Are you looking for support from US? GET SUPPORT
Your session has expired.

Your authenticated session has expired due to inactivity. You can close this message and continue as a guest or sign in again before proceeding.

Related services

image

Security Patching

Safeguard your mission-critical systems against cyber attacks.

image

Managed Security Services

Protect mission-critical systems, cloud, networks and endpoints.

image

Advisory Services

Get expert cybersecurity help when you need it.

Overview

Protect your communications system - and the information it carries - from unauthorized devices or users

Interconnected voice and data systems have distinct advantages, including improved productivity and increased collaboration. However, they can introduce new cybersecurity risks. ASTRO systems built-in security capabilities are designed to counter cyber threats that target public safety mission-critical operations and communications.

Features and benefits

Authenticate radios to restrict network traffic to authorized devices

Authenticate radios to restrict network traffic

Encryption key management

Encryption key management

Service Access Architecture

Service Access Architecture

Intrusion Detection System (IDS)

Intrusion Detection System (IDS)

Secure Shell Protocols (SSH)

Secure Shell Protocols (SSH)

Router Encryption

Router Encryption

OSPF/BGP Router Authentication

OSPF/BGP Router Authentication

Centralized Authentication/Event Logging

Centralized Authentication/Event Logging

Prevent unauthorized devices and users from accessing your network and protect mission-critical data.

Radio authentication

Radio Authentication uses a unique authentication key assigned to each radio that is also stored in the authentication center (AuC). The authentication key cannot be read from the radio and then cloned into another device. The correct key must be present in order for the radio to gain access to the ASTRO system. This provides an additional level of control for system owners and prevents unauthorized radios from joining the system.

Encryption key management

Encryption Key Management is critical to the cyber resiliency of the ASTRO system. Our secure management ecosystem ensures your radio communications are secured with encryption keys that can be updated over-the-air. This rekeying option provides the convenience of not having users bring their devices into the shop for manual rekeying.

Data assurance inside the Core

Ensuring the integrity of data within the network is of equal importance to the overall security of the ASTRO platform. To enable security at every step of they way we employ a variety of methods, including secure access controls, data traffic monitoring and encryption, based on the National Institute of Standards and Technology (NIST) framework and industry best practices.

Centralized authentication and event logging

Centralized Authentication/Event Logging manages the unique identification of site administrative users and authenticates logins. Detection of suspicious events is recorded on a central server, helping network technicians to promptly detect, diagnose and respond to possible security breaches.

Cybersecurity resources

ASTRO Systems Security Brochure

ASTRO Systems Security Brochure

Learn about ASTRO Systems built-in security capabilities

Apps and Services

Please wait...