Protecting Communications and Data on Mobile Devices<br />Cross Carrier and Cross Device Platform.<br />© 2011 Protected M...
© 2011 Protected Mobility<br />The Problem<br />The Cloud<br />Web server<br />Gateway Mobile <br />Switching Center <br /...
Lots of Apps – very little Security
Security Solutions need to be virtually invisible to the user
Security Solutions need to be downloadable from Anywhere
Lost Devices need to be wiped
Encrypted device tracker</li></li></ul><li>© 2011 Protected Mobility<br />Solution SetProtected Mobility - Encryption<br /...
© 2011 Protected Mobility<br />Features<br />Encryption which is cross platform – carrier agnostic<br />Protected Informat...
Available now<br />June 2011<br />© 2011 Protected Mobility<br />Solution Sets<br />SMS<br />Blackberry/Android/iPhone/Win...
© 2011 Protected Mobility<br />Cross Platform Security<br />Blackberry<br />Android<br />iPhone<br />iPad<br />Windows<br ...
© 2011 Protected Mobility<br />Take Control and Protect <br />
Protected Mobility Enterprise<br />© 2011 Protected Mobility<br />Control Multiple Platforms<br />From Single Device<br />
© 2011 Protected Mobility<br />Protected Mobility - Enterprise Communications (PMEC)<br />Provides Control over active Pro...
© 2011 Protected Mobility<br />Enterprise Management made easy!<br />Control Server (Physical or Virtual)<br />NOT require...
Upcoming SlideShare
Loading in …5
×

Protected Mobility Solution Overview Brief 07202011

901 views

Published on

Protected Mobility secures smartphone communications for Android, iPhone, iPad, and Blackberry worldwide on any network for business and personal communications.

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
901
On SlideShare
0
From Embeds
0
Number of Embeds
17
Actions
Shares
0
Downloads
8
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Protected Mobility Solution Overview Brief 07202011

  1. 1. Protecting Communications and Data on Mobile Devices<br />Cross Carrier and Cross Device Platform.<br />© 2011 Protected Mobility<br />
  2. 2. © 2011 Protected Mobility<br />The Problem<br />The Cloud<br />Web server<br />Gateway Mobile <br />Switching Center <br />(GMSC) <br />Tower<br />Tower<br />Mobile Switching <br />Center (MSC) <br />Message Service Center <br />(SMSC)<br />= Vulnerabilities<br /><ul><li>Lots of Mobile Devices – No Security
  3. 3. Lots of Apps – very little Security
  4. 4. Security Solutions need to be virtually invisible to the user
  5. 5. Security Solutions need to be downloadable from Anywhere
  6. 6. Lost Devices need to be wiped
  7. 7. Encrypted device tracker</li></li></ul><li>© 2011 Protected Mobility<br />Solution SetProtected Mobility - Encryption<br />Your Applications<br />Cryptographic interface module – Defined API’s<br />On Device Key Management<br />“Serious Secret Sauce”<br />Encryption Module (can be removed and replaced to allow a company or agency to use a unique encryption)<br />Ciphertext Or Special Government Only output<br />Transmission<br />
  8. 8. © 2011 Protected Mobility<br />Features<br />Encryption which is cross platform – carrier agnostic<br />Protected Information:<br />In Transit<br />At Rest<br />Stored Encrypted<br />AES 256 with all the hooks for Suite B<br />Final Stages of FIPS 140-2 Certification<br />Small Size <600KB/EXTREMELY Fast<br />Can be place in virtually any computing device for Encryption<br />
  9. 9. Available now<br />June 2011<br />© 2011 Protected Mobility<br />Solution Sets<br />SMS<br />Blackberry/Android/iPhone/Win7/iPads/Slates/PC/Netbook<br />Enterprise Management System (EMS)<br />Summer 2011<br />File Protection <br />MMS <br />Picture Protection<br />Video Protection<br />Instant Messenger<br />Your Applications<br />© 2011 Protected Mobility<br />
  10. 10. © 2011 Protected Mobility<br />Cross Platform Security<br />Blackberry<br />Android<br />iPhone<br />iPad<br />Windows<br />Netbook/Laptop<br />Tablets/Slates<br />Mac<br />PC/Linux<br />
  11. 11. © 2011 Protected Mobility<br />Take Control and Protect <br />
  12. 12. Protected Mobility Enterprise<br />© 2011 Protected Mobility<br />Control Multiple Platforms<br />From Single Device<br />
  13. 13. © 2011 Protected Mobility<br />Protected Mobility - Enterprise Communications (PMEC)<br />Provides Control over active Protected Mobility Mobile Applications <br />Provides control over your Enterprise Policies and Practices - <br />Key usage and storage including key renewal<br />Secure relationship management<br />One to Many secure communications <br />Departmental or Project Specific assignments<br />Adherence to Travel restrictions<br />
  14. 14. © 2011 Protected Mobility<br />Enterprise Management made easy!<br />Control Server (Physical or Virtual)<br />NOT required for Protected Mobility messaging, only Management<br />Sets and Stores Keys as well as Grouping of Keys <br />Central Control for Operational Functions<br />GPS/Carrier Location Reporting<br />Secure Message/Data Wiping<br />Time before Messages are securely wiped<br />Secure Application Wiping<br />Passphrase reset<br />Interface to allow Auditing <br />
  15. 15. © 2011 Protected Mobility<br />Enterprise Business Case Uses<br />On command - Wipe Data from devices<br />Interface Corp Apps to make them secure<br />Auto Authenticate Users<br />Create a Web of Trust with Clients / Business Partners<br />Send SBU information to Commercial Devices NOW.<br />
  16. 16. Fully Managed Enterprise Encryption - EMS<br />© 2011 Protected Mobility<br />Location<br />
  17. 17. Optionally Create Your Own Mobile Comm Network<br />© 2011 Protected Mobility<br />Use Protected Mobility networking to ensure information does not reside anywhere that is not protected.<br />Your Network<br />
  18. 18. For More Information<br />Mike MaurerEVP SalesMMMAURER@protectedmobility.com571-237-7040 sms/voice<br />© 2011 Protected Mobility<br />

×