Overview
Protect your communications system - and the information it carries - from unauthorized devices or users
Interconnected voice and data systems have distinct advantages, including improved productivity and increased collaboration. However, they can introduce new cybersecurity risks. ASTRO systems built-in security capabilities are designed to counter cyber threats that target public safety mission-critical operations and communications.
Features and benefits
Authenticate radios to restrict network traffic
Encryption key management
Service Access Architecture
Intrusion Detection System (IDS)
Secure Shell Protocols (SSH)
Router Encryption
OSPF/BGP Router Authentication
Centralized Authentication/Event Logging
Prevent unauthorized devices and users from accessing your network and protect mission-critical data.
Radio authentication
Radio Authentication uses a unique authentication key assigned to each radio that is also stored in the authentication center (AuC). The authentication key cannot be read from the radio and then cloned into another device. The correct key must be present in order for the radio to gain access to the ASTRO system. This provides an additional level of control for system owners and prevents unauthorized radios from joining the system.
Encryption key management
Encryption Key Management is critical to the cyber resiliency of the ASTRO system. Our secure management ecosystem ensures your radio communications are secured with encryption keys that can be updated over-the-air. This rekeying option provides the convenience of not having users bring their devices into the shop for manual rekeying.
Data assurance inside the Core
Ensuring the integrity of data within the network is of equal importance to the overall security of the ASTRO platform. To enable security at every step of they way we employ a variety of methods, including secure access controls, data traffic monitoring and encryption, based on the National Institute of Standards and Technology (NIST) framework and industry best practices.
Centralized authentication and event logging
Centralized Authentication/Event Logging manages the unique identification of site administrative users and authenticates logins. Detection of suspicious events is recorded on a central server, helping network technicians to promptly detect, diagnose and respond to possible security breaches.
Cybersecurity resources
Apps and Services
Featured Services


