SlideShare a Scribd company logo
1 of 2
Download to read offline
tOur goal is simple.
FortressFone™
Secure Smartphone Terminal
Mobile security solution based on SAMSUNG Smartphones (iOS soon to be released) for the protection of
voice and data communications over IP cellular networks.
FortressFone™ combines security features with technology performances of the latest generation mobile
phones in a single terminal of reduced dimensions and weight. Besides the standard functions of the most
sophisticated mobile telephones FortressFone™ ensures good voice quality even in secure communication
mode.
Featuring a removable internal security token based on a MicroSD, for the storage of algorithms and sensitive
data. FortressFone™ implements enhanced security mechanisms to guarantee the separation of security
services and mobile applications.
The generation and distribution of the security parameters as well as the unit configuration files are tasks
completed by the Key management center.
We accomplish this objective by tracking down cutting
edge security technology from around the globe. We
screen powerful, customizable security capabilities that
solve persistent and rapidly evolving problems in the
marketplace.
Protect government, enterprise and individuals
from being exploited by foreign and domestic
adversaries and criminals.
Our goal is simple
PROTECT!
FortressFone™Technologies
FortressFone™ Specifications
GENERAL
Applications
 Digital high-level security for voice and data communications.
 End-to-end protection of voice communications.
 Secure data communications by means of a VPN connection to the FortressFone Secure Cloud System providing email exchange and file
transfer.
Features
 Based on the Android operating system.
 Unit configuration by means of a dedicated Management System.
 Configuration files stored on removable security token (MicroSD).
 Operation over:
o 3G UMT mobile IP networks
o 2G GSM EDGE mobile IP networks
o Wireless broadband IP networks
o IP satellite channels (i.e. INMARSAT, VSAT terminals)
o Interoperable with secure desk phone
 Secure SMS.
Voice Communication
 Clear Mode Operations:
o Full duplex communication to standard GSM telephones
o Clear call to standard VoIP telephones
 Secure Mode Operations:
o Full-duplex communication with clear like quality
o In-band proprietary security protocols
 Vocoders:
o G.729 for clear mode operation to standard VoIP telephones
o Proprietary clear like vocoder for crypto mode
 Protocol:
o SIP (RFC326), STUN (RFC 1889), SDP (RFC 4566)
o In-band proprietary security protocol
Data Communication
 Secure mode operations.
 Data transfer.
 Data transfer available also during voice calls.
Communication Interfaces
 USB v2.0 (locked to enhance unit security).
 Bluetooth v3.0+HS (lockable on demand).
 Wi-Fi a/b/g/n (lockable on demand).
 Internal RF GSM/UMTS radio module.
CRYPTOLOGY AND SECURITY
Encryption Algorithm
 AE 256 standard algorithm.
 Custom algorithms available on request.
Physical Random Noise Generator Security Token
 According to FIPS PUB 140-2.
 ISO7816 smartcard controlled located inside a Micro SD memory card.
 Certified according to Common Criteria EAL 5+.
Key Management
 Key and configuration files generation via management system.
 Off-line key distribution via security token (MicroSD).
Access Control Security Mechanism
 Two factor authentication to the security token by means of password.
 Advanced security mechanisms to guarantee the separation of the security services and the mobile applications.
 Security mechanisms to strengthen Android operating system.
 Zeroize by a software dedicated function.
TELEPHONE FUNCTIONS
Operating mode
 Clear call to standard GSM telephones.
 Clear call to standard VoIP telephones.
 Automatic crypto call at call answering.
 Secure data transfer.
 Simultaneous voice call and data transfer.
Telephone Features
 Based on standard smartphone experience.
APPROVALS
 CE, FIPS 140-2 level 1 (FIPS 1648).
FortressFone™Technologies

More Related Content

What's hot

Voice encryption for gsm using arduino
Voice encryption for gsm using arduinoVoice encryption for gsm using arduino
Voice encryption for gsm using arduinoiruldaworld
 
Telephone Recorder (Buy or Rent!)
Telephone Recorder (Buy or Rent!)Telephone Recorder (Buy or Rent!)
Telephone Recorder (Buy or Rent!)dplsurve
 
Product Overview: April 2015 (Si3D)
Product Overview: April 2015 (Si3D)Product Overview: April 2015 (Si3D)
Product Overview: April 2015 (Si3D)SI3D systems
 
