SlideShare a Scribd company logo
1 of 2
Download to read offline
Defense, Space & Security
Security, modularity
and productivity
delivered in one
trusted mobile device
Boeing Black
Smartphone
The Boeing Company
7700 Boston Blvd.
Springfield, VA 22153
www.boeing.com/black
black@boeing.com
Copyright © 2014 Boeing. All rights reserved.
Android is a trademark of Google Inc.
259625
The Challenge
The U.S. defense and security communities demand
trusted access to data to accomplish their missions.
Despite the continuous innovation in commercial mobile
technology, current devices are not designed from
inception with the security and flexibility needed to match
their evolving mission and enterprise environment.
Our Solution
The Boeing Black smartphone was designed with
security and modularity in mind to ensure our customers
can use the same smartphone across a range of
missions and configurations.
SECURITY + MODULARITY = PRODUCTIVITY
Through embedded hardware security features, software
policy configurations and physical modularity, Boeing
Black gives customers a trusted, more flexible and
productive solution.
SECURITY
Boeing Black’s security is powered by the Boeing
PureSecure architecture, which was designed from the
outset for the mobile environment. Our architectural
foundation is built upon layers of trust from embedded
hardware, operating system policy controls, and
compatibility with leading mobile device management
systems. The device’s hardware roots of trust and
trusted boot ensure the device starts in a trusted
state, enabling maximum security of data. Hardware
media encryption and configurable inhibit controls are
embedded to protect the device, its data, and the
transmission of information, significantly reducing the risk
of mission compromise due to data loss.
MODULARITY
Boeing Black provides unparalleled modularity and
integration with other mobile ecosystems based on
mission-specific requirements. Boeing Black’s flexibility
is enabled by a modular expansion port. The expansion
port can be used for integrating additional sensors or
technology enhancements like satellite connectivity or
expanding power capacity, plus other customizations.
The device also includes connections for portable digital
media interface (PDMI), universal serial bus (USB) and
secure digital (SD) cards.
PRODUCTIVITY
Boeing leveraged more than 100 years of combined
IT innovation experience from across the company to
deliver a trusted and highly productive mobile solution
for both the user and device administrator. Boeing
Black has a dual-SIM capability that enables users to
switch between government and commercial networks.
Boeing Black integrates seamlessly into customer
mobile device management systems and virtual private
networks. Running an operating system for AndroidTM
with enhanced software security policy configuration,
customers can configure the device for maximum mission
productivity and security.
Security, modularity and productivity delivered in one trusted mobile device
Boeing Black Smartphone
131.9 mm
67.6 mm13.25 mm
Product Specifications
•	Display: 4.3” qHD (540 x 960 pixels)
•	Weight: 170g
•	Battery: Lithium-Ion 1590 mAh
•	Dual SIM Supported Bands:
-	 LTE 700/1700/2100
-	 WCDMA 850/1900/2100
-	 GSM 850/900/1800/1900
•	Bluetooth v2.1 + EDR-enabled connectivity
•	Dual 1.2 GHz ARM Cortex-A9 CPUs
•	Storage: On-board + microSD
•	Expansion Ports: micro USB, PDMI, Modular 24-Pin Connector
•	Security Features: Embedded FIPS 140-2 Key Storage, Hardware Inhibits,
Trusted Modules, and Configurable OS Security Policies

More Related Content

What's hot

Nokia microsoft alliance
Nokia microsoft allianceNokia microsoft alliance
Nokia microsoft allianceGurudutt Reddy
 
Smarter Phones Smarter Moves
Smarter Phones Smarter MovesSmarter Phones Smarter Moves
Smarter Phones Smarter MovesLaurent Viviez
 
Mobile application developments
Mobile application developmentsMobile application developments
Mobile application developmentsFusion Informatics
 
F2F Mobile Computing / The Frid goes mobile
F2F Mobile Computing / The Frid goes mobileF2F Mobile Computing / The Frid goes mobile
F2F Mobile Computing / The Frid goes mobileSven Kirsimäe
 
GlobalLogic Joins the Linux Foundation
GlobalLogic Joins the Linux FoundationGlobalLogic Joins the Linux Foundation
GlobalLogic Joins the Linux FoundationGlobalLogic, Inc.
 

