SlideShare a Scribd company logo
Travel Solution:
1. High-Quality Mobile Internet at home and
in 100+ countries at local rates ($10 / GB)
2. Int’l calls and text messages from $0.02
3. Free Mobile Internet after booking a hotel
or a ticket at popular travel booking
companies
4. External battery (2400 – 12000 mAh) to
charge mobile devices during a trip.
5
Security-based device for corporates:
Security Platform:
1. Open-source Linux-based firmware
2. Built-in VPN to provide secure access to
corporate network
3. Built-in hardware authorization
4. Local encrypted data storage
5. Device management system for remote
control, configuration and blocking
6. Restricted access to prohibited websites.

More Related Content

What's hot

NewsByte Mumbai October 2017
NewsByte Mumbai October 2017NewsByte Mumbai October 2017
NewsByte Mumbai October 2017
chauhananand17
 
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
OWASP Delhi
 
News Byte Session By Mukesh Pathak
News Byte Session By Mukesh PathakNews Byte Session By Mukesh Pathak
News Byte Session By Mukesh Pathak
Mukesh Pathak
 
Spoofing
SpoofingSpoofing
Spoofing
kinzasaeed4
 
Tor Project and The Darknet
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The Darknet
Ahmed Mater
 
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
Vikalp Sharma
 
Newsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_DecNewsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_Dec
Raghunath G
 
Security News Bytes Null Dec Meet Bangalore
Security News Bytes Null Dec Meet BangaloreSecurity News Bytes Null Dec Meet Bangalore
Security News Bytes Null Dec Meet Bangalore
InMobi Technology
 
Security News Bytes (Aug Sept 2017)
Security News Bytes (Aug Sept 2017)Security News Bytes (Aug Sept 2017)
Security News Bytes (Aug Sept 2017)
Apurv Singh Gautam
 
TOR Packet Analysis - Locating Identifying Markers
TOR Packet Analysis - Locating Identifying MarkersTOR Packet Analysis - Locating Identifying Markers
TOR Packet Analysis - Locating Identifying Markers
Brent Muir
 
Cellcrypt - An Introduction to Secure Mobile Communications
Cellcrypt - An Introduction to Secure Mobile CommunicationsCellcrypt - An Introduction to Secure Mobile Communications
Cellcrypt - An Introduction to Secure Mobile Communications
Paul Parke
 
TOR NETWORK
TOR NETWORKTOR NETWORK
TOR NETWORK
Rishikese MR
 
Hipaa violations-infographic-one-page (2)
Hipaa violations-infographic-one-page (2)Hipaa violations-infographic-one-page (2)
Hipaa violations-infographic-one-page (2)
Diagnotes, Inc.
 
Developing secure mobile apps by Alexandru Catariov Endava
Developing secure mobile apps by Alexandru Catariov EndavaDeveloping secure mobile apps by Alexandru Catariov Endava
Developing secure mobile apps by Alexandru Catariov EndavaMoldova ICT Summit
 
Why hackers love public Wi-fi
Why hackers love public Wi-fiWhy hackers love public Wi-fi
Why hackers love public Wi-fi
techexpert2345
 
Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion Router
Mohammed Bharmal
 
Cyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeCyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber Crime
Adeel Rasheed
 
Phox mobile texting service
Phox mobile texting servicePhox mobile texting service
Phox mobile texting service
getphox
 
Phone Hacking: A lucrative, but largely hidden history
Phone Hacking: A lucrative, but largely hidden historyPhone Hacking: A lucrative, but largely hidden history
Phone Hacking: A lucrative, but largely hidden history
David Rogers
 

What's hot (19)

NewsByte Mumbai October 2017
NewsByte Mumbai October 2017NewsByte Mumbai October 2017
NewsByte Mumbai October 2017
 
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
 
News Byte Session By Mukesh Pathak
News Byte Session By Mukesh PathakNews Byte Session By Mukesh Pathak
News Byte Session By Mukesh Pathak
 
Spoofing
SpoofingSpoofing
Spoofing
 
Tor Project and The Darknet
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The Darknet
 
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
 
Newsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_DecNewsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_Dec
 
Security News Bytes Null Dec Meet Bangalore
Security News Bytes Null Dec Meet BangaloreSecurity News Bytes Null Dec Meet Bangalore
Security News Bytes Null Dec Meet Bangalore
 
Security News Bytes (Aug Sept 2017)
Security News Bytes (Aug Sept 2017)Security News Bytes (Aug Sept 2017)
Security News Bytes (Aug Sept 2017)
 
TOR Packet Analysis - Locating Identifying Markers
TOR Packet Analysis - Locating Identifying MarkersTOR Packet Analysis - Locating Identifying Markers
TOR Packet Analysis - Locating Identifying Markers
 
Cellcrypt - An Introduction to Secure Mobile Communications
Cellcrypt - An Introduction to Secure Mobile CommunicationsCellcrypt - An Introduction to Secure Mobile Communications
Cellcrypt - An Introduction to Secure Mobile Communications
 
