Intrado Enterprise Cybersecurity
Delivering best of breed solutions securely and reliably for the public safety industry requires a foundation in standards and forward thinking to continuously design mitigating strategies against evolving threats.
-
Intrado establishes a dedicated team of Information Security specialists to define enterprise controls, manage security solutions, promote a security-conscious culture, and collaborate with cross-functional roles across the organization to protect core business operations from real-world cyber threats.
-
Intrado Information Security Policy and Standards align with industry frameworks (i.e., NIST, ISO and NENA), are reviewed and approved by the Chief Information Security Officer (CISO), and updated annually at minimum.
-
A third-party audits Intrado's enterprise security against the SOC 2 Type II criteria. Existing and prospective customers under confidentiality agreement can obtain a copy of the SOC 2 Type II report from their representative.
-
Standard security terms for customers are published on the intrado.com web site.
The mission of Intrado's Next Generation Information Security (NGIS) team is to fortify the organization's security posture by designing, implementing, and maintaining comprehensive cybersecurity solutions that defend against evolving threats and safeguard the integrity, confidentiality, and availability of critical information systems.

Defense in Depth
Assets are identified and inventoried.
Security measures are integrated into layers of the infrastructure, enabling comprehensive protection across systems and data flows including, but not limited to:
-
Zero trust
-
Distributed Denial of Service (DDoS) Defense
-
Telephony Denial of Service (TDoS) Defense
-
Firewalls configured to deny-by-default
-
Internal network segmentation
-
Network monitoring
-
Encryption at rest and in transit
-
Endpoint detection and response
Internal and external vulnerability scans run weekly and Intrado engages a third-party to conduct network penetration testing annually.
.webp?width=400&height=227&name=content%20(1).webp)
Personnel Security
Intrado recognizes employees as the first line of defense for securing resources.
-
Screening is conducted to verify identity, employment history, criminal history, and other factors relevant to the position
-
Individuals sign confidentiality agreements, and appropriate terms and conditions of employment, including adherence to the Code of Ethical Business Conduct, prior to obtaining access to resources
-
Security awareness and other compliance training is assigned annually and tracked for completion
-
Ongoing simulated phishing campaigns and education communications sent for real-world awareness and applicability
-
Policies and work instructions are accessible on the company intranet
-
A fair corrective action and sanctions process is established and managed through HR
.webp?width=400&height=228&name=content%20(2).webp)
Access Control
Each device and user is treated as untrusted, requiring authorization.
Intrado practices the Principle of Least Privilege (PoLP). Access to resources is restricted and granted on a need-to-know basis according to job responsibilities.
Identity access tools enforce strong passwords coupled with risk-based heuristics and conditional access policies that automatically lock accounts and/or force password reset if suspicious.
Multi-factor authentication (MFA) is enforced.
Automated workflows are in place to remove access upon exit.
Access to internal network resources is not allowed from personal devices.
.webp?width=400&height=228&name=content%20(3).webp)
Endpoint Protection
Security agents are installed on Intrado endpoints:
-
AI-powered next-generation malware and advanced threat interception
-
DNS security, including off-network devices, with website filtering, malicious domain and IP address monitoring
-
Real-time visibility and comprehensive control capabilities
-
Automated patch and security update installation
By default, users do not have local administrative rights to install or remove software or modify configurations.
Communications are filtered through protections including, but not limited to: account compromise detection, inter-org spoofing prevention, domain reputation, IP reputation, backscatter prevention, content filtering, malware and spam auto-purge, safe links URL protections, safe attachments, and data loss prevention (DLP).

Secure by Design
Security Engineers work with Product Engineers to promote secure design recommendations. A Secure by Design Framework prioritizes security with each feature development.
Intrado practices a “shift left” concept using automated tools to analyze code and remediate weaknesses during software development.
Enterprise change control process requires testing, backout plans, communication, and approvals for implementation.
Intrado maintains ISO 9001 certification for the quality management of design and development, assembly, configuration, support, data management, and network transactions for its call handling solutions.
Intrado solutions are not consumer products nor is Intrado is a data broker. See Intrado's Global Privacy Statement.

Access Control
Automated tools are deployed throughout the environment to detect and respond to security events. Logs are maintained securely and synchronized to a centralized time source on the Intrado network.
Security Analysts investigate suspicious activity in an organized and consistent approach. Threat intelligence from appropriate special interest groups, security forums and professional associations is also investigated for preventative action.
An Incident Response Plan (IRP) based on the SANS PICERL approach is maintained and distributed to incident response personnel. The Information Security team reviews the IRP at least annually and conducts exercises to identify opportunity for improvement.
Instruction for reporting potential security incidents is posted on internal intranet sites and presented in security training.