Presentation is loading. Please wait.

Presentation is loading. Please wait.

Secure Mobile Complete mobile security October 2013 Introducing a new patent pending security methodology Introducing a new patent pending security methodology.

Similar presentations


Presentation on theme: "Secure Mobile Complete mobile security October 2013 Introducing a new patent pending security methodology Introducing a new patent pending security methodology."— Presentation transcript:

1 Secure Mobile Complete mobile security October 2013 Introducing a new patent pending security methodology Introducing a new patent pending security methodology Secure Communications Situation Awareness Private Mobile Networking

2 Complete mobile securitySECURECOMMUNICATIONS Secure Voice. Secure Voice Conferencing. Secure Direct Chat (IM). Secure Group Chat(s). Secure Chat Automated Shredding. Secure Direct File Transfer. Secure Group File Transfer. Secure Contact Transfer. Secure Group Contact(s) Transfer. Secure Camera. Secure Picture Transfer. Secure Automated Picture Erase. Secure Communications Session Shredded. Secure Sessions Uniquely Encrypted. Dedicated Secured Accounts & Contacts. No Call, Chat, Transfer, Camera History. Supports: 2G, 3G, 4G WiFi Satellite Supports: Private 3G/4G Private MANET Anti-Triangulation. Multiple Accounts Supporting Multiple Network Profiles: Work / Personal Classified / SBU Multiple Contacts Profiles Only Show the Contacts Associated With The Profile Network Profile Configuration Support. User based Panic Button. Silent Panic Initiation. GPS Automated Status Transmission & Notification. Panic Administration Satellite Mapping. GPS Tracking on Another kryptofon Endpoint. OMNITrack – Team Based and/or Cascaded Regional & Global GPS Tracking. OMNITrack Integration Into Falcon View or ESRI Enterprise. C2 – Command & Controls: Beacon GPS Front/Back Camera Execution Lock Screen Disable kryptofon Wipe Accounts Information Microphone Activation Single Turnkey Solution* for… SITUATIONALAWARENESS SECURED, MOBILE, PRIVATE NETWOKING * - patent pending * - Red Team validated in 2013

3 Industry Leading Authentication and Key Management. Trusted Application Validation – Encryption is Validated On Each Launch. Is it the right app? Is it the right size? Is it one correct hardware? Is it the correct license? Is the correct user launching it? …. 1 Encryption Keys Are Highly Protected Never put in-the-air. Never put on-the-wire. Never saved on the endpoint. Never saved on a server. Used once and then destroyed. Each Communication Type (e.g. voice, chat, transfer, etc.) Uses a Unique Encryption Key. Authentication Encryption Keys 1 – Company Proprietary & Need to Know Secured Complete mobile security

4 Feature / Capability Our product Other available products Uses SRTP.NoYes AES 256 bit encryption.YesNo – SRTP defaults to AES-128 bit encryption. Implemented through RTP with unique header.No – Attack surfaces are not allowed.Yes – Allows and implements attack surface. Intermediary ZRTP devices.No – This creates an attack surface, and, attack surfaces are not allowed. Yes – Allows for intermediary eavesdropping devices between endpoints. Allow unencrypted communications if the other endpoint is not validated. NoYes – by default, SRTP allows the call goes through unencrypted. True endpoint-to-endpoint (no servers) audio security.Yes – Audio packets traverse between endpoints, not servers, and only decrypt at the endpoint. No – SRTP decrypts packets at the Session Boarder Controller(s) and SIP Server. Direct Endpoint-to-Endpoint AudioYes – Audio travels endpoint to endpoint.No – Audio travels through SBC(s) and SIP servers. Execution with program trust validationYes – Uses 5 factors of authentication at time of start up to establish trust verification. No User must enter the shared secret within a period of time.No – Uses 5 factors of authentication at time of start up to establish trust verification. Yes Require user to re-authenticate on each call.Yes – trust is not assumed based on the last communication, but on validated trust verification. Each session validates trust. No Unique key for each communication session.YesNo Keys shared over-the-air or over-the-wire.NoYes Private address bookYesNo Maintains history of calls, chat, file transfers, photos, video, etc. NoYes Integrated conference callingYesNo No security serversYesNo Private mobile network readyYesNo End-to-end Security. Is It Real?