What's hot (7)

Smartphone and their market
Smartphone and their marketSmartphone and their market
Smartphone and their market
 
Nokia microsoft alliance
Nokia microsoft allianceNokia microsoft alliance
Nokia microsoft alliance
 
Smarter Phones Smarter Moves
Smarter Phones Smarter MovesSmarter Phones Smarter Moves
Smarter Phones Smarter Moves
 
Android viswapriya viswa 1
Android viswapriya viswa 1Android viswapriya viswa 1
Android viswapriya viswa 1
 
Mobile application developments
Mobile application developmentsMobile application developments
Mobile application developments
 
F2F Mobile Computing / The Frid goes mobile
F2F Mobile Computing / The Frid goes mobileF2F Mobile Computing / The Frid goes mobile
F2F Mobile Computing / The Frid goes mobile
 
GlobalLogic Joins the Linux Foundation
GlobalLogic Joins the Linux FoundationGlobalLogic Joins the Linux Foundation
GlobalLogic Joins the Linux Foundation
 

Similar to Boeing black smartphone_product_card

Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalCleophas Kipruto
 
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationIBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationRon Favali
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_masterdakins090174
 
World's Most Secure Privacy Phones
World's Most Secure Privacy PhonesWorld's Most Secure Privacy Phones
World's Most Secure Privacy PhonesJohn Adam
 
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus KhaitanBitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus KhaitanIndus Khaitan
 
BYOD Security
BYOD SecurityBYOD Security
BYOD SecurityHexnode
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)Andris Soroka
 
How BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White PaperHow BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White PaperBlackBerry
 
BlackBerry PRIV Brochure
BlackBerry PRIV BrochureBlackBerry PRIV Brochure
BlackBerry PRIV BrochureBlackBerry
 
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld
 
Breaking down the physical boundaries between businesses
Breaking down the physical boundaries between businessesBreaking down the physical boundaries between businesses
Breaking down the physical boundaries between businessesUnified Communications Online
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
MaaS360 with Watson
MaaS360 with WatsonMaaS360 with Watson
MaaS360 with WatsonSylvia Low
 
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...BlackBerry
 
Samsung and Android Security brochure
Samsung and Android Security brochureSamsung and Android Security brochure
Samsung and Android Security brochureSherief Razzaque
 
Nexsign Biometric Authentication
Nexsign Biometric AuthenticationNexsign Biometric Authentication
Nexsign Biometric AuthenticationSamsung SDS America
 
Proximity Mobile Intelligence
Proximity Mobile IntelligenceProximity Mobile Intelligence
Proximity Mobile IntelligenceRichard Blech
 

Similar to Boeing black smartphone_product_card (20)

Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 final
 
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationIBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_master
 
World's Most Secure Privacy Phones
World's Most Secure Privacy PhonesWorld's Most Secure Privacy Phones
World's Most Secure Privacy Phones
 
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus KhaitanBitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
 
BYOD Security
BYOD SecurityBYOD Security
BYOD Security
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
 
IBM Mobile First
IBM Mobile FirstIBM Mobile First
IBM Mobile First
 
How BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White PaperHow BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White Paper
 
Breaking down physical boundaries
Breaking down physical boundariesBreaking down physical boundaries
Breaking down physical boundaries
 
Bio Star 09 Biometric Authentication
Bio Star 09 Biometric AuthenticationBio Star 09 Biometric Authentication
Bio Star 09 Biometric Authentication
 
BlackBerry PRIV Brochure
BlackBerry PRIV BrochureBlackBerry PRIV Brochure
BlackBerry PRIV Brochure
 
