Enterprise Cyber Security Software offers constant monitoring.

Press Release Summary:



Centered on 5 key elements (Assess, Protect, Validate, Monitor, and Train), Enterprise Security and Protection (ESP) cyber security portfolio meets needs of enterprise organizations with distributed networks by safeguarding critical business assets. Functionality identifies exploitable vulnerabilities and recommends countermeasures/corrective actions, implements protective actions, and provides quantitative measurement of security posture via ESP Validation Quotient(TM).



Original Press Release:



TeleCommunication Systems Introduces Enterprise Security & Protection Portfolio



Cyber Security Portfolio Provides Advanced Persistent Defense Against Evolving Threats

NEW ORLEANS -- (CTIA Booth: #4423) -- TeleCommunication Systems, Inc. (TCS) (NASDAQ: TSYS), a world leader in highly reliable and secure mobile communication technology, today announced the availability of its Enterprise Security & Protection (ESP) cyber security portfolio designed to meet the needs of enterprise organizations with distributed networks, including wireless operators and organizations in the energy and financial sectors.

As technology advances, so do threats to corporate IT infrastructures. A 2012 Ponemon Institute study found that the average cost of a data breach for a U.S. company was over $5 million dollars and compromised an average of 28,000 customer records. TCS' ESP portfolio provides elite cyber solutions to safeguard critical business assets and is centered on five key elements: Assess, Protect, Validate, Monitor and Train.

Key Elements:

-- Assess: Identify vulnerabilities exploitable by potential adversaries, and recommend countermeasures and corrective actions in order to prevent attacks before they happen.

-- Protect: Implement protective actions, such as policies, firewalls, intrusion detection and prevention systems and virus/adware/malware scanners to provide an effective, ongoing defense against attacks.

-- Validate: Provide an easy-to-understand quantitative measurement of an enterprise's security posture via the ESP Validation Quotient(TM).

-- Monitor: Provide an ongoing, subscription-style service that monitors the application, system and enterprise to identify new and emerging threats and to formulate recommendations for continuous improvement in security posture.

-- Train: Provide multi-level training for executives, IT professionals and end users on policies and best practices to ensure a complete, defensive cyber security stance.

Supporting Quote:

-- Drew Morin, senior vice president and chief technology officer, TCS, said: "Today's business environment demands a proactive approach to the rising number of advanced persistent threats attacking corporate IT infrastructures. Organizations are now realizing that it's no longer a question of if their network will become the next victim of a cyber attack, but when. To meet these increasing threats, TCS has expanded its offering of cyber security solutions to address the needs of enterprise organizations."

From vulnerability assessment, software engineering and information assurance, to enterprise architecture and cyber malicious activity, TCS helps harden highest-value entities, systems and networks against cyber theft. TCS provides focused training via its ESP curriculum in the fields of penetration testing, forensics-defend strategies and vulnerability analysis and ethical hacking, and brings together many of the brightest minds in security as a forum for research, collaboration and building next-generation technologies to protect critical networks.

About TeleCommunication Systems, Inc.
TeleCommunication Systems, Inc. (TCS) (NASDAQ: TSYS) is a world leader in highly reliable and secure mobile communication technology. TCS infrastructure forms the foundation for market leading solutions in E9-1-1, text messaging, commercial location and deployable wireless communications. TCS is at the forefront of new mobile cloud computing services providing wireless applications for navigation, hyper-local search, asset tracking, social applications and telematics. Millions of consumers around the world use TCS wireless apps as a fundamental part of their daily lives. Government agencies utilize TCS' cyber security expertise, professional services, and highly secure deployable satellite solutions for mission-critical communications. Headquartered in Annapolis, MD, TCS maintains technical, service and sales offices around the world. To learn more about emerging and innovative wireless technologies, visit www.telecomsys.com.

All Topics