Privacy, Security and Confidentiality for Calls, Texts and Contact Lists Secure Mobile Communications.

Slides:



Advertisements
Similar presentations
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
Advertisements

Voice and Data Encryption over mobile networks July 2012 IN-NOVA TECNOLOGIC IN-ARG SA MESH VOIP.
SMBase Softbase®. Do you know? SMS text messaging is the most widely used data application on earth SMS has 2.4 billion active users world-wide representing.
Give a miss call to contact us
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Compliance storyboard: Classifying & controlling content at the input device.
OfficeTrack Mobile Employees Location Management Solution.
Handheld Contact Wireless syncing ACT! Blackberry and Windows Mobile 5/6.
IPWireless Overview Thierry Maupile Fastnet Futures April 2, 2003.
Next Generation DECT R4 for Integral Enterprise Jörg Richter.
POC Security System High security system combining PIN-on-Card, information security, physical access, control and alarm – all in one system.
BY, ARITRA GAUTAM (05-275) & G.PAVANI (05-272).. OVERVIEW OF GSM GSM (group special mobile or general system for mobile communications) is the Pan-European.
Wong Sing Chan Tsun Tat Lam Ka Shing Chan Wa Sing.
ORG. ENTITY GSM WIFI VIRTUAL SERVICE NETWORK. Support for wired and wireless networked workstations Wireless PDAs Integrated GPS VoIP Integrated Video.
Rentals from O 2 Kate Hughes 1.Introduce Rentals from O 2 2.Rental solutions for customers 3.Ordering & Support 4.Questions Content.
1 Aastra S850i Wireless Conference Phone Aastra S850i Product Summary.
IPads Everywhere! Management Considerations for the Enterprise Bill Morrison Director of Technology, Rapides Parish School District
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
Talk Time Solo Special Offer. About BT One of the leading global communications companies BT Group is a FTSE 100 company We deliver products and services.
PLANETSIM PLANETSIM is a prepaid cell phone sim card that offers low and simple international rates in roaming. Perfect for businesses large and small,
Emad Said – R&D 2013 Copyright© 2013 Corebridge NG Wireless Interactive Native Global Services ®
Lab4 Part2 Lau Ting Nga Virginia Tsang Pui Yu Wong Sin Man.
Iron Mountain’s Continuity Service ©2006 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered.
Mobile Mobile OS and Application Team: Kwok Tak Chi Law Tsz Hin So Ting Wai.
CS691 Robin Kimzey Cell Phone Security a little computer in your pocket an easy target for malcontents.
SIM Card Facts. SIM Card Form & Definition SIM is short for Subscriber Identity Module. SIM cards are small removable smart cards that are used in many.
Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed.
Proximus Push solutions Welcome Direct & BlackBerry.
Winner Follow Me Presented by Telecom Transborder Services.
Confidential Computer Systems Group HD Lock for Toshiba Notebook August 3rd, 2006.
Mobile Phone Theft. Serving our communities and protecting them from harm Introduction Mobile Phone Theft There were an estimated 742,000 victims of mobile.
A+ Certification Guide Chapter 10 Mobile Devices.
Consultant Quarterly Webinar Brice Green & Pete Ambriz 1/29/2014.
Jumpstart Your Public Sector Business Melissa Barlow Public Sector SMB Director.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Confidential and proprietary material for authorized Verizon Wireless personnel only. Use, disclosure or distribution of this material is not permitted.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
TASK A PowerPoint presentation informing you upon: Wi-Fi, 3G, WAP, Bluetooth.
MOBILE SERVICE O2 and Vodafone. In Life- Support BASIC CHECKS FOR PHONE/NETWORK ISSUES Has the customer got a signal? Ask the customer to check signal.
Confidential The Power to Connect. On-the-go presentations in client’s office and outside meeting locations are made professional and worry free. CircleMobile.
© 2009 Research In Motion Limited Advanced Java Application Development for the BlackBerry Smartphone Trainer name Date.
CONFIDENTIAL 1. 2 Designing the Intelligent Energy Gateway 2009 CONFIDENTIAL.
NETWORKS Year 12 Unit 1. Lesson objectives To understand and define What is a network? LANs and WANs The Internet, Intranet and Extranet Network Hardware.
Martin Schmidt / The Silent Revolution Mobile Java.
How to Sell T-Link TL250/300. T-Link Internet & Network Alarm Communicators Internet alarm communications for multi-branch Financial Institutions, Governments,
VSX 5000 Product Briefing July 2005 For more information, contact: 1 PC Network Inc. 1 PC Network Inc. Phone Fax
Wireless Network Security Presented by: Prabhakaran Theertharaman.
SMS Module Model : SB-DN-SMS/IP Configuration of SMS Module.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
StageNow The easy way to stage Android mobile computers from Zebra Technologies.
Wireless Telecommunications Networks personal area network (PAN) A wireless telecommunications network for device-to-device connections within a very short.
1 Wi-Fi, Wireless Broadband, Sensor & Personal Area Networks –Standards –Applications Broadband Wireless Access –WiMAX –Adapting 3G for WBA: UMTS.
The Benefits of Indigo SMS Aumne, Inc. Tel: Fax: Commerce Ct Suite 200, Lisle, IL USA.
Enabling Global IoT Connectivity. Be a part of the growth in M2M You may not realise, but the largest growth markets in the M2M arena are probably already.
Shuffle A Number For Every Occasion getshuffle.com.
THANK YOU FOR THE INTEREST IN JOINING INNOVATIVE WIRELESS, ! Innovative Wireless is a Bell Authorized dealer serving clients throughout all of Alberta.
Introduction to Zest4 M2M. Introduction Zest4 are the 1 st wholesale business to be signed via Telefonica that allows us to bring their M2M proposition.
 GPRS What’s in this slide?  Introduction to GPRS.  History  GPRS Service.  GPRS Speeds.  GPRS Mobile Devices.  Services of GPRS.  GPRS in practice.
Fixed Mobile Convergence Product is Registered Intellectual Property Rights of Coral Telecom Limited.
Websms Offers Professional Messaging Solutions via Web, , Gateway or Directly Out of Excel (Online) on the Microsoft Office 365 Platform OFFICE 365.
Mobile Device Security Management Leyna Belinsky.
Unified Communications Finding the right Mobile solution
Technology Solutions For Business
Microsoft Services Provider License Agreement Program reference card
Digital $$ Quiz Test your knowledge.
Product Overview.
Product Overview.
Presentation transcript:

Privacy, Security and Confidentiality for Calls, Texts and Contact Lists Secure Mobile Communications

The Problem The cost and complexity of intercepting mobile calls has been reducing while the range of people involved in this practice has been increasing. Calls, texts and contact lists can be compromised using relatively inexpensive and easily obtained equipment and software. Targets for mobile phone call interception are not limited to high profile individuals. Commercial and industrial businesses with valuable intellectual property to protect, financial institutions, legal firms, and public sector organisations are considered high value targets. Communicating without any form of encryption or protection is now a dangerous proposition.

Secure mobile handset in conjunction with HTC HD2 -5c handset running a hardened version of Windows mobile Complete end to end Security for Voice and SMS messages – including the Air interface. Encryption with Two levels of security AES 256 and Twofish. Cryptographic key exchange Secure and unsecure numbers – (Single SIM – Dual IMSI) Easy to use secure screen – similar to standard display Secure contacts, notes etc Remote wipe – if device lost or stolen Use your existing SIM and number (SIM needs data support) Use an Anvil SIM with a land line number Optional SiRRAN SIM has embedded SIMcrypto – Black and white lists of world wide Cells – preventing rogue Cells from acquiring your phone N.B. The device has a heartbeat connection to the SiRRAN private network. This uses around 4 to 5 megabytes a day. I hour talk time = around 1 megabyte The Solution

Third Third party Use Existing SIM (requires data plan) SIM Agnostic Solution – use your existing SIM and number for unsecure calls. Secure calling number will be supplied with the handset. Enables Corporate SIM usage In Country SIM usage Anvil SIM Aggressive rates for Voice and Data UK land line number with local area code of choice Calls in and out at land line rates SiRRAN SIMcrypto™ UK & International Roaming for exceptional coverage Embedded SIMcrypto™ application prevents acquisition by rogue cells Fixed IP (device-to-device support) Fixed / Secure APN

Handset – HTC HD2 and HD2 mini Operating System – Win Mobile 6.5 Secure Cellular core network infrastructure provided by SiRRAN 24 month contract UK Price Options – Handset Included Per Month SIM FREE – Third Party SIM, voice, data and text rates apply £ Anvil SIM – secure calls at 10p per minute, secure texts at 10p per text £ Anvil SIM – unlimited secure calls and texts within the UK £ SiRRAN SIMCrypto SIM – roaming rates for voice and data apply £ Prices exclude VAT Third party SIMs need to have data enabled