ESP Cyber Solutions for Public Safety

Sept. 4, 2013

TeleCommunication Systems, Inc. (TCS) introduced ESP Cyber Solutions for Public Safety, a security and protection portfolio developed by TCS' team of cyber intelligence and public safety technology experts to meet the specific needs of public safety organizations and the best practices of the industry's NG-SEC security guidelines. TCS is both a major contractor for cybersecurity training of defense and military personnel, and a leader in wireless, VoIP and next generation 9-1-1(NG9-1-1) technology.

  • IP-Based Public Safety Infrastructure: As public safety answering points (PSAPs) transition to NG9-1-1, they move from the trusted and hardened telephony to the more open, IP-based infrastructure. New mechanisms for securing this critical infrastructure are needed to ensure network security and uninterrupted availability.
  • Cyber Attacks Target PSAPs: According to theDepartment of Homeland Security, multiple jurisdictions report the increasing possibility of attacks targeting public sector IT systems. Dozens of attacks have targeted administrative PSAP lines, tying up systems from receiving legitimate calls. Similar attacks have occurred against police, ambulance and hospital communications.
  • Federal Communications Commission (FCC) Working Groups: The FCC has established three working groups within the Communications, Security,Reliability and Interoperability Council (CSRIC) to specifically investigate cybersecurity issues and their impact on the nation's public safety and telecommunications infrastructure.
  • APCO Whitepaper: The Association of Public-Safety Communications Officials (APCO) issued a security whitepaper outlining the cyber threat and the risk the nation faces if protective actions are not taken.
  • TCS' Cybersecurity for Public Safety: With more than 6,000 PSAPs and approximately 65,000 first responder agencies (police, fire, emergency medical services), there is a growing need for a comprehensive cybersecurity solution to protect this interconnected public-safety infrastructure. The ESP Cyber Solutions for Public Safety portfolio applies elite cybersecurity expertise to safeguard critical public safety assets using structured, multi-faceted services and training:
    Assess: Identify vulnerabilities exploitable by potential adversaries and recommend countermeasures and corrective actions in order to prevent attacks before they happen.
    Protect: Implement protective actions, such as policies, session border controllers, intrusion detection, prevention systems and virus/adware/malware scanners to provide an effective ongoing defense against attacks.
    Validate: Provide vulnerability assessments, penetration testing and red teaming to effectively measure the organization's security posture.
    Monitor: Provide an ongoing, subscription-style service that monitors the application, system and overall organization to identify new and emerging threats and to formulate recommendations for continuous improvement in security posture.
    Train: Provide multi-level training for leaders, IT professionals and end users on policies and best practices to ensure a complete, defensive cybersecurity stance.

ESP Cyber Solutions for Public Safety draws from TCS' expertise in secure communication technology for wireless carriers and the military, as well as the company's leadership in public safety. TCS developed and deployed the first U.S. wireless E9-1-1 solution in 1998 and today supports half of all U.S. wireless E9-1-1 calls. TCS is recognized as the leading NG9-1-1 company, based on emergency services IP network deployments [ABI Research].

From vulnerability assessment, software engineering and information assurance, to enterprise architecture and cyber malicious activity,TCS' Cyber Intelligence Grouphelps harden high-value entities, systems and networks against cyber threats. TCS provides focused training in the fields of penetration testing, forensics-defense strategies, vulnerability analysis and ethical hacking. TCS brings together many of the brightest minds in cybersecurity as a forum for research, collaboration and offering best–in-class technologies to protect critical networks.

Request More Information

By clicking above, I acknowledge and agree to Endeavor Business Media’s Terms of Service and to Endeavor Business Media's use of my contact information to communicate with me about offerings by Endeavor, its brands, affiliates and/or third-party partners, consistent with Endeavor's Privacy Policy. In addition, I understand that my personal information will be shared with any sponsor(s) of the resource, so they can contact me directly about their products or services. Please refer to the privacy policies of such sponsor(s) for more details on how your information will be used by them. You may unsubscribe at any time.

Related Content