YubiKey 5 NFC
YubiKey 5 NFCYubiKey 5 NFC
YubiKey 5 NFCWJN
 
475 low power cellular jammer
475 low power cellular  jammer475 low power cellular  jammer
475 low power cellular jammerriskis
 
T 6700 series four channel ip network audio adapter (rack mount) t-6704
T 6700 series four channel ip network audio adapter (rack mount) t-6704T 6700 series four channel ip network audio adapter (rack mount) t-6704
T 6700 series four channel ip network audio adapter (rack mount) t-6704Trimatrik Multimedia
 
Internet terminology and VOIP protocol
Internet terminology and VOIP protocolInternet terminology and VOIP protocol
Internet terminology and VOIP protocolArchana Dwivedi
 
5G The Vast Technology
5G The Vast Technology 5G The Vast Technology
5G The Vast Technology Gautam Angrish
 
Bl r5931 mb1-specification-www.ttbvs.com
Bl r5931 mb1-specification-www.ttbvs.comBl r5931 mb1-specification-www.ttbvs.com
Bl r5931 mb1-specification-www.ttbvs.comTTBVS
 
Honeywell 6160 v-brochure
Honeywell 6160 v-brochureHoneywell 6160 v-brochure
Honeywell 6160 v-brochureAlarm Grid
 
VX 520 terminal data sheet
VX 520 terminal data sheetVX 520 terminal data sheet
VX 520 terminal data sheetKen Givens
 
ZKTeco iclock4000-G Bangladesh (01785-777722)
ZKTeco iclock4000-G Bangladesh (01785-777722)ZKTeco iclock4000-G Bangladesh (01785-777722)
ZKTeco iclock4000-G Bangladesh (01785-777722)Trimatrik Multimedia
 

What's hot (18)

Voice encryption for gsm using arduino
Voice encryption for gsm using arduinoVoice encryption for gsm using arduino
Voice encryption for gsm using arduino
 
IP Intercoms & Paging System - 2N
IP Intercoms & Paging System - 2N IP Intercoms & Paging System - 2N
IP Intercoms & Paging System - 2N
 
Telephone Recorder (Buy or Rent!)
Telephone Recorder (Buy or Rent!)Telephone Recorder (Buy or Rent!)
Telephone Recorder (Buy or Rent!)
 
Product Overview: April 2015 (Si3D)
Product Overview: April 2015 (Si3D)Product Overview: April 2015 (Si3D)
Product Overview: April 2015 (Si3D)
 
YubiKey 5 NFC
YubiKey 5 NFCYubiKey 5 NFC
YubiKey 5 NFC
 
475 low power cellular jammer
475 low power cellular  jammer475 low power cellular  jammer
475 low power cellular jammer
 
Ippbx for apartment
Ippbx for apartmentIppbx for apartment
Ippbx for apartment
 
T 6700 series four channel ip network audio adapter (rack mount) t-6704
T 6700 series four channel ip network audio adapter (rack mount) t-6704T 6700 series four channel ip network audio adapter (rack mount) t-6704
T 6700 series four channel ip network audio adapter (rack mount) t-6704
 
Internet terminology and VOIP protocol
Internet terminology and VOIP protocolInternet terminology and VOIP protocol
Internet terminology and VOIP protocol
 
5G The Vast Technology
5G The Vast Technology 5G The Vast Technology
5G The Vast Technology
 
SBC: Do I really need it?
SBC: Do I really need it?SBC: Do I really need it?
SBC: Do I really need it?
 
Bl r5931 mb1-specification-www.ttbvs.com
Bl r5931 mb1-specification-www.ttbvs.comBl r5931 mb1-specification-www.ttbvs.com
Bl r5931 mb1-specification-www.ttbvs.com
 
Honeywell 6160 v-brochure
Honeywell 6160 v-brochureHoneywell 6160 v-brochure
Honeywell 6160 v-brochure
 
Hotel locks-e790-brochure
Hotel locks-e790-brochureHotel locks-e790-brochure
Hotel locks-e790-brochure
 
VX 520 terminal data sheet
VX 520 terminal data sheetVX 520 terminal data sheet
VX 520 terminal data sheet
 
ZKTeco iclock4000-G Bangladesh (01785-777722)
ZKTeco iclock4000-G Bangladesh (01785-777722)ZKTeco iclock4000-G Bangladesh (01785-777722)
ZKTeco iclock4000-G Bangladesh (01785-777722)
 
