Sectra Communications ensuring security with flexibility

Similar documents
About Sectra Communications

BroadSAFE Enhanced IP Phone Networks

CPA SECURITY CHARACTERISTIC SECURE VOIP CLIENT

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Security & Encryption

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

The Benefits of SSL Content Inspection ABSTRACT

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

Mitigating the Security Risks of Unified Communications

Enhancing Organizational Security Through the Use of Virtual Smart Cards

Privacy 101. A Brief Guide

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

Packet Level Authentication Overview

Ensuring the security of your mobile business intelligence

Security and Risk Analysis of VoIP Networks

Crypho Security Whitepaper

Aegis Padlock for business

Protecting Your Organisation from Targeted Cyber Intrusion

Why Encryption is Essential to the Safety of Your Business

CPA SECURITY CHARACTERISTIC MIKEY-SAKKE SECURE VOIP GATEWAY

Secure Data Exchange Solution

SecureCom Mobile s mission is to help people keep their private communication private.

White Paper. Enhancing Website Security with Algorithm Agility

Remote Access Security

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

The Hidden Dangers of Public WiFi

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

Security. CLOUD VIDEO CONFERENCING AND CALLING Whitepaper. October Page 1 of 9

VOICE OVER IP SECURITY

Industrial Communication. Securing Industrial Wireless

Protecting your information

IDRBT Working Paper No. 11 Authentication factors for Internet banking

Guideline on Safe BYOD Management

SIP and VoIP 1 / 44. SIP and VoIP

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

FFIEC CONSUMER GUIDANCE

EasiShare Whitepaper - Empowering Your Mobile Workforce

Potential Targets - Field Devices

Guidance Regarding Skype and Other P2P VoIP Solutions

Samsung Mobile Security

Data Security using Encryption in SwiftStack

Business Phone Security. Threats to VoIP and What to do about Them

10 Quick Tips to Mobile Security

Security Architecture Whitepaper

Guide to Data Field Encryption

Information Security Awareness Training Gramm-Leach-Bliley Act (GLB Act)

National Cyber Security Month 2015: Daily Security Awareness Tips

Building A Secure Microsoft Exchange Continuity Appliance

Remote Access Securing Your Employees Out of the Office

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Steelcape Product Overview and Functional Description

Ensuring the security of your mobile business intelligence

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Network Security - ISA 656 Review

Overview of NATO Technology Trends

Security Considerations for DirectAccess Deployments. Whitepaper

Enterprise Data Protection

Deploying iphone and ipad Security Overview

Security Best Practices

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

L2 Box. Layer 2 Network encryption Verifiably secure, simple, fast.

IPv6: Network Security and the Next Generation of IP Communication

Keep Your Data Secure: Fighting Back With Flash

Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science

ipad in Business Security

Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University

Central Agency for Information Technology

Network Security 101 Multiple Tactics for Multi-layered Security

CHAPTER 1 INTRODUCTION

PrivyLink Cryptographic Key Server *

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

Wi-Fi in Healthcare:

CSC Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

Advanced Biometric Technology

WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise

BlackBerry Enterprise Solution Security Release Technical Overview

AVG AntiVirus. How does this benefit you?

Installation and usage of SSL certificates: Your guide to getting it right

SECURE COMMUNICATIONS Crypto products

CE Advanced Network Security VoIP Security

Stable and Secure Network Infrastructure Benchmarks

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

Deploying Secure Enterprise Wide IP Videoconferencing Across Virtual Private Networks

INSTANT MESSAGING SECURITY

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

Marratech Technology Whitepaper

Windows Remote Access

Transcription:

Panthon

Sectra Communications ensuring security with flexibility Sectra has more than 30 years of experience in developing secure communications. We know what is required to meet the toughest demands. Sectra s effective solutions ensure secure communications, also when operations require maximum flexibility and mobility. Our customers include European defense ministries, government authorities, and other critical functions of society. Safeguarding sensitive information requires trust and expertise. Our close cooperation with leading European security agencies is clear evidence that Sectra s solutions are considered the most secure on the market. Our expertise in encryption technology is well known and Sectra is one of the world s foremost specialists in the design and development of secure communication systems. We offer solutions approved at national levels and within the EU and NATO. Four security levels Top Secret, Secret, Confidential and Restricted define the handling of sensitive information and any potential damage that might occur should an unauthorized party gain access. Sectra Communications currently employs nearly 60 professional specialists in Sweden and in the Netherlands. The company s head office is located in Linköping, Sweden and the technology has sprung from leading researchers at Linköping University.

Don t let anyone outsmart your smartphone The advent of advanced smartphones enables us to work flexibly in a mobile environment. Unfortunately, we now face new threats that pose major security challenges for organizations. Without encryption, communications may be subject to an array of attacks. The encryption used by operators is in many cases outdated or not even enabled, and the Internet provides ample information on how to crack standard algorithms. Smartphones connect to the local base station with the best signal strength, a transmission can be directed to fraudulent base stations. Easily accessible and inexpensive equipment and free software allow hackers to set up these false base stations. Through similar deception, phone calls can be intercepted and recorded, and text messages read and even manipulated. Leaving a smartphone unattended for just a couple of minutes leaves sufficient time for someone to install malicious applications or access stored information. A lost or stolen smartphone means that contact information and privileged business data is suddenly in the hands of others. Most computers and networks are equipped with firewalls and antivirus software. But a smartphone is also susceptible to phishing or other malicious codes with hidden programming that records sensitive information and forwards data. A compromised smartphone could be used as a tool for Trojan-based eavesdropping or the transfer of sensitive information from an internal network. Smartphones are increasingly becoming targets for identity thieves. A hacker can easily gain access to a target identity and thereby gain access to sensitive information. Even worse, the contact network might be mapped. Infringements are virtually undetectable and the victim is usually unaware of the attack until the damage is done. Being aware of the risks associated with unencrypted communication is a first step. To install appropriate security solutions for the handling of sensitive or classified information is the next. With a security solution from Sectra, users can feel safe knowing that they only reach those with whom they intend to communicate.

