Alarmed Carrier PDS Solutions for Military and Government

SECURE CLASSIFIED NETWORKS AND ENSURE 100% COMPLIANCE IS MET EVERY TIME

Government organizations that must comply with CCSNI 7003 can meet these strict and challenging security standards much easier with our Alarmed Carrier PDS solutions. Manage and automate the laborious and costly visual inspections and testing required for CCSNI 7003 compliance.

CENTRALLY MONITOR THREATS, AUTOMATE INSPECTIONS & RESPONSE PROCEDURES

Our Centrally Managed Alarmed Carrier PDS System is a combination of best of breed hardware and software solutions that provide uninterrupted surveillance, smart analysis, and automated responses to any disturbance. It collects and displays real-time monitoring statistics based on the severity and duration of all potential intrusion attempts.

COMMON CHALLENGES With PROTECTED DISTRIBUTION SYSTEMS (PDS)

These are the challenges that most military sites face with traditional PDS systems when it comes to inspections and security.
  1. Rigorous regular inspections require heavy manpower. With government agencies operating on reduced budgets, it’s difficult to staff during weekends and holidays, not to mention getting a response team to an alarm site within the mandatory 15 minutes during off-hours.
  2. The phrase “human error” exists for a reason. Manual inspections can result in inaccuracies on inspection forms.
  3. Most PDS systems use encryption, which slows down their bandwidth and decreases productivity.

SOLVE TRADITIONAL PDS PROBLEMS With OUR SCALEABLE SOLUTIONS

By installing continuous surveillance of your classified network infrastructure and automating inspections, you can eliminate errors, ensure all inspections are passed and save on costs over time.

OUR Alarmed Carrier PDS SOLUTIONS Provide:

REAL-TIME DASHBOARD – ACCESSIBLE REMOTELY

TIME-STAMPED INSPECTION DOCUMENTATION

Automatic data disablement to alarmed zone

OPTICAL WARNING SYSTEM – USER-CONFIGURABLE THRESHOLDS

IMMEDIATE ALARM DISPATCHING

GRAPHICAL REPRESENTATION OF DISTURBANCES IN REAL-TIME

The Technology Behind Our Alarmed Carrier PDS Solution

Our hardware, software, and cyber sensor components work together to meet your security challenges and ensure you achieve CNSSI 7003 compliance.

CyberSecure IMSTM

All information is processed by our Infrastructure Monitoring System, the brain of the solution. IMS keeps time-stamped documentation, generates case files, alerts the response team, controls data flow to the alarmed zones and sends notifications to all necessary partisequat.

Interceptor CSTM

Optical Network Security System which detects movement of alarmed fibers. Monitors spare strands of dark fibers within optical cables to ensure integrity and availability of network data. Can be auto-configured to monitor a wide variety of new or existing infrastructures and architectures.

CyberSensor ControllerTM

High-speed monitoring of a full range of optical Cyber Sensors. Support up to 16 channels, each of which supports up to 50 sensors. Provides real-time alerts.

StoplightTM

Fiber optic panel that automatically performs alarm circuit verification required by CNSSI 7003 for any size building. Includes software-controlled ability to disable classified data. Sends out customized reports after each periodic test. Capable of random scheduled testing. Out-of-band and non-intrusive.

Fiber ForensicsTM

CyberSecure’s Fiber ForensicsTM technology provides alarm response dispatchers with an optical intrusion severity chart to allow the dispatchers to respond according to the severity of the optical intrusion.

The Fiber Forensics chart measures specific metrics that correlate directly to fiber tap techniques to determine the severity of all optical intrusion attempts.

Duration of the optical intrusion (Time)

The change in light within the alarmed fibers (DB Change)

The number of vibrations that occur during an optical intrusion attempt

SEE HOW THE ALARMED CARRIER PDS WORKS

LET US BRING YOU PEACE OF MIND

Our 24/7/365 continuous monitoring immediately detects and reports every disturbance from the slightest bumps to the most sophisticated data theft attempts. We customize our technology to work for you, setting Site-Specific Operating Procedures for every client.