Astricon 2016
Astricon 2016Astricon 2016
Astricon 2016
 
Accessories
AccessoriesAccessories
Accessories
 

Similar to FortressFone Technologies Leave Behind 01282015

Cellcrypt Mobile for iPhone
Cellcrypt Mobile for iPhoneCellcrypt Mobile for iPhone
Cellcrypt Mobile for iPhoneCellcrypt
 
World's Most Secure Privacy Phones
World's Most Secure Privacy PhonesWorld's Most Secure Privacy Phones
World's Most Secure Privacy PhonesJohn Adam
 
Digigone Overview 080109
Digigone Overview 080109Digigone Overview 080109
Digigone Overview 080109Diginonymous
 
Voip Phone System for Small Businesses
Voip Phone System for Small BusinessesVoip Phone System for Small Businesses
Voip Phone System for Small BusinessesMatrix ComSec
 
Sectechbiz Is A Uae Based Company
Sectechbiz Is A Uae Based CompanySectechbiz Is A Uae Based Company
Sectechbiz Is A Uae Based CompanySectechbiz
 
Voice securityprotocol review
Voice securityprotocol reviewVoice securityprotocol review
Voice securityprotocol reviewFabio Pietrosanti
 
Phone for Enterprises Business Corporations Governments
Phone for Enterprises Business Corporations GovernmentsPhone for Enterprises Business Corporations Governments
Phone for Enterprises Business Corporations GovernmentsJohn Adam
 
Mobile Security Blanco/Ueda
Mobile Security Blanco/UedaMobile Security Blanco/Ueda
Mobile Security Blanco/UedaFernando Blanco
 
Snom_Webinar_EN_160225
Snom_Webinar_EN_160225Snom_Webinar_EN_160225
Snom_Webinar_EN_160225Michiel Top
 
Mogul Wave VoIP Cloud Services
Mogul Wave VoIP Cloud ServicesMogul Wave VoIP Cloud Services
Mogul Wave VoIP Cloud ServicesLinda Kirkland
 
Technical Sheet - PrivateGSM VoIP - english
Technical Sheet - PrivateGSM VoIP - englishTechnical Sheet - PrivateGSM VoIP - english
Technical Sheet - PrivateGSM VoIP - englishPrivateWave Italia SpA
 

Similar to FortressFone Technologies Leave Behind 01282015 (20)

ESET_MOBILE_SECURITY_business--edition
ESET_MOBILE_SECURITY_business--editionESET_MOBILE_SECURITY_business--edition
ESET_MOBILE_SECURITY_business--edition
 
Cellcrypt Mobile for iPhone
Cellcrypt Mobile for iPhoneCellcrypt Mobile for iPhone
Cellcrypt Mobile for iPhone
 
World's Most Secure Privacy Phones
World's Most Secure Privacy PhonesWorld's Most Secure Privacy Phones
World's Most Secure Privacy Phones
 
Digigone Overview 080109
Digigone Overview 080109Digigone Overview 080109
Digigone Overview 080109
 
Voip Phone System for Small Businesses
Voip Phone System for Small BusinessesVoip Phone System for Small Businesses
Voip Phone System for Small Businesses
 
Sectechbiz Is A Uae Based Company
Sectechbiz Is A Uae Based CompanySectechbiz Is A Uae Based Company
Sectechbiz Is A Uae Based Company
 
Unizen OEM Product Offerings-Feb 2015
Unizen OEM Product Offerings-Feb 2015Unizen OEM Product Offerings-Feb 2015
Unizen OEM Product Offerings-Feb 2015
 
Voice securityprotocol review
Voice securityprotocol reviewVoice securityprotocol review
Voice securityprotocol review
 
digiCRYPT_ENG
digiCRYPT_ENGdigiCRYPT_ENG
digiCRYPT_ENG
 
Phone for Enterprises Business Corporations Governments
Phone for Enterprises Business Corporations GovernmentsPhone for Enterprises Business Corporations Governments
Phone for Enterprises Business Corporations Governments
 
Ipdoor presentation
Ipdoor presentationIpdoor presentation
Ipdoor presentation
 
Mobile Security Blanco/Ueda
Mobile Security Blanco/UedaMobile Security Blanco/Ueda
Mobile Security Blanco/Ueda
 
Snom_Webinar_EN_160225
Snom_Webinar_EN_160225Snom_Webinar_EN_160225
Snom_Webinar_EN_160225
 
ALE Endpoint Product Portfolio Brochure
ALE Endpoint Product Portfolio BrochureALE Endpoint Product Portfolio Brochure
ALE Endpoint Product Portfolio Brochure
 
