Both on and off site, Talisman secures voice and data transmissions using industry standards and customized solutions.
All Talisman designed, installed and deployed communication and storage systems are physically secured with redundancy. They can engage non-terrestrial systems with little delay, allowing hot change-over in areas that become too dynamic for more traditional data centers and/or transmission equipment like fiber or cables. Electromagnetic shielding at all points is provided for storage arrays, input devices, processing components, repeaters and output devices. Even working memory, processor cores and transmission lines are protected against extreme electromagnetic flux. This prevents eavesdropping or intercept, maintaining confidentiality, and filters out interference providing for maximum data accessibility, integrity and uptime.
Minimum three token access systems are deployed as part of the measures to prevent identity forgery, hijacking or spoofing. Without something you have (perhaps an access card), something you know (could be a password) and something you are (various biometrics), no Talisman Protective Services communication system can begin to be accessed. Encryption, both public-private key and other forms, keeps data inaccessible to any but authorized personnel in both transmission and storage. Talisman communication systems are securing the most sensitive conversations and data for nations, companies and individuals everyday and around the world.