Security that meets the demands of the world's toughest customer
Keep it safe. AT&T provides customers with a broad selection of mobile devices and software, meeting the most exacting government standards for security and information management. Agencies with security and mobile device management requirements like FIPS 140-2, FISMA or DoD 8100.2 can count on AT&T for trustworthy mobile data and voice communications. We offer:
A fortified network. Firewalls separate the AT&T private network from the public Internet and protect against intrusions, from spam to brute force attacks. Our digital network allows sophisticated authentication and data encryption.
Simplified Network Architecture
FIPS 140-2 certified virtual private network solutions. AT&T works with leading providers of Virtual Private Networks (VPNs) for FIPS 140-2 certified secure transmission over landlines via frame relay or virtual private circuit. These VPN solutions allow wireless access to agency networks without compromising security.
Secure communications devices for classified mobile applications. For the most secure applications, AT&T has optimized its network for the Secure Communications Interoperability Protocol (SCIP) and HAIPE technologies, providing voiceencryption as well as wireless access to SIPRNET and other classified secure enclaves.
Productivity Tools. Full Personal Information Management (PIM) functionality includes address book, calendar and meeting manager, as well as push email with attachments.
Device security. AT&T partners with world-class device manufacturers to offer secure hardware in addition to applications. For example, Palm, Windows Mobile and BlackBerrysmartphones can be equipped with SmartCard Readers and S/MIME capabilities.
Many of our devices offer built-in security features, including restricted access via password and the ability to remotely wipe data from a device or disable it entirely. Some application vendors also provide remote security console features, allowing an administrator to remotely kill or wipe data off a device, or ensure that a user follows security policies.
Security of customer information. AT&T follows strict Customer Proprietary Network Information (CPNI) guidelines for protecting individual user privacy. All data centers are monitored 24X7 with video. And sensitive areas use electro-mechanical cipher locks to control access.
Survivability and recoverability. With hundreds of recently added cell sites, the AT&T network is designed to prevent outages and recover quickly, if needed. Emergency equipment – COWs and COLTs (Cell on Wheels and Cell on Light Truck) – is ready for immediate deployment. Agencies also have 24-hour network surveillance and a dedicated help desk.