Скачать презентацию Secure Mobile Complete mobile security Secure Communications Situation Скачать презентацию Secure Mobile Complete mobile security Secure Communications Situation

5bb3105eecb3522350958c58dba15e7d.ppt

  • Количество слайдов: 20

Secure Mobile Complete mobile security Secure Communications Situation Awareness Private Mobile Networking October 2013 Secure Mobile Complete mobile security Secure Communications Situation Awareness Private Mobile Networking October 2013 Introducing a new patent pending security methodology

Complete mobile security Single Turnkey Solution* for… SECURE COMMUNICATIONS SITUATIONAL AWARENESS Secure Voice Conferencing. Complete mobile security Single Turnkey Solution* for… SECURE COMMUNICATIONS SITUATIONAL AWARENESS Secure Voice Conferencing. Secure Direct Chat (IM). Secure Group Chat(s). Secure Chat Automated Shredding. Secure Direct File Transfer. Secure Group File Transfer. Secure Contact Transfer. Secure Group Contact(s) Transfer. Secure Camera. Secure Picture Transfer. Secure Automated Picture Erase. Secure Communications Session Shredded. § Secure Sessions Uniquely Encrypted. § Dedicated Secured Accounts & Contacts. § No Call, Chat, Transfer, Camera History. § User based Panic Button. § Silent Panic Initiation. § GPS Automated Status Transmission & Notification. § Panic Administration Satellite Mapping. § GPS Tracking on Another kryptofon Endpoint. § OMNITrack – Team Based and/or Cascaded Regional & Global GPS Tracking. § OMNITrack Integration Into Falcon View or ESRI Enterprise. § C 2 – Command & Controls: ü Beacon GPS ü Front/Back Camera Execution ü Lock Screen ü Disable kryptofon ü Wipe Accounts Information ü Microphone Activation § § § § SECURED, MOBILE, PRIVATE NETWOKING § ü ü ü § § ü ü § Supports: 2 G, 3 G, 4 G Wi. Fi Satellite Supports: Private 3 G/4 G Private MANET Anti-Triangulation. Multiple Accounts Supporting Multiple Network Profiles: Work / Personal Classified / SBU Multiple Contacts Profiles Only Show the Contacts Associated With The Profile Network Profile Configuration Support. * - patent pending * - Red Team validated in 2013 www. global-security-solutions. com

Complete mobile security Industry Leading Authentication and Key Management. Authentication § Trusted Application Validation Complete mobile security Industry Leading Authentication and Key Management. Authentication § Trusted Application Validation – Encryption is Validated On Each Launch. Ø Is it the right app? Ø Is it the right size? Ø Is it one correct hardware? Ø Is it the correct license? Ø Is the correct user launching it? Ø …. 1 Encryption Keys § Encryption Keys Are Highly Protected Never put in-the-air. Never put on-the-wire. Never saved on the endpoint. Never saved on a server. Used once and then destroyed. § Each Communication Type (e. g. voice, chat, transfer, etc. ) Uses a Unique Encryption Key. 1 – Company Proprietary & Need to Know Secured www. global-security-solutions. com

Complete mobile security End-to-end Security. Is It Real? Feature / Capability Our product Other Complete mobile security End-to-end Security. Is It Real? Feature / Capability Our product Other available products Uses SRTP. No Yes AES 256 bit encryption. Yes No – SRTP defaults to AES-128 bit encryption. Implemented through RTP with unique header. No – Attack surfaces are not allowed. Yes – Allows and implements attack surface. Intermediary ZRTP devices. No – This creates an attack surface, and, attack surfaces are not allowed. Yes – Allows for intermediary eavesdropping devices between endpoints. Allow unencrypted communications if the other endpoint is not validated. No Yes – by default, SRTP allows the call goes through unencrypted. True endpoint-to-endpoint (no servers) audio security. Yes – Audio packets traverse between endpoints, not No – SRTP decrypts packets at the Session servers, and only decrypt at the endpoint. Boarder Controller(s) and SIP Server. Direct Endpoint-to-Endpoint Audio Yes – Audio travels endpoint to endpoint. No – Audio travels through SBC(s) and SIP servers. Execution with program trust validation Yes – Uses 5 factors of authentication at time of start up to establish trust verification. No User must enter the shared secret within a period of time. No – Uses 5 factors of authentication at time of start up to establish trust verification. Yes Require user to re-authenticate on each call. Yes – trust is not assumed based on the last communication, but on validated trust verification. Each session validates trust. No Unique key for each communication session. Yes No Keys shared over-the-air or over-the-wire. No Yes Private address book Yes No Maintains history of calls, chat, file transfers, photos, video, etc. No Yes Integrated conference calling Yes No No security servers Yes No Private mobile network ready Yes No