5 Feature / Capability Our product Other available products Use standard SIP/RTP protocols delivering lightweight traffic and operates in low bandwidth global environments. YesNo Use any server on any network.YesNo – requires specific vendor dependent servers available on the internet. Supports 2G networks.YesNo – server and decryption frequency does not support low 2G throughput without 5+ seconds of latency. Supports rapidly deployable private MANET tactical deployments.YesNo Supports rapidly deployable private MANET tactical deployments with private network backhauled (microwave, satellite, etc.). YesNo Supports rapidly deployable private 3G tactical deployments.YesNo Supports rapidly deployable private 3G tactical deployments with private network backhauled (microwave, satellite, etc.). YesNo Supports multiple accounts enabling a dedicated persona.YesNo Dedicated contacts defined by active account persona.YesNo Supports both Secret and SBU profile deployments.YesNo Supports and fully interoperates on Windows, Blackberry & AndroidYesNo Remote deployment – purchase of local endpoints, local SIMs, & deploy on cell, internet, secure network or mobile 3G or MANET in less than 5 minutes. YesNo Remote provisioning – supports dedicated hardware/person implementation within 1 minute, with dedicate MDM controls. YesNo Situational awareness – panic button with hidden panic feature.YesNo Situational awareness – GPS locator.YesNo Situational awareness – integrated standalone mission Blue Force Tracking with optional FalconView & ESRI integration YesNo Situational awareness – C2 controlsYesNo Tactical Mission Deployment Support Complete mobile security

6 August 2013 Complete mobile security Unique encryption key for each chat session, even if an additional chat session is to the same person. Execute multiple chat sessions simultaneously. Execute chat while in a secure call, file transfer, secure camera execution and secure file transfer. Add & delete contacts to chat sessions on the fly. From within a chat, whisper to a member of a chat via a private chat. This chat will utilize unique private key. From within a chat, secure call to a member of a chat session while remaining in the session. This call will utilize unique private key. Send individual or group secured text chat messages to members of your contact list. Secure Chat Text Messaging

7 August 2013 Complete mobile security Take and send individual or group secured pictures with the GSS integrated secure camera. Touch n Send securely within 5 seconds. Simply select a contact, press the camera button, and shoot. If you like the preview of what was taken, press share. Touch n Store – take your secure picture saving it to secure onboard storage for later transmission. Individual or mass distribution – share to one or more individual with a single Touch n Send or Touch n Send action. Configurable for photo self destruct after sharing completes. Share other photos, or any file, on your Android with secure file sharing. Secure Camera Capture & Transfer

8 August 2013 Complete mobile security Controlling a 12 man team from a safe house, or in garrison overseeing multiple squadrons, you need SITUATIONAL AWARENESS! Situational Awareness Get GPS Location Get Pictures Take Photos Lock Display Turn on Microphone Disable Speaker Wipe User Data Disable Application Without user knowledge Panic Alert is endpoint initiated through the Panic Button or Hidden Alert. C2 provides centrally controlled functions for team leaders & administrators. CONTROL, OBTAIN INTELLIGNCE, RECOVER, & DESTROY!

9 August 2013 Complete Mobile Security Private telecommunications server Specifically designed for our server. Scalable from ,000 users. Management system. Deployed in private networks, the Internet or public or private clouds. Integrates with other servers in other private networks, on the Internet or in other public or private clouds. Warm/hot failover models available. kryptofonServer

10 August 2013 Complete Mobile Security OmniTrack – Blue Force Tracking kryptofonServer OMNITrack Encrypted comms Track location and panic alerts of team members within seconds. All communications encrypted. Physical server implemented locally, regionally or globally. Private network or Internet deployed. Administration

11 August 2013 Complete mobile security Kryptofon Server & OMNITrack Cascade Kryptofon Server and OMNITrack Servers Allowing Multi-Level Monitoring and Oversight. OMNITrack kryptofonServer OMNITrack kryptofonServer OMNITrack kryptofonServer Team AlphaTeam Gamma Team Zed Administration OMNITrack kryptofonServer HQ NOC1 or Cloud1 NOC2 or Cloud2 NOC3 or Cloud3 Encrypted comms

