Возможности
Protect The Integrity of Your System
Prevent unauthorized radios and illegally cloned radios from accessing your system
Detect. Investigate. Respond.
When an authentication failure occurs, an automated alarm is sent providing you with greater visibility of your threats so you can respond faster
Seamless Authentication Interoperability
Securely store multiple authentication keys enabling personnel to seamlessly roam on neighboring systems automatically
Project 25 Standards-Based
Utilizes the P25 Link Layer Authentication standard ensuring it's over-the-air compatible with other P25 manufacturer’s equipment that incorporate the standard.