Protected Mobility Solution Overview Brief 07202011
-
Upload
mikemaurer7 -
Category
Technology
-
view
892 -
download
0
description
Transcript of Protected Mobility Solution Overview Brief 07202011
![Page 1: Protected Mobility Solution Overview Brief 07202011](https://reader034.fdocuments.us/reader034/viewer/2022051817/547bab085806b512408b4640/html5/thumbnails/1.jpg)
© 2011 Protected Mobility
Protecting Communications and Data on Mobile Devices
Cross Carrier and Cross Device Platform.
![Page 2: Protected Mobility Solution Overview Brief 07202011](https://reader034.fdocuments.us/reader034/viewer/2022051817/547bab085806b512408b4640/html5/thumbnails/2.jpg)
© 2011 Protected Mobility
The Problem
Tower
Mobile Switching Center (MSC) Message Service Center
(SMSC)
Gateway Mobile Switching Center
(GMSC)
The Cloud
Tower
= Vulnerabilities
Web server
• Lots of Mobile Devices – No Security• Lots of Apps – very little Security• Security Solutions need to be virtually invisible to the user• Security Solutions need to be downloadable from Anywhere• Lost Devices need to be wiped• Encrypted device tracker
![Page 3: Protected Mobility Solution Overview Brief 07202011](https://reader034.fdocuments.us/reader034/viewer/2022051817/547bab085806b512408b4640/html5/thumbnails/3.jpg)
© 2011 Protected Mobility
Encryption Module (can be removed and replaced to allow a company or agency to use a unique encryption)
Cryptographic interface module – Defined API’s
On Device Key Management
Ciphertext Or Special Government Only output
Transmission
“Serious Secret Sauce”
SOLUTION SETPROTECTED MOBILITY - ENCRYPTION
Your Applications
![Page 4: Protected Mobility Solution Overview Brief 07202011](https://reader034.fdocuments.us/reader034/viewer/2022051817/547bab085806b512408b4640/html5/thumbnails/4.jpg)
© 2011 Protected Mobility
Features
• Encryption which is cross platform – carrier agnostic
• Protected Information:o In Transito At Resto Stored Encrypted
• AES 256 with all the hooks for Suite B• Final Stages of FIPS 140-2 Certification• Small Size <600KB/EXTREMELY Fast• Can be place in virtually any computing device
for Encryption
![Page 5: Protected Mobility Solution Overview Brief 07202011](https://reader034.fdocuments.us/reader034/viewer/2022051817/547bab085806b512408b4640/html5/thumbnails/5.jpg)
Available now June 2011
© 2011 Protected Mobility
Solution Sets
© 2011 Protected Mobility
File Protection
SMSBlackberry/Android/
iPhone/Win7/iPads/Slates/PC/Netbook
MMS
Video Protection
Picture Protection
Enterprise Management System (EMS)
Instant Messenger
Summer 2011
Your Applications
![Page 6: Protected Mobility Solution Overview Brief 07202011](https://reader034.fdocuments.us/reader034/viewer/2022051817/547bab085806b512408b4640/html5/thumbnails/6.jpg)
© 2011 Protected Mobility
Cross Platform Security
Blackberry Android iPhone iPad
Netbook/LaptopTablets/Slates Mac PC/Linux
Windows
![Page 7: Protected Mobility Solution Overview Brief 07202011](https://reader034.fdocuments.us/reader034/viewer/2022051817/547bab085806b512408b4640/html5/thumbnails/7.jpg)
© 2011 Protected Mobility
TAKE CONTROL AND PROTECT
Consumer EnterpriseSecure SMS/MMS/File/Photo/Video/IM
On Device Keys
Web Download
Passphrase protected application
Messages/Files Stored Encrypted
Cross Platform Operations from One EMS
Dynamic Key Mgt. w/ Register and Unregister
Reset Passphrase/Pin
Secure Covert GPS Locating
On Command Wipe Messages /Files / Photos
On Command Wipe of Contacts
Broadcast to All Enterprise Users or Sub-Groups
Timed Destruction of Messages/Files/Photos
Key Archiving
Secure Message/File Disposal
Prevent Man in the Middle Attack
SIM Card Protection / Multi Card Support
![Page 8: Protected Mobility Solution Overview Brief 07202011](https://reader034.fdocuments.us/reader034/viewer/2022051817/547bab085806b512408b4640/html5/thumbnails/8.jpg)
Protected Mobility Enterprise
© 2011 Protected Mobility
Control Multiple PlatformsFrom Single Device
![Page 9: Protected Mobility Solution Overview Brief 07202011](https://reader034.fdocuments.us/reader034/viewer/2022051817/547bab085806b512408b4640/html5/thumbnails/9.jpg)
© 2011 Protected Mobility
Protected Mobility - Enterprise Communications (PMEC)
• Provides Control over active Protected Mobility Mobile Applications
• Provides control over your Enterprise Policies and Practices - o Key usage and storage including key renewalo Secure relationship managemento One to Many secure communications o Departmental or Project Specific assignmentso Adherence to Travel restrictions
![Page 10: Protected Mobility Solution Overview Brief 07202011](https://reader034.fdocuments.us/reader034/viewer/2022051817/547bab085806b512408b4640/html5/thumbnails/10.jpg)
© 2011 Protected Mobility
Enterprise Management made easy!
• Control Server (Physical or Virtual)o NOT required for Protected Mobility
messaging, only Managemento Sets and Stores Keys as well as Grouping
of Keys o Central Control for Operational Functions
• GPS/Carrier Location Reporting• Secure Message/Data Wiping• Time before Messages are securely wiped• Secure Application Wiping• Passphrase reset
o Interface to allow Auditing
![Page 11: Protected Mobility Solution Overview Brief 07202011](https://reader034.fdocuments.us/reader034/viewer/2022051817/547bab085806b512408b4640/html5/thumbnails/11.jpg)
© 2011 Protected Mobility
Enterprise Business Case Uses
• On command - Wipe Data from devices
• Interface Corp Apps to make them secure
• Auto Authenticate Users• Create a Web of Trust with Clients /
Business Partners• Send SBU information to
Commercial Devices NOW.
![Page 12: Protected Mobility Solution Overview Brief 07202011](https://reader034.fdocuments.us/reader034/viewer/2022051817/547bab085806b512408b4640/html5/thumbnails/12.jpg)
Fully Managed Enterprise Encryption - EMS
© 2011 Protected Mobility
Location
![Page 13: Protected Mobility Solution Overview Brief 07202011](https://reader034.fdocuments.us/reader034/viewer/2022051817/547bab085806b512408b4640/html5/thumbnails/13.jpg)
Optionally Create Your Own Mobile Comm Network
© 2011 Protected Mobility
Use Protected Mobility networking to ensure information does not reside anywhere that is not protected.
Your Network