Secure communications reality 2014-05-21

306 views

Published on

Eavesdropping and interception of sensitive information is rampant both domestically and internationally. The media now widely documents how frequently, deeply and costly information theft has become. What do you watch out for and what can you do? This is a short executive summary of concerns and Protected Mobility solutions.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
306
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Secure communications reality 2014-05-21

  1. 1. © 2014 Protected Mobility LLC Not to be copied, or distributed without written permission Protected Mobility, LLC COMMERCIALIZATION & GLOBALIZATION OF PROVEN SECURE COMMUNICATIONS Mark Lawrence VP Sales +1-917-416-6634 MarkL@ProtectedMobility.com www.ProtectedMobility.com
  2. 2. The Problem: Personal Data Security and Privacy © 2014 Protected Mobility LLC Not to be copied, or distributed without written permission  Widely held belief that the privacy of personal data and communications can no longer be ensured  Business data bases containing personal or business information are vulnerable to hackers, identity thieves and other criminals  Text messages, e-mails and other personal or business communications can be compromised in-transit or in host computers by criminals, governments and even family/friends  There is little confidence that social media chats and private postings can be restricted to the intended recipients or removed when deleted  Today’s current commercial offerings claim to address this problem really do not provide high assurance solutions to ensure data security and privacy
  3. 3. The Reality © 2014 Protected Mobility LLC Not to be copied, or distributed without written permission  Mobile devices are a target now  It is very easy for illicit and trusted groups to capture data  All data on a device is constantly vulnerable  All data sent and received on a device is vulnerable  The risk of someone getting your data is growing  Companies and Carriers can be compelled to extract information  Privacy violations are constant and difficult to monitor  Spyware can be installed remotely to a device  Current secure solutions are inadequate  Fundamental security flaws  All use centralized servers that may be compromised or can be compromised/targeted  Solutions are expensive– your privacy is just an illusion
  4. 4. The Solution: Protected Mobility © 2014 Protected Mobility LLC Not to be copied, or distributed without written permission  Proven solution for device, in-transit communications and data-at-rest protection  Hundreds of thousands of Protected Mobility products have been successfully used in a variety of applications to protect data and communications by both private and US Government organizations worldwide  Secure Messaging – SMS/MMS/Chat  US Government validated - FIPS 140-2 Certified  No NSA backdoors, visibility, or controls  Device to Device high-end Encryption – with NO SERVERS  User Friendly – can be used for both Secure and Non-Secure  Operates on all Smartphones  Optional Corporate Enterprise Control System  Secure Voice / Secure E-Mail / Secure IP Protection  Available soon
  5. 5. Protected Mobility © 2014 Protected Mobility LLC Not to be copied, or distributed without written permission  Over 350,000 apps deployed  Fully functional and fully operational  Operational for 2+ years – proven track record  ProtectedSMS - applications available on:  Google Play Store  iTunes  Blackberry Market Attach Picture, Video, File Secure Relationship Sent/Received Encrypted

×