START FREE TRIAL
Press Releases
Press Releases
23
Feb 2016
CommuniTake Technologies announces IntactPhone, the most secure smartphone to power enterprise mobility

CommuniTake’s new mobile security platform enables intra-company safe communications using rich multi-layered mobile security, built-in security enhancements, and the power of end-to-end encryption

 

Tel Aviv, February 23, 2016. The mobile-first organization is forced to operate in a new IT environment: compromised mobile devices, BYOD programs, and evolving cybercrime. Enterprises are struggling to protect business information and applications against cyber-attacks using deficient and fragmented solutions that were not built to withstand modern threats. These solutions expose mobile devices to modern attack vectors, turning them into soft endpoints.

CommuniTake Technologies addresses these challenges with the introduction of the Intact Mobile Security platform. CommuniTake’s game-changing platform introduces a mobile device that is totally shielded from the ground up, designed to protect the most confidential communications:

  • Delivers a multi-layered approach: hardware, firmware, and applications.
  • Eliminates security breaches existing in commercial devices.
  • Blocks access points and vectors used for cybercrime.
  • Provides in-depth protection against voice interception techniques.
  • Enables diverse security levels according to organizational needs.
  • Delivers hybrid COPE / BYOD deployment.

The natively integrated mobility platform unifies the following components:

–     Hardened device (IntactPhone). The IntactPhone device provides trusted hardware for secure, authorized-only boot processes.

–     Security-rich mobile OS (IntactOS). The customized operating system is tightly coupled with the hardened device. It provides a security-enhanced framework and utilities that block cybercrime attack vectors, with same-day over-the-air security patches. 

–     Fused Command Center (IntactCC). The governance center manages device inventory and granular use policies, including an internal-only enterprise app store to eliminate the infection of devices caused by negligence. 

–     Encrypted communications. The intelligent end-to-end wiretapping encryption covers the entire communications environment and blocks cutting-edge eavesdropping techniques, while ensuring crystal clear voice quality.

–     Security tools (IntactApps). The security product suite provides crowd analysis, antivirus, and AppsOps management, delivering robust threat prevention.

–     Remote control (IntactCare). The technology enables complete remote control over the device from afar for swift recovery via security experts.

 

“Organizations are struggling with traditional uncorrelated endpoint defenses and are letting device holders be ‘sitting ducks’ of cybercrime. Security specialists understand that commercial BYOD cannot be fully protected. Businesses must adopt an integrated platform approach to securing mobile devices”, said Ronen Sasson, CommuniTake Technologies CEO. “Our one-of-a-kind Intact Mobile Security platform redefines mobile security. Other vendors in the industry are focusing on point solutions. Only CommuniTake provides a single platform that contains a hardened device, central governance via use policies, multiple security levels, and remote support to ensure productivity. It is developed from the hardware up to blend integration with a comprehensive multi-layered defense. The Intact platform boosts security efficacy and prevents threats at each stage of the attack kill chain. Our platform has successfully passed exhaustive penetration tests performed by governmental organizations, where other solutions have failed. The prevention-minded CISO must stand up to today’s threat landscape, and our unique solution is truly the best ever for it”.

The IntactPhone technical specifications include Octa-core CPU, 5.5″ Full HD ultra-bright display and 3GB RAM.

The Intact Mobile Security platform can be deployed by two methods:

  1. A corporate-owned personally-enabled device that constitutes the three-way defense through the hardened device, the proprietary operating system and the application level defense.
  2. A BYOD approach consisting of the application level defense – encrypted communications, central command center, crowd analysis, and remote control.   

CommuniTake IntactPhone is available now for orders and will start delivery in April 2016.

Learn more at www.intactphone.com.

Privacy Preference Center

Necessary

These cookies are used to guarantee site logged-in to the server and proper site operation.

wordpress_e0e89334ac52a69b56ac8982b9a3784d wordpress_logged_in_e0e89334ac52a69b56ac8982b9a3784d, wp-settings-2, wp-settings-time-2, wpe-auth

Advertising

These Google cookies are used for re-targeting, optimization, reporting, and attribution of online adverts and remarketing activity.

IDE, NID

Analytics

These third party cookies are used to collect information about how visitors use the site. The information is used to compile reports to improve the site. The cookies collect information in an anonymous form, including the number of visitors to the site, where visitors have come to the site from and the pages they visited.

1P_JAR, APISID, APISID, DSID, DV, HSID, OTZ, __ncuid, _ga, __utmx, __utmxx

Preferences

Various unique identifiers by Google, which stores your preferred use options.
Google sets a number of cookies on any page that includes a Google product such as Google Map and YouTube. While we have no control over the cookies set by Google, they appear to include a mixture of pieces of information to measure the number and behavior of Google tools users. This may include information that links your visits to our website with your Google account if you are signed in to one. Information about your use of our website, including your IP address, may be transmitted to Google and stored on their servers. These cookies may not identify you personally unless you are logged into Google, in which case it is linked to your Google account.

APISID, DSID, DV, HSID, SAPISID, SID, SIDCC, SSID