Esd Networks india
Esd Networks indiaEsd Networks india
Esd Networks india
 
Esd Networks India
Esd Networks IndiaEsd Networks India
Esd Networks India
 
Vo ip
Vo ipVo ip
Vo ip
 
Mogul Wave VoIP Cloud Services
Mogul Wave VoIP Cloud ServicesMogul Wave VoIP Cloud Services
Mogul Wave VoIP Cloud Services
 
Technical Sheet - PrivateGSM VoIP - english
Technical Sheet - PrivateGSM VoIP - englishTechnical Sheet - PrivateGSM VoIP - english
Technical Sheet - PrivateGSM VoIP - english
 
Overview – M2M Equipment’s Manufacturer
Overview – M2M Equipment’s ManufacturerOverview – M2M Equipment’s Manufacturer
Overview – M2M Equipment’s Manufacturer
 

FortressFone Technologies Leave Behind 01282015

  • 1. tOur goal is simple. FortressFone™ Secure Smartphone Terminal Mobile security solution based on SAMSUNG Smartphones (iOS soon to be released) for the protection of voice and data communications over IP cellular networks. FortressFone™ combines security features with technology performances of the latest generation mobile phones in a single terminal of reduced dimensions and weight. Besides the standard functions of the most sophisticated mobile telephones FortressFone™ ensures good voice quality even in secure communication mode. Featuring a removable internal security token based on a MicroSD, for the storage of algorithms and sensitive data. FortressFone™ implements enhanced security mechanisms to guarantee the separation of security services and mobile applications. The generation and distribution of the security parameters as well as the unit configuration files are tasks completed by the Key management center. We accomplish this objective by tracking down cutting edge security technology from around the globe. We screen powerful, customizable security capabilities that solve persistent and rapidly evolving problems in the marketplace. Protect government, enterprise and individuals from being exploited by foreign and domestic adversaries and criminals. Our goal is simple PROTECT! FortressFone™Technologies
  • 2. FortressFone™ Specifications GENERAL Applications  Digital high-level security for voice and data communications.  End-to-end protection of voice communications.  Secure data communications by means of a VPN connection to the FortressFone Secure Cloud System providing email exchange and file transfer. Features  Based on the Android operating system.  Unit configuration by means of a dedicated Management System.  Configuration files stored on removable security token (MicroSD).  Operation over: o 3G UMT mobile IP networks o 2G GSM EDGE mobile IP networks o Wireless broadband IP networks o IP satellite channels (i.e. INMARSAT, VSAT terminals) o Interoperable with secure desk phone  Secure SMS. Voice Communication  Clear Mode Operations: o Full duplex communication to standard GSM telephones o Clear call to standard VoIP telephones  Secure Mode Operations: o Full-duplex communication with clear like quality o In-band proprietary security protocols  Vocoders: o G.729 for clear mode operation to standard VoIP telephones o Proprietary clear like vocoder for crypto mode  Protocol: o SIP (RFC326), STUN (RFC 1889), SDP (RFC 4566) o In-band proprietary security protocol Data Communication  Secure mode operations.  Data transfer.  Data transfer available also during voice calls. Communication Interfaces  USB v2.0 (locked to enhance unit security).  Bluetooth v3.0+HS (lockable on demand).  Wi-Fi a/b/g/n (lockable on demand).  Internal RF GSM/UMTS radio module. CRYPTOLOGY AND SECURITY Encryption Algorithm  AE 256 standard algorithm.  Custom algorithms available on request. Physical Random Noise Generator Security Token  According to FIPS PUB 140-2.  ISO7816 smartcard controlled located inside a Micro SD memory card.  Certified according to Common Criteria EAL 5+. Key Management  Key and configuration files generation via management system.  Off-line key distribution via security token (MicroSD). Access Control Security Mechanism  Two factor authentication to the security token by means of password.  Advanced security mechanisms to guarantee the separation of the security services and the mobile applications.  Security mechanisms to strengthen Android operating system.  Zeroize by a software dedicated function. TELEPHONE FUNCTIONS Operating mode  Clear call to standard GSM telephones.  Clear call to standard VoIP telephones.  Automatic crypto call at call answering.  Secure data transfer.  Simultaneous voice call and data transfer. Telephone Features  Based on standard smartphone experience. APPROVALS  CE, FIPS 140-2 level 1 (FIPS 1648). FortressFone™Technologies