Digging trenches, laying cables, building amplifier sites, and operating a worldwide fiber network takes a lot of work – trust us, we’ve done it. But you don’t have to go to all that effort and expense. For large-scale requirements, our optical fiber solutions deliver all the benefits of owning your infrastructure at a fraction of the cost.
We use our own optical fiber backbone routes that we control, operate, and monitor to ensure all cable stretches and exact fiber routings are thoroughly checked, documented and maintained. We apply a rigorous process to all fiber routes, including fast, in-field action for fiber repairs to maintain high-fiber availability.
Before we handover fiber to you, we do the OTDR testing for performance using advanced measurement tools and power loss tests. Once all tests are complete, you get direct operational control of your own fiber optic network and can light it up whenever you need it.
Our optical fiber complies with G.652 ITU-T and is currently available to order in Europe and Russia.
Call us anytime at
+46 (0) 771 191 170Or email us
carrier-csc@teliacompany.comCanada
1 844 8730909France
0800 - 917 453Germany
0800 - 182 7111Hong Kong
800-965559Italy
800 789 798The Netherlands
0800 - 022 9500Poland
00800 461 22 68Russia
+7 495 788 5708Singapore
800 461 10 55Spain
900 984 631Turkey
008 004 696 496United Kingdom
0800 - 028 7406United States
888 - 436 1133Mexico
01800 123 9599Features |
---|
![]() |
Optical fiber in accordance with G.652 ITU-T |
![]() |
Fiber routes available in Europe and Russia |
![]() |
Full OTDR testing and documentation at hand-over |
![]() |
Short, medium or long-term (IRU) leases to provide you secure infrastructure between your key destinations |
![]() |
Rack space in amplifier sites |
A Dark Fiber network is an excellent option for improving data security since it is physically constrained. The high-levels of security enable you to meet compliance and regulation requirements better. You can take greater control of data sovereignty.
Secure by design features |
---|
![]() |
Dual NOCs situated in secure underground locations |
![]() |
Physical and logical security from design to deployment |
![]() |
A network-wide Acceptable Use Policy (AUP) |
![]() |
Customer Service authentication procedures |
![]() |
Clear customer data management policies |