Cyber attacks are growing year by year, becoming a real threat for critical infrastructures. For this reason, Teltronic incorporates to its TETRA and LTE system and control centre a wide portfolio of cybersecurity services in order to continue developing and deploying the safest and most reliable land mobile radio projects.
Teltronic cybersecurity solutions allows mitigating the ever-increasing cyber threats, avoiding breaches that could hamper critical infrastructures and, consequently, the overall safety of all citizens. In this sense, quality standards are also being oriented towards the establishment and application of Information Security Management Systems, a concept on which ISO 27001 is based, a standard whose Teltronic ‘s compliance is accredited.
Threats come from varied vectors and channels, multiplying the likelihood that the critical infrastructures may be affected sometime during their life cycle, therefore, firewall protection, encryption, antimalware, hardening and others related are a must. Additionally, monitoring service, backed by a Security Operations Centre (SOC), enables comprehensive analysis of security information to prevent attacks and promptly react to unexpected system behaviour.
MISSION CRITICAL PMR USERS PROTECTION
Cyber security becomes particularly significant when it refers to the protection of mission critical PMR users and organizations whose personal safety, processes and business value depend on the uninterrupted operation of a mobile radio communication system and control centre. From a cyber security perspective, what is known as OT (Operational Technology) systems.
OT systems consist of a collection of subsystems or components brought together to perform as an integrated, purpose-built entity that assists and supports an specified process considered as critical within an organization. Being at the core of our modern societies and communities and facilitating the everyday routines of police forces, fire brigades, power generation plants, transport authorities, industries, airports, ports…, OT systems must always work at their highest standards, and full availability is to be delivered.
|Identify||Develop and use organizational understanding to manage cyber security risk to systems. Understanding the operational context and cyber security risks enables organizations to focus and prioritise its efforts.|
|Protect||Design and implement safeguards to limit the impact of potential events on critical infrastructures, and thus ensure their envisaged delivery and contain the negative effects of a potential cyber security event.|
|Detect||Implement activities to identify the occurrence of cyber security events. This can include continuous monitoring and detection processes, developed for the timely discovery of any anomalies.|
|Respond||Take appropriate and effective action following a cyber security event, with the aim of containing the impact of it. Response planning, quick communication and mitigation could be used to drive the Respond function.|
|Recover||Resilience strategy and plans for the timely repair of compromised systems and services due to a cyber security event, in order to revert back to normal operation.|
|Advanced Cyber Protection. Also technically known as system hardening, this licence allows minimizing the vulnerability of the systems, applying protection measures in all possible accesses susceptible to cyber attacks|
|Malware Protection. Installation and execution of antimalware solutions onto the system to prevent spread, ingression, installation, and execution of any sort of malware.|
|Penetration Testing. Security test by means of a tool which replicates common exploit methods, to assess the level of effectiveness of existing security controls and eventually find potential vulnerabilities.|
|Security Surveillance. Preventive service of inspection, testing and notification of recommended security patches to be applied in deployed critical communications systems|
|Patching and Antimalware Updating. Delivery and optional installation of recommended patches, as a result of the actions and outcomes of the Security Surveillance Service.|
|Active Directory. Attachment of Teltronic relevant components to a centralised authorisation system or directory service, so users must authenticate prior to being granted access.|
|Security Assessment & Consulting. This service aims to analyse in detail the customer topology, system vulnerabilities and main attack vectors potentially faced. After this evaluation, Teltronic will propose a set of recommendations to cybersecure the systems.|