Complete mobile security Tactical Mission Deployment Support Feature / Capability Our product Other available Complete mobile security Tactical Mission Deployment Support Feature / Capability Our product Other available products Use standard SIP/RTP protocols delivering lightweight traffic and operates in low bandwidth global environments. Yes No Use any server on any network. Yes No – requires specific vendor dependent servers available on the internet. Supports 2 G networks. Yes No – server and decryption frequency does not support low 2 G throughput without 5+ seconds of latency. Supports rapidly deployable private MANET tactical deployments. Yes No Supports rapidly deployable private MANET tactical deployments with private Yes network backhauled (microwave, satellite, etc. ). No Supports rapidly deployable private 3 G tactical deployments. Yes No Supports rapidly deployable private 3 G tactical deployments with private network backhauled (microwave, satellite, etc. ). Yes No Supports multiple accounts enabling a dedicated persona. Yes No Dedicated contacts defined by active account persona. Yes No Supports both Secret and SBU profile deployments. Yes No Supports and fully interoperates on Windows, Blackberry & Android Yes No Remote deployment – purchase of local endpoints, local SIMs, & deploy on cell, internet, secure network or mobile 3 G or MANET in less than 5 minutes. Yes No Remote provisioning – supports dedicated hardware/person implementation within 1 minute, with dedicate MDM controls. Yes No Situational awareness – panic button with hidden panic feature. Yes No Situational awareness – GPS locator. Yes No Situational awareness – integrated standalone mission Blue Force Tracking with optional Falcon. View & ESRI integration Yes No Situational awareness – C 2 controls Yes No

Complete mobile security Secure Chat Text Messaging Send individual or group secured text chat Complete mobile security Secure Chat Text Messaging Send individual or group secured text chat messages to members of your contact list. § Unique encryption key for each chat session, even if an additional chat session is to the same person. § Execute multiple chat sessions simultaneously. § Execute chat while in a secure call, file transfer, secure camera execution and secure file transfer. § Add & delete contacts to chat sessions on the fly. § From within a chat, whisper to a member of a chat via a private chat. This chat will utilize unique private key. § From within a chat, secure call to a member of a chat session while remaining in the session. This call will utilize unique private key. August 2013

Complete mobile security Secure Camera Capture & Transfer Take and send individual or group Complete mobile security Secure Camera Capture & Transfer Take and send individual or group secured pictures with the GSS integrated secure camera. § Touch ‘n Send securely within 5 seconds. Simply select a contact, press the camera button, and shoot. If you like the preview of what was taken, press share. § Touch ‘n Store – take your secure picture saving it to secure onboard storage for later transmission. § Individual or mass distribution – share to one or more individual with a single Touch ‘n Send or Touch ‘n Send action. § Configurable for photo self destruct after sharing completes. § Share other photos, or any file, on your Android with secure file sharing. August 2013

Complete mobile security Situational Awareness Controlling a 12 man team from a safe house, Complete mobile security Situational Awareness Controlling a 12 man team from a safe house, or in garrison overseeing multiple squadrons, you need SITUATIONAL AWARENESS! § Panic Alert is endpoint initiated through the Panic Button or Hidden Alert. § C 2 provides centrally controlled functions for team leaders & administrators. CONTROL, OBTAIN INTELLIGNCE, RECOVER, & DESTROY! Get GPS Location Get Pictures Take Photos Lock Display Turn on Microphone Disable Speaker Wipe User Data Disable Application Without user knowledge August 2013

Complete Mobile Security Private telecommunications server § § § Specifically designed for our server. Complete Mobile Security Private telecommunications server § § § Specifically designed for our server. Scalable from 100 -10, 000 users. Management system. Deployed in private networks, the Internet or public or private clouds. Integrates with other servers in other private networks, on the Internet or in other public or private clouds. § Warm/hot failover models available. kryptofon. Server August 2013

Complete Mobile Security Omni. Track – Blue Force Tracking Track location and panic alerts Complete Mobile Security Omni. Track – Blue Force Tracking Track location and panic alerts of team members within seconds. § All communications encrypted. § Physical server implemented locally, regionally or globally. § Private network or Internet deployed. kryptofon. Server Encrypted comms Encrypte d comm OMNITrack s Administration August 2013

Complete mobile security Kryptofon Server & OMNITrack Cascade Kryptofon Server and OMNITrack Servers Allowing Complete mobile security Kryptofon Server & OMNITrack Cascade Kryptofon Server and OMNITrack Servers Allowing Multi-Level Monitoring and Oversight. Team Alpha kryptofon. Server ryp te mm s kryptofon. Server Encrypted comms NOC 1 or Cloud 1 OMNITrack kryptofon. Server Team Gamma Administration Encrypted comms OMNITrack NOC 2 or Cloud 2 OMNITrack kryptofon. Server Encrypted comms HQ d co Encrypted comms Administration Enc Team Zed Administration NOC 3 or Cloud 3 OMNITrack August 2013