12 August 2013 Team Alpha Cloud Anti-Triangulation, Cascaded Kryptofon Server & OmniTrack in Secure Multi- Vendor Cloud Deployments Team Alpha in Field HQ Monitoring Team Leader Team Zed CloudTeam Zed in Field IP1 IP2 IP3 IP4 IP11 IP12 IP13 IP14 Regional N Cloud Team LeaderRegional Leader IP111 Regional S Cloud Regional E Cloud Regional W Cloud Global Cloud IP121 IP131 IP141 IP211 Secure VPN+ Container kryptofonServer + OmniTrack Cloud Providers VPN Connections GlobalField Local Regional Anti-Triangulation Deployment

13 August 2013 The Tower provides the capability of deploying a remote, mobile tactical 3G/4G network in global locations where local providers are not available The Mes provides a network of both base and repeater nodes which disseminate and propagate network traffic in a dynamic, self-healing fashion. Remote and Hidden Secure Deployments

14 GSS Global Security Solutions MIMO Repeater Field HQ Tracking WiFi kryptofon End-End Secured Communications From the Field With kryptofon on Android. To Field HQ. To Global HQ. On Self-Healing High Speed Repeating Network. Uniquely Encrypted with Every Communication. Without the Need of a Global Secure Network. 10mi MIMO Mobile Vehicle Bubble2 8mi MIMO Vest Bubble WiFi kryptofon 10mi MIMO Bubble kryptofon MIMO Repeater 10mi MIMO Mobile Vehicle Bubble Configuration Options Standalone – or Backhauled MIMO Repeater 10km

15 August 2013 FeaturesBenefits Operational Outcomes Supports 8-13 mile radius. Dynamically expandable from 2-n nodes. Self creation, self healing high speed network. High speed – up to 20 Mbps. Small – 3x5x1. Lightweight – 1.9 lbs. Optional backhaul connect via IP, satellite, microwave, Local deployment of server. Protects system with IDRS Kynetique IDS/IPS. HD audio for remote users. Enhance open mission secure communications and conference calling. Rapid secure chat and file transfer globally. Allows for team only communications. Moves Kryptofon Tower to specific geographic location for mission implementation. Allows for onsite account management based on local team needs. Stops DDOS and SIP based attacks. Global secure tactical communications anywhere in the world. Sets up in minutes. End-to-End secured communications. HQ communications and monitoring. Undetectable indigenous footprint. Rapid, mobile deployment. Land, sea, air deployment ready. Allows for adaptation of in field conditions. Maximized uptime without attack vector interruption.

16 August 2013 FeaturesBenefits Operational Outcomes Supports 1-8 km radius. Optional back-end connect via IP or satellite steady state or tactical linkage. Deployed in a remote black box container for mobile vehicle or ship deployment. Local deployment of the server. Protect system with IDRS Kynetique IDS/IPS. HD audio for remote users. Enhance open mission secure communications and conference calling. Rapid secure chat and file transfer globally. Allows for team only communications. Moves Kryptofon Tower to specific geographic location for mission implementation. Allows for onsite account management based on local team needs. Global secure tactical communications anywhere in the world. Sets up in minutes. End-to-End secured communications. HQ communications and monitoring. Undetectable indigenous footprint. Rapid, mobile deployment. Land, sea, air deployment ready. Allows for adaptation of in field conditions. Maximized uptime without attack vector interruption. GSS Tower utilizes a patent pending security methodology

17 August 2013 Base Components 3G/4G cellular base stations Kryptofon Server OMNI Track Laptop computer Internal Router Batteries All cables & interconnect components Android smartphones GSS licenses Optional Components Directional Antennas Large omnidirectional antennas Secure Mobile Communication

18 August 2013 Secure communication from a laptop The encryption software not only works with Android, it provides the same secure capabilities and more on Windows. SECURE FILE TRANSFER, CHAT SECURE MOBILE PRIVATE NETWORKING SECURE VOICE & CONFERENCING SITUATIONAL AWARENESS

19 August 2013 No matter how you do it! Its SECURE!

20 August 2013 Elite VIPEliteProBasicStarter Voice Chat File Transfer Camera BlueTrack Panic Button Command Controls Anti-Triangulation Voice Chat File Transfer Camera BlueTrack Panic Button Command Controls Voice Chat File Transfer Camera BlueTrack Panic Button Voice Chat File transfer Voice Chat The above packages come with GSS server (deployed in secure cloud or onsite) Onsite or Off-site training provided with purchase of above packages Mobile License Packages


Download ppt "Secure Mobile Complete mobile security October 2013 Introducing a new patent pending security methodology Introducing a new patent pending security methodology."

Similar presentations


Ads by Google