Security Broker and Secure Multimedia Communications Expand TCS’ End-to-End Security Suite
ANNAPOLIS, MD–(Marketwire – Apr 23, 2012) – TeleCommunication Systems, Inc. (TCS), a world leader in highly reliable and secure mobile communication technology, today announced the expansion of its Secure the Edge portfolio with the introduction of Security Broker and Secure Multimedia Communications, creating the industry’s leading end-to-end suite of mobile broadband security applications and services for authentication, verification and notification.
As commercial and government organizations encourage remote work, provide employees with mobile devices and introduce bring your own device (BYOD) policies into the workplace, the multitude of access points to the network increases the risk of data leakage. Despite steadily increasing threats, according to Juniper Research, today, fewer than 1 in 20 smartphones and tablets have third-party security installed. Users with multiple devices are further changing the crucial “edge” point of security.
TCS has applied its broad experience in cyber security, messaging, secure communications, wireless networks and location-based services (LBS) to address these new threats and challenges. With the Secure the Edge portfolio deployed in their data centers, carriers will benefit from secure, reliable communication with location-based solutions that verify and protect multiple pathways over mobile broadband networks into cloud-based application and critical networks.
TCS Secure the Edge Portfolio:
- Security Broker provides multi-level authentication services for users who automatically connect to a carrier network to access corporate data. Security Broker centralizes authentication for mobile enterprise private network users attempting to access the network through a mobile broadband device, including a laptop air card or LTE USB dongle. This offering is delivered as a premium service through carriers and partners that offer verification services.
- Secure Multimedia Communications encrypts voice, video and machine-to-machine (M2M) data for mobile broadband communication on any device, as an end-to-end solution provided by operators for enterprise organizations and government agencies.
- Secure Location utilizes the TCS Location platform and application to verify device location in security applications. This increases resilience against fraud, enables lawful intercept and supports machine-to-machine deployments with location verification prior to and during communication.
- Secure Mobile Alerts provides timely and secure delivery of critical information before, during and after an emergency. It enables mass notification of geo-targeted information to mobile users in national, regional, campus or local environments.
More at www.telecomsys.com