https://urgentcomm.com/wp-content/themes/ucm_child/assets/images/logo/footer-new-logo.png
  • Home
  • News
  • Multimedia
    • Back
    • Multimedia
    • Video
    • Podcasts
    • Galleries
    • IWCE’s Video Showcase
    • Product Guides
  • Commentary
    • Back
    • Commentary
    • Urgent Matters
    • View From The Top
    • All Things IWCE
    • Legal Matters
  • Resources
    • Back
    • Resources
    • Webinars
    • White Papers
    • Reprints & Reuse
  • IWCE
    • Back
    • IWCE
    • Conference
    • Special Events
    • Exhibitor Listings
    • Premier Partners
    • Floor Plan
    • Exhibiting Information
    • Register for IWCE
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookie Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • Mission Critical Technologies
    • TU-Auto
  • In the field
    • Back
    • In the field
    • Broadband Push-to-X
    • Internet of Things
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Call Center/Command
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Network Tech
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Operations
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Regulations
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • Organizations
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
Urgent Communications
  • NEWSLETTER
  • Home
  • News
  • Multimedia
    • Back
    • Video
    • Podcasts
    • Omdia Crit Comms Circle Podcast
    • Galleries
    • IWCE’s Video Showcase
    • Product Guides
  • Commentary
    • Back
    • All Things IWCE
    • Urgent Matters
    • View From The Top
    • Legal Matters
  • Resources
    • Back
    • Webinars
    • White Papers
    • Reprints & Reuse
    • UC eZines
    • Sponsored content
  • IWCE
    • Back
    • Conference
    • Why Attend
    • Exhibitor Listing
    • Floor Plan
    • Exhibiting Information
    • Join the Event Mailing List
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Cookie Policy
    • Terms of Service
    • Privacy Statement
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • TU-Auto
  • newsletter
  • In the field
    • Back
    • Internet of Things
    • Broadband Push-to-X
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Cybersecurity
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
acc.com

Wireless Networks


TCS cybersecurity portfolio stresses proactive, not reactive, mitigation

TCS cybersecurity portfolio stresses proactive, not reactive, mitigation

TeleCommunication Systems' Enterprise Security and Protection (ESP) portfolio includes a variety of tools — firewalls, intrusion-detection and prevention systems, malware, adware, and anti-virus software — and guidance from TCS’s team of cybersecurity experts.
  • Written by Urgent Communications Administrator
  • 10th May 2012

TeleCommunication Systems this week introduced at the CTIA show in New Orleans its Enterprise Security and Protection (ESP) cybersecurity portfolio that places an emphasis on preventing intrusive attacks. The portfolio includes a variety of tools —firewalls, intrusion-detection and prevention systems, malware, adware, and anti-virus software — and guidance from TCS’s team of cybersecurity experts. It can be customized with products provided by third-party vendors.

Cybersecurity breaches can have devastating consequences, according to Drew Morin, TCS chief technical officer, noting that a D.C. law firm had to shut its doors 30 days after hackers pirated client data and posted it to the Internet.

“People typically don’t expect that a cyber attack will cripple them completely or drive them out of business,” Morin said.

The first step toward cybersecurity is to assign the enterprise an ESP Quotient, which quantifies the needs, based on the sensitivity of the organization’s data.

“For instance, Bank of America would have a much higher ESP Quotient than would Sanford and Son,” Morin said.

The next step is to assess the network’s vulnerability and the enterprise’s ability to respond to an attack, which a group of TCS personnel — dubbed the “Red Team” — does through a process that Morin describes as “ethical hacking.”

“What they try to do, without doing any damage, is to see whether they can gain control of that server,” Morin said. “We have created a series of exercises designed to exploit any weaknesses that might exist.”

The attack is done with the client’s permission, but the client has no knowledge of when or how it’s going to happen, in order to prevent any action—inadvertent or otherwise—that might yield a false outcome.

As it assesses, TCS also takes a look at the organization’s public face.

“Sometimes attacks occur simply because the organization has a high profile,” Morin said.

Also, the greater an organization’s presence in the public eye, the more information that’s available that can be used against it.

“There’s a lot of information that’s exploitable, and that creates a vulnerability,” Morin said. “Sooner or later, [hackers] will find the key to get into your network.”

In addition to identifying weaknesses, the mock attack is designed to validate how quickly and effectively the threat was mitigated.

“We try to teach them how to know when they’re under attack and how to stop it,” Morin said.

Once assessment and validation is complete, the enterprise is given a score that corresponds to its ESP Quotient; the degree of discrepancy indicates how much work needs to be done.

As part of its service, TCS also provides training for company executives, to help them better understand cybersecurity threats, why they are so dangerous, and to educate them about the value of strong policies that are enforced. Meanwhile, employees are taught about the risks of opening suspicious e-mails or downloading files that may contain Trojan horses.

Even the organization’s IT personnel receive training to change their mindset to proactive from reactive. The theory is that preventing an attack always is less costly and painful than cleaning up the mess later.

“The best defense is an understanding of the offense,” Morin said. “If you’re going to protect your network, you need to understand how they’re going to attack it.”

One attack that catches many enterprises completely unaware — but is like a ticking time bomb — is an advanced persistent threat, which hides deep within the network and evolves as conditions change.

