IntactPhone is the world’s most secure mobile phone for organizations. This high-end smartphone is built from the ground-up to provide you the ultimate defense against mobile cyber-crime. IntactPhones runs a purpose-built security rich operating system, fused command-and-control application, built-in secure communications, and multiple security and performance assurance utilities. These components form the Intact Mobile Security platform. It protects you from eavesdropping, malware, data breaches and any attempts to hack or tamper with your mobile communications and data. It enables you to establish and enforce a best-of-all-worlds mobile device security and compliance framework to match your specific enterprise mobile security requirements.
Security-minded organizations that wish to deploy the highest-security over their mobile communications and data, and completely eliminate cyber-attack threats.
The IntactPhone runs on IntactOS, a custom-built security-rich operating system, enhanced to address mobile security concerns facing enterprises today. The Android-like IntactOS is built from the source code to provide in-depth protection against cyber-attacks by blocking the security breaches found in commercial Android operating systems. IntactOS is free of bloatware, hooks to carriers, and leaky data.
The IntactPhone provides security and privacy by encrypting voice over IP calls through ZRTP. The communications can run on any network; including 2G GSM, 3G UMTS-CDMA and LTE. In addition, it delivers end-to-end messaging encryption, based on AES256 message encryption with 256-bit key length, and RSA 2048.
Built-in phone book allows secret identity for IntactPhone users along with a flexible definition of user exposure policies across organizational groups.
Intact Mobile security provides mobile communications archiving for both voice calls and messages. Recorded communications are fully protected with complete encryption against potential interference from outside party who might steal valuable information. Decryption keys for the logged communications are only obtained by your organization.
Fused governance and control application ensures the safe use of corporate devices via configurable security profiles. Group-based policies and restrictions define solid the use of device features, applications, web browsing and access to network, data and device resources, followed by easy recovery from lost and stolen device scenarios.
The IntactPhone enables granular apps permissions management. Central policies set the device functions that can be accessed by an application and provide the ability to block or spoof requests.
IntactPhone full-disk encryption ensures information stored on the device is only accessible to users who enter the password/PIN. The Encryption key is known only to the device owner.
IntactPhone detects behavior-based anomaly across Wi-Fi connectivity, cell tower connectivity, and in applications to discover evasive attacks.
The IntactPhone assures device performance via a secure best-in-class self-troubleshooting app and remote control technology. Remote control technology ensures swift recovery from performance issues and security hazards via remote expert involvement. The on-device app provides the device holder with monitoring and repair capabilities for seamless device performance and connectivity.
A fully-integrated anti-malware solution ensures that the IntactPhone devices remain safe from known cyber-attacks by providing immediate up-to-date defense and threats elimination.
The IntactPhone offers BYOD programs application level mobile security. It consists of encrypted communications, command and control center, remote control technology and self-troubleshooting app. It provides enterprise class protection for BYODs against eavesdropping and most attack vectors.
The IntactPhone is a monolithic contained device, protecting the user from known and unknown cyber-attacks. Unlike other high-security devices that quest to compromise between privacy and security, the game-changing IntactPhone is designed as a unified container to safeguard the entire mobile device regardless of the attack vector.
The IntactPhone is designed to provide unmatched protection against mobile cyber-crime. The API level integration across its components –narrows the attack surface for cybercriminals and delivers a one-of-a-kind, highly robust defense.
The IntactPhone delivers encrypted voice over IP utilizing ZRTP. ZRTP uses ephemeral Diffie-Hellman with hash commitment. The secure messaging is delivered via end-to-end encryption, including AES256 message encryption, and RSA 2048.
The IntactPhone device ensures that device owners have complete privacy: proprietary push notification mechanism assures that no communications data can be stored by a third party. The disk encryption key is known only to the device owner who actually sets it up, and it is not kept by any other party. The voice encryption keys are destroyed at the end of the call, which precludes retroactively compromising the call by future disclosures of key material.
IntactPhone secure build provides a trusted environment by a secure boot process, integrity validation and detection, obfuscation layer across device resources, and the generation of security keys and device passwords.
The IntactPhone can be delivered as a hosted-solution to reduce operating costs or as an on premise deployment to provide complete control by the customer.