KoolSpan Comparison to CellCrypt

Slides:



Advertisements
Similar presentations
User Authentication on Mobile Devices Google Two Factor Authentication OTP (One Time Password)
Advertisements

Voice and Data Encryption over mobile networks July 2012 IN-NOVA TECNOLOGIC IN-ARG SA MESH VOIP.
Facts about Welcome to this video from Ozeki. In this video I will present what makes Ozeki Phone System XE the Worlds best on-site software PBX for Windows.
McAfee One Time Password
310KM M-Commerce Application Selection of Mobile Platform Group 4 Choy Chun Lung, Lawrence Hui Yiu Ting, Eddy Chan Ki Yin, CKY Liu Tsz Ping, Scott.
Intro to Android and iOS CS-328 Dick Steflik. The Players Android – Open source mobile OS developed ny the Open Handset Alliance led by Google. Based.
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
Information Security Level 2 – Sensitive © 2012 – Proprietary and Confidential Information of Amdocs Amdocs Unified Communications solution.
310km Lab4 Presentation. Comparison between mobile OS Palm OS Blackberry Os Windows Mobile Symbian i OS Android.
Mobile Security 310KM Lab 4 Group Presentation NG KING TUNG MA HO YIN CHE CHUN KIT WOO SHUN CHAK.
Avaya – Proprietary. Use pursuant to the terms of your signed agreement or Company policy. idEngines® Avaya Identity Engines And Mobile Device Management.
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
Nokia Research Center Usable Security for Smartphones Cynthia Kuo Senior Researcher October 26,
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Lab4 Part2 Lau Ting Nga Virginia Tsang Pui Yu Wong Sin Man.
310KM Mobile Commerce Applications Lab/Tutorial 1 Zeturl Ho ( )
Mobile Data Management (MDM) July 24, 2013 Lance M. Calisch.
Chung Man Ho Willims Chow Man Kei Gary Kwok Pak Wai Lion.
310KM Mobile Commerce Applications Lab/Tutorial 4 Part 3 Team members: Li Chun Yin Pun Hoi Lam Shek Hin Shing.
Student Name: Group.  Developed by Microsoft  Alliance with Nokia in 2011  4 main functions:  Outlook Mobile  Windows Media Player for Windows Mobile.
Mobile Mobile OS and Application Team: Kwok Tak Chi Law Tsz Hin So Ting Wai.
Research of difference OS for authentication and encryption Group member:Li Man Yiu Tsun Yu Hin Wong Nok Wai.
1 © Skype Confidential. 1 Skype for Business Save time. Save money. Stay ahead. Matthew Jordan Enterprise Business Development Manager, Skype for.
IPhone SDK and Enterprise Peter Wood. Enterprise Upcoming iPhone support for Microsoft Exchange ActiveSync and industry-standard corporate security measures.
SMARTPHONE OPERATION SYSTEM MARKET IN U.S. Ryan (Jang-Hoon) Doo ISM 158.
Be there without going there. Microsoft Lync is an enterprise-ready, unified communications platform that connects users everywhere, providing a consistent,
SELECTING TABLETS FOR ENTERPRISE USE TABLET COMPUTER SELECTION.
Mobile Handset Hardware Architecture
Apps VS Mobile Websites Which is better?. Bizness Apps Survey Bizness Apps surveyed over 500 small business owners with both a mobile app and a mobile.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
© Aastra – 2013 BluStar for iPad / iPhone September 2013 BluStar for iPad/iPhone.
Real Security InterSwyft Technical information's.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Mobile Operating System Security A PRESENTATION BY DANIEL ADAMS CSC 345 DR. BOX.
 Security and Smartphones By Parker Moore. The Smartphone Takeover  Half of mobile phone subscribers in the United States have a smartphone.  An estimated.
Making the Internet a Better Place for Business NIST PKI Steering Committee March 14, 2002.
1 NETE4631 Mobile Cloud Computing Lecture Notes #10.
Confidential The Power to Connect. On-the-go presentations in client’s office and outside meeting locations are made professional and worry free. CircleMobile.
CHIEF EXECUTIVE OFFICER KoolSpan, The Trust Company.
Windows Reimagine d Windows 8 Data explosion Browser-based apps Natural interaction Ubiquitous connectivity Personal devices in the.
RIOS Overview Overall classification of this brief is UNCLASSIFIED.
May l Washington, DC l Omni Shoreham iPhone 2.0, BlackBerry and Windows Mobile Smart-Phone Hosting without Exchange and BES John Davies President.
Presented by Team Alpha MOBILE DEVICE SECURITY 1.
Mobile Finance Manager ™ - MFM Chris Doner & Mark Barish Access Softek, Inc.
Mobile Platforms. Competitive Landscape Operating Systems iPhone BlackBerry Windows Mobile Android Symbian.
By J.T. Ascoli Dan Winters Ronnie Gillespie Dan Heinrichs.
Operating Systems for Wireless Mobile Devices Dr. Tal Lavian UC Berkeley Engineering, CET Why does.
Mobilize employees, field workers, and business partners with layered security infrastructure for mobile apps, Fiori apps, content, and devices Andreas.
Mobile device management
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
Consumerization of IT Microsoft in the Enterprise.
Wireless and Mobile Security
Luis Avila Tics. We have to recognize all the operating systems we have nowadays in the different smartphones Blackberry: Bb OS Iphone: iOS Nokia: symbian.
Introducing the Smartphone Pentesting Framework Georgia Weidman Bulb Security LLC Approved for Public Release, Distribution Unlimited.
Easy-to-Use RedFlag System Delivers Notifications via Phone, , Text, Social Media, and More to Improve Effectiveness of Your Communications COMPANY.
Lync Online - Overview. | Copyright© 2010 Microsoft Corporation Lync Online – Key Features & Benefits At Launch IM, Lync-to-Lync audio and video (including.
Technical Sales Specialist Software - OS and Applications John R. Moegling Sr. Systems Engineer.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security VPN R75 (SecureClient Next Generation)
Nextiva UCaaS. 2 Nextiva Proprietary and Confidential, do not copy, duplicate or distribute. Nextiva.com Transition to Emerging Technologies Today Many.
Mobile Device Security Threats Christina Blakley Host Computer Security.
© 2012 IBM Corporation IBM Worklight Overview Martin Triska – IBM Worklight specialist (420) July 2012.
Anatomy of a Smartphone Matthew Vartabedian (708)
1 1 Social Security Platform James Wu We Simplify Security.
Integrating Lawful Hacking with NiceTrack Target360° Daniele Milan, Hacking Team Omri Kletter, NICE Systems.
Unlicensed Mobile Access (UMA ) Introduction and Overview Andrew Santarelli David Schraitle Matt Eberts Miguel Ibarra Mohammed Shareef.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Mobile Computing Lecture#01 Mobile Horizon. Leading Mobile Phone Technologies  iOS  Android  Blackberry  Symbian  Windows Phone  J2ME.
Fundamentals of Information Systems, Sixth Edition
Overview Mobile Device / Smartphone Market Share
Microsoft Services Provider License Agreement Program reference card
Presentation transcript:

