Please note: This website includes an accessibility system. Press Control-F11 to adjust the website to the visually impaired who are using a screen reader; Press Control-F10 to open an accessibility menu.
Sign out

Session expired

Contact sales

Frequently bought together

image

KVL 5000 Key Variable Loader

Securely generate, transport and load encryption keys.

image

Cybersecurity Services

Our cybersecurity services can help you detect, prevent and respond to cyber attacks.

Overview

Protect your communications system - and the information it carries - from unauthorized access

Interconnected voice and data systems have distinct advantages, including improved productivity and increased collaboration. However, they can introduce new cybersecurity risks. ASTRO systems built-in security capabilities are designed to counter cyber threats that target public safety mission-critical operations and communications.

Features and benefits

Icon of torso

Authenticate access

Icon of a lock

Encrypt end-to-end

Icon of an alert

Detect network intrusions

Icon of a paper log of data

Log all activity

Our holistic approach to cybersecurity includes a range of services that help personized experience.

Data integrity

Ensuring the integrity of data within the network is paramount to the overall security of the ASTRO platform. To enable security at every step of the way we employ a variety of methods, including secure access controls, data traffic monitoring and encryption, based on the National Institute of Standards and Technology (NIST) framework and industry best practices.

Authentication

ASTRO radios systems utilize multiple forms of authentication to verify users, radios and networking components are authorized to access the system. For example, Radio Authentication prevents clones and other unauthorized radios from joining the system, listening into communications and consuming system resources.

Encryption

With end-to-end encryption, your communication stays secured as it transverses the ASTRO radio system, over-the-air and via wireline. Without the correct key, eavesdroppers are not able to listen in to your communications. The KMF provides a secure and centralized platform to manage keys.

Intrusion Detection

Intrusion detection systems (IDS) monitors ASTRO network traffic for potential security threats using signature-based detection and anomaly based detection. Both identification methods allow quick reaction to active cyber threats.

ASTRO & APX Security Resources

Cover image of the paper on ASTRO and the NIST cybersecurity framework

ASTRO and the NIST Cybersecurity Framework

Learn more about ASTRO and the NIST cybersecurity framework.

Cover image of the fact sheet for ASTRO Radio Authenthication

ASTRO P25 Radio Authentication Fact Sheet

Learn how to prevent unauthorized access to your P25 radio system.

Cover image of the fact sheet for ASTRO and LTE KMF

ASTRO P25 Key Management Facility (KMF)

Learn how to manage your encryption keys for P25 and LTE transmissions.

Cover image of the data sheet for KVL 5000

KVL 5000 Specifications

The KVL 5000 provides encryption algorithm and key loading loading for P25 devices.

Cover image of the data sheet for ASTRO Data Encryption Unit

ASTRO Data Encryption Unit Specifications

Learn how to secure data as it is sent over ASTRO radio systems.

Cover image of OTAR overview paper

Multisystem Over-the-Air-Rekeying (OTAR)

OTAR sends keys over the air, so radio users can stay in the field.

Cover image of the ASTRO Smart Card Multi-Factor Authentication Data Sheet

ASTRO Smart Card Multi-Factor Authentication

Learn how to protect your ASTRO radio system with Smart Card MFA

Cover image of ASTRO US Federal Cybersecurity Services

ASTRO US Federal Cybersecurity Services

Learn about our cybersecurity services for US Federal systems.

Cover image of ASTRO MDR Services

ASTRO Managed Detection and Response (MDR)

Learn how our 24/7 security monitoring can mitigate cyber threats.

Featured applications and services

Please wait...