“It’s constantly there, waiting for you to make a mistake,” Morin said, explaining why ongoing networking monitoring is yet another critical element of any effective cybersecurity effort.

In other news, TCS unveiled this week its VoLTE 911 (voice over LTE) solution, which enables wireless carriers to provide 911 emergency services over their 4G LTE networks.

“As the wireless carriers have been deploying LTE, they haven’t cared all that much about 911, because LTE primarily is a data platform,” said Thomas Ginter, TCS’s vice president of product management. “But as soon as VoLTE handsets hit the market they will care, so we had to beat them to the punch.”

Because some of the carriers are expected to launch VoLTE handsets in the first quarter of 2013, the solution will be available by the end of this year, Ginter said.

The platform combines elements of TCS’s existing wireless and VoIP platforms to create a hybrid solution that will enable carriers to locate VoLTE handsets and route the call to the appropriate public-safety answering point, he added. This will occur even in situations where the 911 call switches from the 4G network to 3G/2G networks.

Related stories:

  • DHS reveals 2013 cybersecurity budget
  • How to increase cybersecurity awareness (with related video)
  • UCtv: Where to look for cybersecurity talent
Tags: content Wireless Networks

Most Recent


  • AT&T wireless growth keyed by FirstNet—now provides 24,000 agencies with 4.4 million connections
    AT&T this week reported that FirstNet ended 2022 supporting more than 24,000 public-safety agencies with “about” 4.4 million connections, including 377,000 connections that were added during the last three months of 2022—a total that represents more than half of the carrier’s post-paid wireless growth for the quarter. AT&T officials released these figures in conjunction with […]
  • AT&T FirstNet unleashes robotic dogs for emergency services
    AT&T is releasing robotic hounds from Ghost Robotics as part of the service provider’s FirstNet emergency responder service. In a blog, AT&T VP Lance Spencer explained that the robotic dogs will be connected to AT&T’s network and deployed for public safety, defense, federal and state agencies, local police and fire departments, and commercial customers. “Network-connected robotic dogs can deliver a […]
  • How 5G is making cities safer, smarter, and more efficient
    It’s a scenario we’ve all experienced: an ambulance with a blaring siren racing against time to get a person in medical distress to a hospital through traffic. What we don’t see is 5G connectivity enabling paramedics to communicate with hospital staff via video conference and coordinate care in real-time before arriving at the emergency room. […]
  • MCPTT interworking for critical communications
    The goal of mission-critical communication systems is to minimize the response time of first responders in emergency situations across several agencies. A dedicated push-to-talk button offers an efficient mechanism that simplifies the speaker-to-listener process to a minimum. This feature is useful when coordinating large group activities and to enable the instant flow of tactical status […]

Leave a comment Cancel reply

To leave a comment login with your Urgent Comms account:

Log in with your Urgent Comms account

Or alternatively provide your name, email address below:

Your email address will not be published. Required fields are marked *

Related Content

  • The battle over connected cars drags on
  • UK officials revamp ESN plans again, target Airwave-to-LTE transition for end of 2026
  • PSCR: Dereck Orr highlights features of June 21-24 virtual event
  • FirstNet buildout on pace for March 2023 completion, AT&T official says

Commentary


How 5G is making cities safer, smarter, and more efficient

26th January 2023

3GPP moves Release 18 freeze date to March 2024

18th January 2023

Do smart cities make safer cities?

  • 1
6th January 2023
view all

Events


UC Ezines


IWCE 2019 Wrap Up

13th May 2019
view all

Twitter


UrgentComm

AT&T wireless growth keyed by FirstNet—now provides 24,000 agencies with 4.4 million connections dlvr.it/ShY5qH

27th January 2023
UrgentComm

Report: Remote work causing offices to empty, but walkable cities still in high demand dlvr.it/ShXM7Z

27th January 2023
UrgentComm

AT&T FirstNet unleashes robotic dogs for emergency services dlvr.it/ShW7p8

27th January 2023
UrgentComm

Federal agencies infested by cyberattackers via legit remote-management systems dlvr.it/ShVhn3

26th January 2023
UrgentComm

How 5G is making cities safer, smarter, and more efficient dlvr.it/ShVS1h

26th January 2023
UrgentComm

MCPTT interworking for critical communications dlvr.it/ShTm3P

26th January 2023
UrgentComm

Self-driving cars present terrorism risk, FBI director says dlvr.it/ShTTHx

26th January 2023
UrgentComm

UK Home Office officially will cut ESN ties with Motorola Solutions in December dlvr.it/ShNjfN

24th January 2023

Newsletter

Sign up for UrgentComm’s newsletters to receive regular news and information updates about Communications and Technology.

Expert Commentary

Learn from experts about the latest technology in automation, machine-learning, big data and cybersecurity.

Business Media

Find the latest videos and media from the market leaders.

Media Kit and Advertising

Want to reach our digital and print audiences? Learn more here.

DISCOVER MORE FROM INFORMA TECH

  • American City & County
  • IWCE
  • Light Reading
  • IOT World Today
  • Mission Critical Technologies
  • TU-Auto

WORKING WITH US

  • About Us
  • Contact Us
  • Events
  • Careers

FOLLOW Urgent Comms ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2023 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.