210 likes | 230 Views
Secure Communications Situation Awareness Private Mobile Networking. Secure Mobile Complete mobile security. October 2013. Introducing a new patent pending security methodology. Complete mobile security. SECURE COMMUNICATIONS. SITUATIONAL AWARENESS. SECURED, MOBILE, PRIVATE
E N D
Secure Communications Situation Awareness Private Mobile Networking Secure MobileComplete mobile security • October 2013 Introducing a new patent pending security methodology
Complete mobile security SECURE COMMUNICATIONS SITUATIONAL AWARENESS SECURED, MOBILE, PRIVATE NETWOKING Single Turnkey Solution* for… • User based Panic Button. • Silent Panic Initiation. • GPS Automated Status Transmission & Notification. • Panic Administration Satellite Mapping. • GPS Tracking on Another kryptofon Endpoint. • OMNITrack – Team Based and/or Cascaded Regional & Global GPS Tracking. • OMNITrack Integration Into Falcon View or ESRI Enterprise. • C2 – Command & Controls: • Beacon GPS • Front/Back Camera Execution • Lock Screen • Disable kryptofon • Wipe Accounts Information • Microphone Activation • Secure Voice. • Secure Voice Conferencing. • Secure Direct Chat (IM). • Secure Group Chat(s). • Secure Chat Automated Shredding. • Secure Direct File Transfer. • Secure Group File Transfer. • Secure Contact Transfer. • Secure Group Contact(s) Transfer. • Secure Camera. • Secure Picture Transfer. • Secure Automated Picture Erase. • Secure Communications Session Shredded. • Secure Sessions Uniquely Encrypted. • Dedicated Secured Accounts & Contacts. • No Call, Chat, Transfer, Camera History. • Supports: • 2G, 3G, 4G • WiFi • Satellite • Supports: • Private 3G/4G • Private MANET • Anti-Triangulation. • Multiple Accounts Supporting Multiple Network Profiles: • Work / Personal • Classified / SBU • Multiple Contacts Profiles • Only Show the Contacts Associated With The Profile • Network Profile Configuration Support. * - patent pending * - Red Team validated in 2013 www.global-security-solutions.com
Complete mobile security Encryption Keys Authentication • Trusted Application Validation – Encryption is Validated On Each Launch. • Is it the right app? • Is it the right size? • Is it one correct hardware? • Is it the correct license? • Is the correct user launching it? • ….1 Industry Leading Authentication and Key Management. • Encryption Keys Are Highly Protected • Never put in-the-air. • Never put on-the-wire. • Never saved on the endpoint. • Never saved on a server. • Used once and then destroyed. • Each Communication Type (e.g. voice, chat, transfer, etc.) Uses a Unique Encryption Key. 1 – Company Proprietary & Need to Know Secured www.global-security-solutions.com
Complete mobile security End-to-end Security. Is It Real?