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
 
Breaking down the physical boundaries between businesses
Breaking down the physical boundaries between businessesBreaking down the physical boundaries between businesses
Breaking down the physical boundaries between businesses
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
MaaS360 with Watson
MaaS360 with WatsonMaaS360 with Watson
MaaS360 with Watson
 
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
 
Samsung and Android Security brochure
Samsung and Android Security brochureSamsung and Android Security brochure
Samsung and Android Security brochure
 
Nexsign Biometric Authentication
Nexsign Biometric AuthenticationNexsign Biometric Authentication
Nexsign Biometric Authentication
 
Proximity Mobile Intelligence
Proximity Mobile IntelligenceProximity Mobile Intelligence
Proximity Mobile Intelligence
 

Recently uploaded

2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 

Recently uploaded (20)

2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 

Boeing black smartphone_product_card

  • 1. Defense, Space & Security Security, modularity and productivity delivered in one trusted mobile device Boeing Black Smartphone
  • 2. The Boeing Company 7700 Boston Blvd. Springfield, VA 22153 www.boeing.com/black black@boeing.com Copyright © 2014 Boeing. All rights reserved. Android is a trademark of Google Inc. 259625 The Challenge The U.S. defense and security communities demand trusted access to data to accomplish their missions. Despite the continuous innovation in commercial mobile technology, current devices are not designed from inception with the security and flexibility needed to match their evolving mission and enterprise environment. Our Solution The Boeing Black smartphone was designed with security and modularity in mind to ensure our customers can use the same smartphone across a range of missions and configurations. SECURITY + MODULARITY = PRODUCTIVITY Through embedded hardware security features, software policy configurations and physical modularity, Boeing Black gives customers a trusted, more flexible and productive solution. SECURITY Boeing Black’s security is powered by the Boeing PureSecure architecture, which was designed from the outset for the mobile environment. Our architectural foundation is built upon layers of trust from embedded hardware, operating system policy controls, and compatibility with leading mobile device management systems. The device’s hardware roots of trust and trusted boot ensure the device starts in a trusted state, enabling maximum security of data. Hardware media encryption and configurable inhibit controls are embedded to protect the device, its data, and the transmission of information, significantly reducing the risk of mission compromise due to data loss. MODULARITY Boeing Black provides unparalleled modularity and integration with other mobile ecosystems based on mission-specific requirements. Boeing Black’s flexibility is enabled by a modular expansion port. The expansion port can be used for integrating additional sensors or technology enhancements like satellite connectivity or expanding power capacity, plus other customizations. The device also includes connections for portable digital media interface (PDMI), universal serial bus (USB) and secure digital (SD) cards. PRODUCTIVITY Boeing leveraged more than 100 years of combined IT innovation experience from across the company to deliver a trusted and highly productive mobile solution for both the user and device administrator. Boeing Black has a dual-SIM capability that enables users to switch between government and commercial networks. Boeing Black integrates seamlessly into customer mobile device management systems and virtual private networks. Running an operating system for AndroidTM with enhanced software security policy configuration, customers can configure the device for maximum mission productivity and security. Security, modularity and productivity delivered in one trusted mobile device Boeing Black Smartphone 131.9 mm 67.6 mm13.25 mm Product Specifications • Display: 4.3” qHD (540 x 960 pixels) • Weight: 170g • Battery: Lithium-Ion 1590 mAh • Dual SIM Supported Bands: - LTE 700/1700/2100 - WCDMA 850/1900/2100 - GSM 850/900/1800/1900 • Bluetooth v2.1 + EDR-enabled connectivity • Dual 1.2 GHz ARM Cortex-A9 CPUs • Storage: On-board + microSD • Expansion Ports: micro USB, PDMI, Modular 24-Pin Connector • Security Features: Embedded FIPS 140-2 Key Storage, Hardware Inhibits, Trusted Modules, and Configurable OS Security Policies