Are you looking for support from US? GET SUPPORT
Your session has expired.

Your authenticated session has expired due to inactivity. You can close this message and continue as a guest or sign in again before proceeding.

Related services

image

Security Patching

Safeguard your mission-critical systems against cyber attacks.

image

Managed Security Services

Protect mission-critical systems, cloud, networks and endpoints.

image

Advisory Services

Get expert cybersecurity help when you need it.

Overview

Improve system security posture with advanced authentication measures, ensuring transmission integrity.

Radio authentication provides an additional layer of protection to Safeguard the integrity of communications. Any unauthorized radio without the correct key will be denied access to the system and an alert sent. Internal access is controlled by a centralized authority that defines what functions and operations users can perform, and on which devices. Core infrastructure machine authentication employs protocols and shared key options.

Features and benefits

Authenticate radio communications and devices

Authenticate radio communications and devices

Advanced key management

Advanced key management

Two-factor authentication (2FA)

Two-factor authentication (2FA)

Internal identity management

Internal identity management

Remote user access controls

Remote user access controls

Peer-to-Peer router authentication

Peer-to-Peer router authentication

Administration and policy management

Administration and policy management

Smart card authentication

Smart card authentication

Block unauthorized devices and users from system accesss while securing network interoperability.

Radio authentication

Radio Authentication uses a unique authentication key assigned to each radio that is also stored in the authentication center (AuC). The authentication key cannot be read from the radio and then cloned into another device. The correct key must be present in order for the radio to gain access to the ASTRO system. This provides an additional level of control for system owners and prevents unauthorized radios from joining the system.

Encryption key management

Encryption Key Management is critical to the cyber resiliency of the ASTRO system. Our secure management ecosystem ensures your radio communications are secured with encryption keys that can be updated over-the-air. This rekeying option provides the convenience of not having users bring their devices into the shop for manual rekeying.

Centralized authentication

The centralized authority defines what functions and operations users can perform, and on what devices.Centralized Authentication also addresses identity management within the ASTRO network through a centralized user credentials (account and password) database. Records of all logins are centrally stored which enables the customer to manage system access and perform audits.

Core data integrity

ASTRO core transmissions between routers are authenticated by Open Shortest Path First (OSPF) and Border Gateway Protocols (BGP) and by means of shared Secure Shell keys (SSH). SSH protects the integrity of the keys during installation and automated routine scripts, with one shared key per protocol (OSPF and BGP). If customers require unique keys, this may be achieved by manual key configuration on the affected routers.

Cybersecurity resources

ASTRO Systems Authentication Solutions Brochure

ASTRO Systems Authentication Solutions Brochure

Learn how to prevent unauthorized system access, while securing your network

Please wait...