“We are constantly developing new products, which inevitably increases the risks to our systems and data – especially when considering the importance of protecting intellectual property and ensuring data integrity in manufacturing and sales processes,” says Lukas Aukštakalnis, Information Security Officer at Teltonika, reflecting on the risks surrounding expansion and growth.
“The pace of innovation, international regulatory requirements – such as the EU’s NIS2, GDPR and the Cyber Resilience Act – together with the need to secure the supply chain, prompted us to look for a holistic, always-on solution that would not disrupt business operations.”
Augustinas Daukšas, a cybersecurity consultant at NRD Cyber Security, notes that Teltonika is a client that drives improvement:
“Security is prioritised from the design stage of Teltonika’s products. The company has a truly holistic approach – both its products and its internal operations must meet high security standards. In delivering our services, we clearly see that cyber resilience is a company priority. The Teltonika team is fully engaged in our SOC workflows, reviewing our alerts and reports in detail. We discuss their needs together and adapt accordingly. As a result, not only is Teltonika’s cybersecurity maturity increasing – the quality of our own services improves too.”
Teltonika adopted SOC services to ensure continuous monitoring of its information systems and timely response to emerging threats. Initially, SOC support operated only during business hours, but the company later transitioned to 24/7 infrastructure monitoring. This expansion strengthened security capabilities and ensured that potential attacks are identified not only during the working day, but also at night and on weekends – the periods when many incidents tend to go unnoticed.
Working with SOC partners also supports threat intelligence, enabling rapid responses to regional and global trends such as newly detected C2 server infrastructure, emerging phishing campaigns or the spread of new malware. In doing so, the SOC plays a key role in enhancing the organisation’s resilience to modern cyber threats.
According to L. Aukštakalnis, proving the value of a SOC required systematic argumentation and stakeholder alignment:
“One of the key drivers was regulatory compliance. The SOC became essential in helping us meet both EU and international information security standards, which are critical to remaining competitive globally. We also emphasised business continuity – even short outages of key production systems can result in financial losses far greater than the cost of SOC investment, which is why we view security as a fundamental business expense, not an optional one. Finally, more and more of our customers and partners are requesting evidence of robust security operations. High-quality SOC services have therefore become a mark of trust and competitive advantage – opening new opportunities for growth and strengthening our market reputation.”
Choosing a SOC provider was not a quick process either, the interviewee notes:
“We evaluated several criteria to ensure both technological and organisational compatibility. First, we reviewed the provider’s ability to integrate with our existing IT infrastructure and security stack – including cloud environments, telecommunications networks and endpoint protections. Equally important was the provider’s expertise in threat detection, automation and proactive threat hunting, as today’s cyber challenges require rapid adaptation. We also assessed the provider’s ability to deliver appropriate support levels, escalate incidents promptly and maintain transparent communication to guarantee timely responses to critical events.
NRD Cyber Security’s SOC services aligns closely with individual business needs and operational specifics. We particularly value their ability not only to detect threats, but also to understand how our organisation functions – for example, tailoring monitoring rules to the working cycles of R&D departments, which significantly reduces false positives and ensures security measures do not disrupt operations. This partnership allows us to feel confident that our organisation’s security is being monitored not only technically but strategically, in line with our business goals.”