posted by

Steve Patton

Steve Patton

Steve is an experienced technical B2B cyber security specialist and Director. Steve is a frequent speaker on topics including security breaches, big data analytics, audit and compliance, and IT forensics.

on Tuesday, 19 May 2015. Posted in Telecom, Company News

We recently completed a large migration project for one of our market leading legacy products the OKEFORD 2450 IVR, working with a Tier 1 Service Provider and one of the biggest System Integrators to migrate all of the revenue generating services provided by the OKEFORD 2450 IVR, to our latest iteration, the OKEFORD 5500 Media Platform.

Working as an International Brand

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Tuesday, 21 April 2015. Posted in Company News

For more than 20 years we have supported operators and governments across every network generation including wireless, cable, LTE, 2G, 3G and 4G. We have worked with over 250 operators in 100 countries. During this time, we have established an impressive UK base of operations, with offices in both the US and India. This has allowed us to build an international team of professional, knowledgeable and experienced employees. Giving Telesoft a unique view of the global Telecommunications market, how it works and more importantly what our customers need to stay one step ahead of their competitors.

<<  8 9 10 11 12 [13

Information cookies

Cookies are short reports that are sent and stored on the hard drive of the user's computer through your browser when it connects to a web. Cookies can be used to collect and store user data while connected to provide you the requested services and sometimes tend not to keep. Cookies can be themselves or others.

There are several types of cookies:

  • Technical cookies that facilitate user navigation and use of the various options or services offered by the web as identify the session, allow access to certain areas, facilitate orders, purchases, filling out forms, registration, security, facilitating functionalities (videos, social networks, etc..).
  • Customization cookies that allow users to access services according to their preferences (language, browser, configuration, etc..).
  • Analytical cookies which allow anonymous analysis of the behavior of web users and allow to measure user activity and develop navigation profiles in order to improve the websites.

So when you access our website, in compliance with Article 22 of Law 34/2002 of the Information Society Services, in the analytical cookies treatment, we have requested your consent to their use. All of this is to improve our services. We use Google Analytics to collect anonymous statistical information such as the number of visitors to our site. Cookies added by Google Analytics are governed by the privacy policies of Google Analytics. If you want you can disable cookies from Google Analytics.

However, please note that you can enable or disable cookies by following the instructions of your browser.