Upload
mikemaurer7
View
893
Download
0
Embed Size (px)
DESCRIPTION
Protected Mobility secures smartphone communications for Android, iPhone, iPad, and Blackberry worldwide on any network for business and personal communications.
Citation preview
© 2011 Protected Mobility
Protecting Communications and Data on Mobile Devices
Cross Carrier and Cross Device Platform.
© 2011 Protected Mobility
The Problem
Tower
Mobile Switching Center (MSC) Message Service Center
(SMSC)
Gateway Mobile Switching Center
(GMSC)
The Cloud
Tower
= Vulnerabilities
Web server
• Lots of Mobile Devices – No Security• Lots of Apps – very little Security• Security Solutions need to be virtually invisible to the user• Security Solutions need to be downloadable from Anywhere• Lost Devices need to be wiped• Encrypted device tracker
© 2011 Protected Mobility
Encryption Module (can be removed and replaced to allow a company or agency to use a unique encryption)
Cryptographic interface module – Defined API’s
On Device Key Management
Ciphertext Or Special Government Only output
Transmission
“Serious Secret Sauce”
SOLUTION SETPROTECTED MOBILITY - ENCRYPTION
Your Applications
© 2011 Protected Mobility
Features
• Encryption which is cross platform – carrier agnostic
• Protected Information:o In Transito At Resto Stored Encrypted
• AES 256 with all the hooks for Suite B• Final Stages of FIPS 140-2 Certification• Small Size <600KB/EXTREMELY Fast• Can be place in virtually any computing device
for Encryption
Available now June 2011
© 2011 Protected Mobility
Solution Sets
© 2011 Protected Mobility
File Protection
SMSBlackberry/Android/
iPhone/Win7/iPads/Slates/PC/Netbook
MMS
Video Protection
Picture Protection
Enterprise Management System (EMS)
Instant Messenger
Summer 2011
Your Applications
© 2011 Protected Mobility
Cross Platform Security
Blackberry Android iPhone iPad
Netbook/LaptopTablets/Slates Mac PC/Linux
Windows
© 2011 Protected Mobility
TAKE CONTROL AND PROTECT
Consumer EnterpriseSecure SMS/MMS/File/Photo/Video/IM
On Device Keys
Web Download
Passphrase protected application
Messages/Files Stored Encrypted
Cross Platform Operations from One EMS
Dynamic Key Mgt. w/ Register and Unregister
Reset Passphrase/Pin
Secure Covert GPS Locating
On Command Wipe Messages /Files / Photos
On Command Wipe of Contacts
Broadcast to All Enterprise Users or Sub-Groups
Timed Destruction of Messages/Files/Photos
Key Archiving
Secure Message/File Disposal
Prevent Man in the Middle Attack
SIM Card Protection / Multi Card Support
Protected Mobility Enterprise
© 2011 Protected Mobility
Control Multiple PlatformsFrom Single Device
© 2011 Protected Mobility
Protected Mobility - Enterprise Communications (PMEC)
• Provides Control over active Protected Mobility Mobile Applications
• Provides control over your Enterprise Policies and Practices - o Key usage and storage including key renewalo Secure relationship managemento One to Many secure communications o Departmental or Project Specific assignmentso Adherence to Travel restrictions
© 2011 Protected Mobility
Enterprise Management made easy!
• Control Server (Physical or Virtual)o NOT required for Protected Mobility
messaging, only Managemento Sets and Stores Keys as well as Grouping
of Keys o Central Control for Operational Functions
• GPS/Carrier Location Reporting• Secure Message/Data Wiping• Time before Messages are securely wiped• Secure Application Wiping• Passphrase reset
o Interface to allow Auditing
© 2011 Protected Mobility
Enterprise Business Case Uses
• On command - Wipe Data from devices
• Interface Corp Apps to make them secure
• Auto Authenticate Users• Create a Web of Trust with Clients /
Business Partners• Send SBU information to
Commercial Devices NOW.
Fully Managed Enterprise Encryption - EMS
© 2011 Protected Mobility
Location
Optionally Create Your Own Mobile Comm Network
© 2011 Protected Mobility
Use Protected Mobility networking to ensure information does not reside anywhere that is not protected.
Your Network