New Telekom
Home Blog

Blog

Expert articles, news and guides from the world of telecommunications and IT security.

Why You Should Not Use the Public Internet to Connect to Azure and AWS in 2026
New Telekom Expert Team

Why You Should Not Use the Public Internet to Connect to Azure and AWS in 2026

Connecting to Microsoft Azure or AWS over the public internet poses security, performance and legal risks in 2026. CloudConnect — New Telekom's private MPLS VPN service — replaces the public internet with a dedicated physical link offering guaranteed latency, isolation from DDoS attacks and savings of up to 50% on egress traffic.

Read article
5G Slicing and Private Networks: How to Revolutionise Connectivity in Modern Manufacturing and Warehousing
New Telekom Expert Team

5G Slicing and Private Networks: How to Revolutionise Connectivity in Modern Manufacturing and Warehousing

5G network slicing allows industrial enterprises to reserve a dedicated virtual network segment for critical machines and production lines — with guaranteed latency below 5 ms, traffic isolation and reliability of 99.999%. A guide for IT managers and operations directors of industrial plants and logistics centres.

Read article
CloudConnect: The Complete Guide to Private Cloud Connectivity for Enterprise Networks in 2026
New Telekom Expert Team

CloudConnect: The Complete Guide to Private Cloud Connectivity for Enterprise Networks in 2026

CloudConnect is a private VPN service built on MPLS VPN technology that connects enterprise networks to Public Clouds, Private Clouds and 500+ data centres without traversing the public internet. A guide for IT managers and security architects.

Read article
NIS2 and the new Cyber Security Act: A Complete Guide for Corporate Networks in 2026
New Telekom Expert Team

NIS2 and the new Cyber Security Act: A Complete Guide for Corporate Networks in 2026

The NIS2 directive and the new Cyber Security Act are fundamentally changing the requirements for corporate connectivity. A guide to deploying SD-WAN, CloudConnect, and Zero Trust architecture to meet NÚKIB requirements.

Read article