Sectra Panthon user friendly security for smartphones User-friendly security is Sectra s top priority. With Sectra Panthon, users can safely answer calls or exchange text messages, with assurances that only intended parties are privy to the information. Sectra Panthon is a hardware-based security solution, in the form of a MicroSD card, which is installed in a smartphone. The MicroSD card is loaded with keys for a specific user and user group, then permanently locked and inserted into the smartphone. Once activated, calls can be set up to other Sectra Panthon users through a secure and centrally managed phonebook using VoIP (voice over IP) technology. The Phone Integrity solution included in Sectra Panthon not only reduces the attack surface for malicious applications, the authorization procedures will also prevent usage if the phone is stolen or misplaced. Panthon allows users to make secure calls and send text messages up to the Restricted security level. It works seamlessly on modern smartphones and users can enjoy all of the services they depend on regular phone calls, contact information, e-mail, photos, web browsing and social networks. The end-to-end encryption ensures protection from identity theft and eavesdropping. All attempts to tap into a transmission between two Panthon phones are futile since the culprit will only encounter random noise. Sectra Panthon is available for a wide selection of Android phones and tablets. It is also presently being developed for compatibility with Sectra Tiger and the NATO Secure Communications Interoperability Protocol, SCIP. This standard enables safe communications with users of other vendors security solutions.

Secure deployment process The smartphone is originally unmodified and off the shelf. Sectra erases the phone content in order to guarantee a new uncontaminated installation. The phone is equipped with the Phone Integrity solution, which strengthens the mobile phone platform and reduces vulnerability to malicious applications. Finally, the application is installed on the phone and the MicroSD card is inserted to provide the hardwarebased cryptographic functions. The personal certificate for a specific user is created and loaded in a personalization process. All keys and certificates are permanently loaded on the card. The Sectra Panthon security solution is then ready for customer delivery. End-to-end encryption Panthon uses mobile voice over IP (VoIP) technology. The calls are routed via the secure communications gateway. All Panthon users and mobile phone units in a user group are connected to, and registered at, this server. Panthon verifies that the user certificates are valid and that the two users belong to the same domain. When the secure call is established, the encryption is end-to-end and performed exclusively on the two mobile phones.

Technical specification Security level/classification Pending approval for security level Restricted by: - NLNCSA (Dutch National Agency for Communication Security) - EU - NATO Security and encryption End-to-end encryption of voice and SMS with 256bit AES Hardware based secure storage of keys and certificates True random number generation Hardware accelerated crypto on smart card Hardware accelerated Elliptic Curve Cryptography (ECC) and AES co-processor PIN code for user access Certificate-based user authentication Certificate revocation list (CRL) support, updated over the air. Secure voice uses with ECMQV protocol and ECDSA signature scheme. Text messages encrypted using pre-shared keys. Encrypted storage of settings, call history, text messages. Functions Secure end-to-end voice (VoIP) with real-time, full-duplex operation. Very fast secure voice call setup and low audio latency Secure end-to-end text messages (SMS) Centrally managed secure phone book Software updates over-the-air Phone integrity function which monitors the system for anomalies Whitelisting of Android applications Pending support for SCIP (Secure Communications Interoperability Protocol) Can be used as a normal smartphone for regular phone calls. Automatic start of the Panthon application Group setting to allow different phonebooks for different users Interface Touch screen graphical user interface designed by usability experts Multi-language user interface Secure phone book with name, number, photo and comments Clear sound provided by advanced audio processing with noise filtering and acoustic echo cancellation. Selection of special ring tones for secure voice and SMS Text message UI as a conversation view (chat) Printed users guide and built-in user instructions Connectivity Works on 2G, 2.5G and 3G mobile networks and WiFi Optimized for mobile VoIP and international calling with VoIP tunneling technology Automatically enabled optimized 2G-mode for low bandwidth conditions Platform and devices Selected Android phones from major manufacturers, such as Samsung Galaxy S2, Sony Arc S, Sony Xperia Active. Accessories 2 x Additional 1000mA fast charger included (car and wall plug)

Teknikringen 20 583 30 Linköping Sweden +46 (0)13 23 52 00 Fax: +46 (0)13 21 21 85 communications@sectra.com Sectra Communications Strandbergsgatan 61 112 51 Stockholm Sweden +46 (0)13 23 52 00 Fax: +46 (0)13 21 21 85 communications@sectra.com communications.sectra.com Prinsessegracht 3 2514 AN The Hague The Netherlands Phone: +31 (0)70 302 30 00 Fax: +31 (0)70 302 30 09 communications@sectra.nl SC-12.525-1.0eng 2012 Sectra Communications AB 1210