Anti-Triangulation, Cascaded Kryptofon Server & Omni. Track in Secure Multi. Vendor Cloud Deployments Global Anti-Triangulation, Cascaded Kryptofon Server & Omni. Track in Secure Multi. Vendor Cloud Deployments Global Local Regional Field Team Alpha Cloud Team Alpha in Field IP 1 Regional Leader Regional N Cloud Team Leader IP 2 IP 111 IP 4 Regional S Cloud IP 121 Global Cloud IP 211 Team Zed Cloud Regional E Cloud IP 131 Team Leader IP 11 Team Zed in Field Anti-Triangulation Deployment IP 3 HQ Monitoring IP 12 Regional W Cloud IP 141 IP 13 Cloud Providers Secure VPN+ Container IP 14 kryptofon. Server + Omni. Track VPN Connections August 2013

Remote and Hidden Secure Deployments The Mes provides a network of both base and Remote and Hidden Secure Deployments The Mes provides a network of both base and repeater nodes which disseminate and propagate network traffic in a dynamic, self-healing fashion. The Tower provides the capability of deploying a remote, mobile tactical 3 G/4 G network in global locations where local providers are not available August 2013

10 mi MIMO Mobile Vehicle Bubble 2 8 mi MIMO Vest Bubble End-End Secured 10 mi MIMO Mobile Vehicle Bubble 2 8 mi MIMO Vest Bubble End-End Secured Communications • From the Field With kryptofon on Android. • To Field HQ. MIMO Repeater • To Global HQ. • On Self-Healing High Speed Repeating Network. Wi. Fi 10 mi MIMO Mobile Vehicle Bubble kryptofon • Uniquely Encrypted with Every Communication. • Without the Need of a Global Secure Network. MIMO Repeater 10 km 10 mi MIMO Bubble MIMO Repeater Configuration Options Field HQ • Standalone – or • Backhauled Wi. Fi kryptofon GSS Global Security Solutions Tracking

Features Benefits • Supports 8 -13 mile radius. • Dynamically expandable from 2 -n Features Benefits • Supports 8 -13 mile radius. • Dynamically expandable from 2 -n nodes. • Self creation, self healing high speed network. • High speed – up to 20 Mbps. • Small – 3”x 5”x 1”. • Lightweight – 1. 9 lbs. • Optional backhaul connect via IP, satellite, microwave, • Local deployment of server. • Protects system with IDRS Kynetique • HD audio for remote users. • Enhance open mission secure communications and conference calling. • Rapid secure chat and file transfer globally. • Allows for team only communications. • Moves Kryptofon Tower to specific geographic location for mission implementation. • Allows for onsite account management based on local team needs. • Stops DDOS and SIP Operational Outcomes • Global secure tactical communications anywhere in the world. • Sets up in minutes. • End-to-End secured communications. • HQ communications and monitoring. • Undetectable indigenous footprint. • Rapid, mobile deployment. • Land, sea, air deployment ready. • Allows for adaptation of in field conditions. • Maximized uptime without attack vector August 2013

Features Benefits • Supports 1 -8 km radius. • Optional back-end connect via IP Features Benefits • Supports 1 -8 km radius. • Optional back-end connect via IP or satellite steady state or tactical linkage. • Deployed in a remote black box container for mobile vehicle or ship deployment. • Local deployment of the server. • Protect system with IDRS Kynetique IDS/IPS. Operational Outcomes • HD audio for remote • Global secure tactical users. communications • Enhance open mission anywhere in the world. secure communications • Sets up in minutes. and conference calling. • End-to-End secured • Rapid secure chat and communications. file transfer globally. • HQ communications • Allows for team only and monitoring. communications. • Undetectable • Moves Kryptofon Tower indigenous footprint. to specific geographic • Rapid, mobile location for mission deployment. implementation. • Land, sea, air • Allows for onsite deployment ready. account management • Allows for adaptation of based on local team in field conditions. needs. • Maximized uptime GSS Tower utilizes a patent pending security methodology without attack vector August 2013

Secure Mobile Communication Base Components • • • Optional Components • Directional Antennas • Secure Mobile Communication Base Components • • • Optional Components • Directional Antennas • Large omnidirectional antennas 3 G/4 G cellular base stations Kryptofon Server OMNI Track Laptop computer Internal Router Batteries All cables & interconnect components Android smartphones GSS licenses August 2013

Secure communication from a laptop The encryption software not only works with Android, it Secure communication from a laptop The encryption software not only works with Android, it provides the same secure capabilities and more on Windows. SECURE VOICE & CONFERENCING SECURE FILE TRANSFER, CHAT SITUATIONAL AWARENESS SECURE MOBILE PRIVATE NETWORKING August 2013

No matter how you do it! It’s SECURE! August 2013 No matter how you do it! It’s SECURE! August 2013

Mobile License Packages Elite VIP Elite Pro Basic Starter Voice Voice Chat File Transfer Mobile License Packages Elite VIP Elite Pro Basic Starter Voice Voice Chat File Transfer Camera Blue. Track Panic Button Command Controls Chat File Chat transfer Anti-Triangulation The above packages come with GSS server (deployed in secure cloud or onsite) Onsite or Off-site training provided with purchase of above packages August 2013