About Sectra Communications

Similar documents
Sectra Communications ensuring security with flexibility

About Sectra Communications

PULSE SECURE FOR GOOGLE ANDROID

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

Izplatītākie mobilo iekārtu lietošanas riski, kas apdraud organizācijas datu un informācijas sistēmu drošību Raivis Kalniņš 2015, Riga

BroadSAFE Enhanced IP Phone Networks

Samsung Mobile Security

Remote Access Securing Your Employees Out of the Office

VMobile Talk User Guide

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Monitoring mobile communication network, how does it work? How to prevent such thing about that?

TETRA Security for Poland

CPA SECURITY CHARACTERISTIC SECURE VOIP CLIENT

Secure Data Exchange Solution

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Dial91 App for Windows Phone 8 Edition User Guide

SecureCom Mobile s mission is to help people keep their private communication private.

The Benefits of SSL Content Inspection ABSTRACT

Mobile Application Testing

Aegis Padlock for business

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Smartphone Hacks and Attacks: A Demonstration of Current Threats to Mobile Devices

VOIP THE ULTIMATE GUIDE VERSION /23/2014 onevoiceinc.com

AT&T Enhanced Push-to-Talk (PTT) What s New In Enhanced PTT 2.0?

Welcome to. Vodafone

Web Conferencing from Brother BOARDROOM QUALITY WEB AND VIDEO CONFERENCING MADE EASY.

Defense in Cyber Space Beating Cyber Threats that Target Mesh Networks

Secure your Privacy. jrsys, Inc. All rights reserved.

WEBARROW: A CASE STUDY OF SECURE WEB DEPLOYMENT

OfficeSuite OfficeSuite Mobile Softphone v 3.4 User Guide (Android Edition)

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Keeping SCADA Networks Open and Secure DNP3 Security

Windows Phone 8 Security Overview

Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

Mitigating the Security Risks of Unified Communications

Secure VidyoConferencing SM TECHNICAL NOTE. Protecting your communications VIDYO

Bria Android Edition User Guide

CHAPTER 1 INTRODUCTION

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

Wireless Encryption Protection

CPA SECURITY CHARACTERISTIC MIKEY-SAKKE SECURE VOIP GATEWAY

SecureAge SecureDs Data Breach Prevention Solution

MyIC setup and configuration (with sample configuration for Alcatel Lucent test environment)

SECURE COMMUNICATIONS Crypto products

Pryvate App User Manual

Crypho Security Whitepaper

Secure USB Flash Drive. Biometric & Professional Drives

ACER ProShield. Table of Contents


COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

Guideline on Safe BYOD Management

SafeNet Network Encryption Solutions Safenet High-Speed Network Encryptors Combine the Highest Performance With the Easiest Integration and

High Performance VPN Solutions Over Satellite Networks

SIP and VoIP 1 / 44. SIP and VoIP

Industrial Communication. Securing Industrial Wireless

WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise

Network Security 101 Multiple Tactics for Multi-layered Security

GoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey

Security & Encryption

Bootstrapping Secure Channels of Communication Over Public Networks

Security Considerations for DirectAccess Deployments. Whitepaper

Chapter 2 Introduction

VOICE OVER IP SECURITY

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

High Definition PoE IP Phone

Veracode White Paper The Internet of Things: Security Research Study. The Internet of Things: Security Research Study

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

Djigzo encryption. Djigzo white paper

Business Phone Security. Threats to VoIP and What to do about Them

CE Advanced Network Security VoIP Security

Professional Mobile radio. NEXIUM Wireless Mission-Critical LTE

Security and Risk Analysis of VoIP Networks

Using DigiGone Sat-Chat over BGAN. Secure Video, VoIP, IM Chat and File Transfer Version 01

BlackBerry Enterprise Solution Security Release Technical Overview

Ibrahim Yusuf Presales Engineer at Sophos Smartphones and BYOD: what are the risks and how do you manage them?

GROUPTALK FOR ANDROID VERSION for Android

3. Security Security center. Open the Settings app. Tap the Security option. Enable the option Unknown sources.

Alarm over IP. What is Alarm over IP? How does Alarm over IP work? Intrusion Systems White Paper Series Alarm over IP

Data Sheet. NCP Secure Enterprise Management. Next Generation Network Access Technology

BYOD: BRING YOUR OWN DEVICE.

Device-Centric Authentication and WebCrypto

Packet Level Authentication Overview

Product Information = = = sales@te-systems.de phone

Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS security requirement

Research Article. Research of network payment system based on multi-factor authentication

Security Issues with Integrated Smart Buildings

6 Steps to SIP trunking security. How securing your network secures your phone lines.

Data Security using Encryption in SwiftStack

Transcription:

Panthon

About Sectra Communications We provide secure communication solutions for European government authorities, defence departments and other critical functions of society. We have a solid core expertise in encryption technology and offer solutions approved at national levels as well as within the EU and NATO. Safeguarding a country s most sensitive information requires trust and expertise. Our growing number of customers and users provides us with access to a unique interface and expertise within secure communication. Therefore we can create effective security solutions for the organization as well as for the individual user. Sectra has developed and marketed security solutions since the company s inception in 1978. As an international supplier we have built up a solid core of expertise in the area of encryption technology. We know what is required to meet the tough demands of today and tomorrow.