Complete mobile security Tactical Mission Deployment Support
Complete mobile security Secure Chat Text Messaging Send individual or group secured text chat messages to members of your contact list. • Unique encryption key for each chat session, even if an additional chat session is to the same person. • Execute multiple chat sessions simultaneously. • Execute chat while in a secure call, file transfer, secure camera execution and secure file transfer. • Add & delete contacts to chat sessions on the fly. • From within a chat, whisper to a member of a chat via a private chat. This chat will utilize unique private key. • From within a chat, secure call to a member of a chat session while remaining in the session. This call will utilize unique private key. August 2013
Complete mobile security Secure Camera Capture & Transfer Take and send individual or group secured pictures with the GSS integrated secure camera. • Touch ‘n Send securely within 5 seconds. Simply select a contact, press the camera button, and shoot. If you like the preview of what was taken, press share. • Touch ‘n Store – take your secure picture saving it to secure onboard storage for later transmission. • Individual or mass distribution – share to one or more individual with a single Touch ‘n Send or Touch ‘n Send action. • Configurable for photo self destruct after sharing completes. • Share other photos, or any file, on your Android with secure file sharing. August 2013
Complete mobile security Get GPS Location Get Pictures Take Photos Lock Display Turn on Microphone Disable Speaker Wipe User Data Disable Application Without user knowledge Situational Awareness Controlling a 12 man team from a safe house, or in garrison overseeing multiple squadrons, you need SITUATIONAL AWARENESS! • Panic Alert is endpoint initiated through the Panic Button or Hidden Alert. • C2 provides centrally controlled functions for team leaders & administrators. CONTROL, OBTAIN INTELLIGNCE, RECOVER, & DESTROY! August 2013
Complete Mobile Security kryptofonServer kryptofonServer Private telecommunications server • Specifically designed for our server . • Scalable from 100-10,000 users. • Management system. • Deployed in private networks, the Internet or public or private clouds. • Integrates with other servers in other private networks, on the Internet or in other public or private clouds. • Warm/hot failover models available. August 2013
Complete Mobile Security kryptofonServer OMNITrack Administration OmniTrack – Blue Force Tracking Track location and panic alerts of team members within seconds. • All communications encrypted. • Physical server implemented locally, regionally or globally. • Private network or Internet deployed. Encrypted comms Encrypted comms August 2013
Complete mobile security kryptofonServer kryptofonServer kryptofonServer kryptofonServer Team Zed Team Gamma Team Alpha Administration Administration Administration HQ OMNITrack OMNITrack OMNITrack OMNITrack Kryptofon Server & OMNITrack Cascade Kryptofon Server and OMNITrack Servers Allowing Multi-Level Monitoring and Oversight. Encrypted comms NOC1 or Cloud1 Encrypted comms Encrypted comms NOC2 or Cloud2 Encrypted comms Encrypted comms NOC3 or Cloud3 August 2013
kryptofonServer + OmniTrack Secure VPN+ Container VPN Connections Cloud Providers Regional S Cloud Regional E Cloud Regional W Cloud Regional N Cloud Global Cloud Team Zed in Field Team Zed Cloud Team Alpha Cloud Team Alpha in Field Anti-Triangulation Deployment Field Local Regional Global Team Leader Regional Leader Team Leader HQ Monitoring Anti-Triangulation, Cascaded Kryptofon Server & OmniTrack in Secure Multi- Vendor Cloud Deployments IP1 IP2 IP111 IP3 IP4 IP121 IP211 IP11 IP131 IP12 IP141 IP13 IP14 August 2013
Remote and Hidden Secure Deployments The Mes provides a network of both base and repeater nodes which disseminate and propagate network traffic in a dynamic, self-healing fashion. The Tower provides the capability of deploying a remote, mobile tactical 3G/4G network in global locations where local providers are not available August 2013
MIMO Repeater MIMO Repeater WiFi Field HQ 10km WiFi Tracking kryptofon kryptofon kryptofon 10mi MIMO Mobile Vehicle Bubble2 • End-End Secured Communications • From the Field With kryptofon on Android. • To Field HQ. • To Global HQ. • On Self-Healing High Speed Repeating Network. • Uniquely Encrypted with Every Communication. • Without the Need of a Global Secure Network. 8mi MIMO Vest Bubble 10mi MIMO Mobile Vehicle Bubble 10mi MIMO Bubble MIMO Repeater • Configuration Options • Standalone – or • Backhauled GSS Global Security Solutions
GSS Tower utilizes a patent pending security methodology August 2013
Secure Mobile Communication August 2013
SECURE MOBILE PRIVATE NETWORKING SECURE FILE TRANSFER, CHAT SECURE VOICE & CONFERENCING SITUATIONAL AWARENESS Secure communication from a laptop The encryption software not only works with Android, it provides the same secure capabilities and more on Windows. August 2013
No matter how you do it! It’s SECURE! August 2013
Mobile License Packages August 2013