KoolSpan Comparison to CellCrypt

TrustChip Key Facts Hardware based encryption (Crypto at the Core) 32 Bit ARM processor (encryption engine) Self-contained design insulates it from attacks mounted on its host device FIPS 140-2 validated No over-the-air key exchange Peer-to-peer authentication; No man-in-the-middle Unique 256 AES key for every bit (1,024 keys per TrustGroup) Standards Based MicroSD Card form factor Application independent Multi-application support Operating System independent Device independent Network independent Remotely manageable

TrustChip Strengths Multiple Platforms Robust Functionality Android Blackberry Windows Mobile (Old WinMo 5 and 6) iPhone in Nov/Dec 2012 Robust Functionality Secure voice, text, file transfer, applications Development Kit TDK provides developers with the tools to integrate their applications with the TrustChip ShareFile 1st on the market with this capability

TrustChip Strengths Security of Encryption Keys Keys are stored securely in hardware (software vulnerable to attack) Low Battery Consumption Uses battery power only during encyption/decryption (software draws power the whole time) TrustChip Processing Power Capability of a 32 Bit ARM processor Secure Calls Become VOIP With unlimited data plan no roaming charges Calls can be made purely on WiFi networks

Cellcrypt Koolspan has replaced them at many places Cellcrypt has had unsuccessful demo’s due to their poor functionality Pricepoint is 5 times TrustChip on average Cellcrypt bribed a UK MOD official and Israel stole their IP Does not perform Secure Text or ShareFile No ability for integrators to develop apps Inherent vulnerabilities of software encryption

Threat Overview Cellcrypt Major partners include Advertised as, “ the leading provider of military-grade voice call encryption on everyday smartphones. Governments and corporate enterprises use its flagship product - Cellcrypt Mobile™ - worldwide.” Focus is: Secure Voice via software. Goal – Seamlessly call between multiple cell phone types on different networks, as well as between multiple office PBX system types Yes - secure voice No - secure SMS Text Downloadable application (Software based only) FIPS 140-2 Validated Support for Android, BlackBerry, iOS4 and Symbian S60 (Nokia E and N Series) Major partners include No partner information listed on their website

Support for BlackBerry Threat Overview Capability Comparison Company   Secure Voice Secure Text Hardware Based Crypto FIPS 140-2 Support for Android Support for BlackBerry Support for WinMo Support for Apple iOS KoolSpan Yes No CellCrypt Yes iOS4