TOR NETWORK
TOR NETWORKTOR NETWORK
TOR NETWORK
 
Hipaa violations-infographic-one-page (2)
Hipaa violations-infographic-one-page (2)Hipaa violations-infographic-one-page (2)
Hipaa violations-infographic-one-page (2)
 
Developing secure mobile apps by Alexandru Catariov Endava
Developing secure mobile apps by Alexandru Catariov EndavaDeveloping secure mobile apps by Alexandru Catariov Endava
Developing secure mobile apps by Alexandru Catariov Endava
 
Why hackers love public Wi-fi
Why hackers love public Wi-fiWhy hackers love public Wi-fi
Why hackers love public Wi-fi
 
Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion Router
 
Cyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeCyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber Crime
 
Phox mobile texting service
Phox mobile texting servicePhox mobile texting service
Phox mobile texting service
 
Phone Hacking: A lucrative, but largely hidden history
Phone Hacking: A lucrative, but largely hidden historyPhone Hacking: A lucrative, but largely hidden history
Phone Hacking: A lucrative, but largely hidden history
 

Viewers also liked

En invest cw_platform_11_extend
En invest cw_platform_11_extendEn invest cw_platform_11_extend
En invest cw_platform_11_extend
Oleg Pravdin
 
ComfortWay_Presentation
ComfortWay_PresentationComfortWay_Presentation
ComfortWay_PresentationOleg Pravdin
 
ComfortWay Pitchdeck
ComfortWay PitchdeckComfortWay Pitchdeck
ComfortWay Pitchdeck
Oleg Pravdin
 
Remote SIM Provisioning - MVNOs World Congress – April 2016
Remote SIM Provisioning - MVNOs World Congress – April 2016Remote SIM Provisioning - MVNOs World Congress – April 2016
Remote SIM Provisioning - MVNOs World Congress – April 2016
The GSMA
 
ComfortWay partners - resellers
ComfortWay partners - resellersComfortWay partners - resellers
ComfortWay partners - resellers
Alexey Kalachnikov
 
Programmable SIM cards, SoftSIMs and eSIMs
Programmable SIM cards, SoftSIMs and eSIMsProgrammable SIM cards, SoftSIMs and eSIMs
Programmable SIM cards, SoftSIMs and eSIMs
Gerry O'Prey
 
Cloud sim report
Cloud sim reportCloud sim report
Cloud sim report
Jiachen Yang
 
eSIM - "simlos" in die Zukunft?
eSIM - "simlos" in die Zukunft?eSIM - "simlos" in die Zukunft?
eSIM - "simlos" in die Zukunft?
Iskander Business Partner GmbH
 
Cellnetrix Products
Cellnetrix ProductsCellnetrix Products
Cellnetrix Products
Vladimir Nagin
 

Viewers also liked (9)

En invest cw_platform_11_extend
En invest cw_platform_11_extendEn invest cw_platform_11_extend
En invest cw_platform_11_extend
 
ComfortWay_Presentation
ComfortWay_PresentationComfortWay_Presentation
ComfortWay_Presentation
 
ComfortWay Pitchdeck
ComfortWay PitchdeckComfortWay Pitchdeck
ComfortWay Pitchdeck
 
Remote SIM Provisioning - MVNOs World Congress – April 2016
Remote SIM Provisioning - MVNOs World Congress – April 2016Remote SIM Provisioning - MVNOs World Congress – April 2016
Remote SIM Provisioning - MVNOs World Congress – April 2016
 
ComfortWay partners - resellers
ComfortWay partners - resellersComfortWay partners - resellers
ComfortWay partners - resellers
 
Programmable SIM cards, SoftSIMs and eSIMs
Programmable SIM cards, SoftSIMs and eSIMsProgrammable SIM cards, SoftSIMs and eSIMs
Programmable SIM cards, SoftSIMs and eSIMs
 
Cloud sim report
Cloud sim reportCloud sim report
Cloud sim report
 
eSIM - "simlos" in die Zukunft?
eSIM - "simlos" in die Zukunft?eSIM - "simlos" in die Zukunft?
eSIM - "simlos" in die Zukunft?
 
Cellnetrix Products
Cellnetrix ProductsCellnetrix Products
Cellnetrix Products
 

EN_Corporates_Security

  • 1. Travel Solution: 1. High-Quality Mobile Internet at home and in 100+ countries at local rates ($10 / GB) 2. Int’l calls and text messages from $0.02 3. Free Mobile Internet after booking a hotel or a ticket at popular travel booking companies 4. External battery (2400 – 12000 mAh) to charge mobile devices during a trip. 5 Security-based device for corporates: Security Platform: 1. Open-source Linux-based firmware 2. Built-in VPN to provide secure access to corporate network 3. Built-in hardware authorization 4. Local encrypted data storage 5. Device management system for remote control, configuration and blocking 6. Restricted access to prohibited websites.