Skip to content

What Is Telovix?

Telovix is an eBPF security platform built for telecom and Open RAN environments. It gives operators continuous runtime visibility and control over protected nodes through a private Console and node-level Sensors deployed on each host.

Telovix is available in two deployment models:

  • Telovix self-hosted: the customer installs and operates the Console and databases on their own infrastructure. All data stays inside the customer network. The customer downloads a signed license bundle from the Telovix Portal and imports it during the Console setup wizard. The Console validates it offline with no internet connection required at runtime.
  • Telovix Cloud: Telovix provisions and operates the full platform including the Console, PostgreSQL, and ClickHouse in Telovix's cloud infrastructure. Licensing is injected automatically during provisioning. The customer never imports a license file and reaches the login page directly after provisioning completes.

Both models start with a subscription through the Telovix Portal. After payment is confirmed, the customer chooses whether to deploy Telovix self-hosted or request Telovix Cloud from the Portal.

Who it's for

AudienceWhat they use Telovix for
SOC and incident response teamsReview alerts, investigate runtime behavior, and determine whether an event is node-local or fleet-wide.
RAN and core platform engineersMonitor Linux hosts, 5G Core network functions, and Open RAN nodes at the kernel level.
Security architectsDefine sensor enrollment, mTLS trust, policy rollout, and enforcement approval paths.
Compliance teamsCollect evidence for CIS v8, NIS2, 3GPP TS 33.117, and O-RAN WG11 security requirements.
Telecom operatorsCorrelate kernel-level runtime activity with 5G Core and O-RAN roles and protocol flows.

How it works

Telovix uses a two-component model: the Telovix Console and the Telovix Sensor.

The Console is the private control plane. It runs as a single Rust binary on a dedicated host or as a Telovix Cloud deployment. It exposes port 15483 (Telovix self-hosted default) for both the operator web UI and the sensor mTLS endpoint on a single combined TLS listener. Every sensor authenticates with a per-node client certificate issued at enrollment. Operators use the Console for fleet management, sensor enrollment, policy pack assignment, alert triage, compliance reporting, and investigations.

The Sensor runs on each protected node as a single Rust binary of approximately 89 MB with an embedded eBPF engine. It deploys as a systemd service, sends a heartbeat every 15 seconds over mTLS to the Console, and maintains a persistent WebSocket stream for low-latency event delivery. If the Console is unreachable, the Sensor spools events to local disk and replays them on reconnect.

The Sensor comes in two flavors:

  • Standard: core eBPF security collection only.
  • Telecom: everything in standard, plus 5G Core and O-RAN NF monitoring, protocol parsing, NGAP KPI tracking, and telecom security analysis.

Every node starts in observe-only mode. Enforcement requires explicit operator approval.

Console: https://<console-host>:15483 (Telovix self-hosted default)
Sensor heartbeat: every 15 seconds (outbound from sensor over mTLS)
Event stream: persistent WebSocket (500 ms tick, low-latency path)
License model (Telovix self-hosted): Ed25519-signed bundle, validated offline
License model (Telovix Cloud): auto-injected at provisioning, no import needed

::: note Deploy in the order the platform is designed for: observe first, let behavioral baselines build for at least 14 days, validate normal behavior, then move selected nodes to enforcement only after the approval path is confirmed. :::

Architecture overview

Control planeLicense & distribution
Sensor > Console (mTLS on port 15483, outbound from sensor) Portal > Console (offline license import, no runtime link)

Sensors initiate all network paths outbound to the Console over mTLS on port 15483 (Telovix self-hosted default). The Console stores fleet state, alerts, compliance data, and investigations in PostgreSQL and runtime events in ClickHouse, both of which stay inside the deployment boundary. In Telovix self-hosted deployments, the Portal has no runtime link to the Console after license import. In Telovix Cloud deployments, Telovix manages the full lifecycle including license delivery and infrastructure operations.

Console fleet view showing enrolled sensors with health state, flavor label, node role, and last heartbeat timestamp
Fleet view - enrolled sensors with health state, flavor label (standard or telecom), node role, and last heartbeat timestamp Click to enlarge

Deployment models

ModelConsole operated byDatabasesData residencyLicense
Telovix self-hostedCustomerCustomer-managedCustomer infrastructureDownloaded from Portal, imported manually
Telovix CloudTelovixTelovix-managedTelovix cloud infrastructureAuto-injected at provisioning

Both models are available on the same subscription plans. The choice is made per deployment after the workspace is activated.

Sensor flavors

FlavorWhat it covers
standardProcess execution, file access, network connections, privilege changes, namespace creation, kernel module loads, ptrace, FIM, SBOM, Kubernetes workload visibility, behavioral anomaly scoring.
telecomEverything in standard, plus: 5G Core NF detection and role classification (AMF, SMF, UPF, PCF, NRF, AUSF, and more), O-RAN node detection (O-DU, O-CU-CP, O-CU-UP, near-RT RIC), NGAP/F1AP/E1AP/XnAP/E2AP/PFCP/GTP-U/SCTP/Diameter/RADIUS/SIP/SBI-HTTP2/NAS5G protocol parsing, NF SLO monitoring, TLS uprobe visibility, O-RAN WG11 security checks, and telecom-specific attack chain detection.

What operators get

NeedWhat Telovix provides
Fleet state and coverageSensor enrollment, health states, trust certificates, heartbeat monitoring, and sensor groups.
Runtime behavior detectionProcess execution, file writes, network flows, privilege escalation, shell sessions, and kernel-level LSM hooks.
Alert triage and investigationAlert inbox with severity scoring, attack chain correlation, process tree, and investigation case management.
Behavioral analyticsPer-binary behavioral baselines, anomaly scoring, and 14-day learning mode before alerting activates.
Software and dependency visibilitySBOM scanning via Trivy on container images reported by sensors, with CVE tracking.
Telecom protocol and NF contextDedicated Telco section in the Console with 5G Core, O-RAN, RAN, user plane, SLO, and protocol views.
Kubernetes securityPod and workload inventory, Kubernetes network policy visibility, and container runtime attribution.
Compliance evidenceCIS Controls v8, NIS2, 3GPP TS 33.117, and O-RAN WG11 reports with per-control evidence.
AI-assisted analysisAn AI assistant with 44 tools that can query fleet data, correlate events, and help write detection rules.
SIEM forwardingEvent export to Microsoft Sentinel, Splunk, Elastic, OpenSearch, or any HTTP endpoint.
Long-term event storageOptional Parquet export to S3 or MinIO for external analytics pipelines.
Alert detail view showing correlated process execution, network connection, and telecom context for a single event on a 5G Core node
Alert detail - correlated process execution, network connection, and telecom context on a 5G Core node Click to enlarge

What Telovix is not

::: note In Telovix self-hosted deployments, the Console never connects to Stripe or any Telovix cloud service at runtime. Once the signed license bundle is imported, the Portal plays no role in day-to-day operations. :::

  • It is not a SaaS control plane that requires outbound connectivity for runtime operation in Telovix self-hosted deployments.
  • It is not intrusive by default. Every node starts in observe-only mode and enforcement requires explicit operator approval.
  • It does not require kernel patches or custom kernel builds as part of the deployment model.
  • It does not store raw events in PostgreSQL. Runtime events go to ClickHouse. PostgreSQL holds only operational state.

Next steps

Released under the Telovix Commercial License.