Common threats to smartphones KGC Crypto Custodian SMC Network eavesdropping Any calls made from your phone may be transmitted unencrypted through your operator s network. This allows anyone, with or without authorized access to the network, the ability to eavesdrop on your conversations and read your text messages. Local eavesdropping Your mobile phone is always connected to the local base station with the best signal strength and can easily connect to a false base station. Your phone calls can be intercepted and recorded and your text messages manipulated.

Trojans and other malware Smartphones are susceptible to Trojans or other malicious code. A Trojan is a program that appears to contain normal functions, but in fact contains hidden programming that records information and forwards it to an attacker. Spoofing Never trust that the person on the other end of the line is who they claim to be. A hacker can easily forge your identity and gain access to sensitive information. Lost or stolen mobile phone Leaving your phone unattended for just a couple of minutes is enough time for someone to e.g install an eavesdropping microphone. And if your phone is lost or stolen, all the contact information you have stored on it is suddenly in the hands of others.

The Panthon solution

Security level Restricted Sectra Panthon is a security solution certified up to the RESTRICTED security level. Sectra Panthon is designed for the flexibility required for today s modern smart phone users and protection is easily activated. This allows you to communicate sensitive information over the mobile network without fear of interception. You can make secure calls and send secure SMS. It works seamlessly on a selection of modern smartphones. The solution functions on all major networks including 2G, 2.5G and 3G and Wi-Fi. A simple PIN code is all you need to activate the added protection and your information does not end up in the wrong hands. The solution is designed to be SCIP compatible (Secure Communications Interoperability Protocol) and approved at the RESTRICTED classification level by the Netherlands, EU and NATO.

End-to-end encryption Panthon is a hardware based solution on a Micro SD card, using end-toend encryption. The MicroSD card is loaded with keys for a specific user and user group, then permanently locked and inserted into the smartphone. Once activated, you can make calls to other Sectra Panthon users through a secure and centrally managed phonebook using VoIP packet switching technology. Phone Integrity All Sectra Panthon smartphones are equipped with our Phone Integrity solution. It reduces the attack surface for malicious applications. Lost or stolen smartphones are protected by authentication functions and a centrally managed certificate revocation to prevent unauthorized access.

Technical Specification Panthon III Security level/classification Security and encryption Pending approval for security level Restricted approved by: - NLNCSA (Dutch National Agency for Communication Security) - EU - NATO End-to-end encryption of voice and SMS with 256bit AES Hardware based secure storage of keys and certificates True random number generation Hardware accelerated crypto supported by Infineon SLE88 family smart card Crypto controller at common Criteria EAL5+ security level Hardware accelerated Elliptic Curve Cryptography (ECC) and AES co-processor PIN code for user access Certificate-based user authentication Certificate revocation (CRL) support, updated over the air Secure voice uses with ECMQV protocol and ECDSA signature scheme Text messages encrypted using pre-shared keys Encrypted databases for settings, call history, text messages, etc. Interface Phone integrity function which monitors the system for anomalies Whitelisting of approved Android applications Pending support for SCIP (Secure Communications Interoperability Protocol) The smartphone can be used as a normal smartphone for regular phone calls, etc. Automatic start of the Panthon application Group setting to allow different phonebooks for different users. Touch screen graphical user interface designed by usability experts Multi-language user interface Secure phone book with name, number, photo and comments Clear sound provided by advanced audio processing with noise filtering and acoustic echo cancellation Advanced settings protected by password Selection of special ring tones for secure voice and SMS Text message UI as a conversation view (chat) Printed users guide and built-in user instructions Functions Secure end-to-end voice (VoIP) with real-time, fullduplex operation. Very fast secure voice call setup and low audio latency Secure end-to-end text messages (SMS) Centrally managed secure phone book Software updates over-the-air

Connectivity Plattform and devices Accessories Works on 2G, 2.5G and 3G mobile networks and WiFi Optimized for mobile VoIP and international calling with VoIP tunneling technology Automatically enabled optimized 2G-mode for low bandwidth conditions Selected Android phones from major manufacturers, such as Samsung Galaxy S2, Sony Arc S, Sony Xperia Active. 2 x Additional 1000mA fast charger included (Car and wall plug)

Contact us Do you want to learn more about Panthon and discuss suitable solutions for your organization? Give us a call: +46 13 23 52 00 or visit our website to find contact information for your country manager, who will be happy to help you. communications.sectra.com