SlideShare a Scribd company logo
1 of 20
Download to read offline
PrivateWave Enterprise Solutions
Secure Communication Solutions
l Established in 2006 withinAcceleratore Imprese Politecnico di Milano
l Web Site: www.privatewave.com
l Customers: different Italian and international companies, government agencies
PrivateWave Company Presentation
l PrivateWave promotes the value of total transparency in all the applications developed, using only
open source and public technologies, with a security certified and monitored by the biggest
worldwide experts in this sector.
l PrivateWave develops and produces encryption products with a focus on the usability. Any user,
even with no technical background, is able to communicate in a safe and secure way without any
difficulty.
Vision
Transparency, Usability and Security!
• Nowadays mobile phone is:
− A personal communication means;
− One of the most important business tools;
− Largely distributed;
− Universal solution for communications
• The voice is the most widespread communications way, not only in a company;
• Budget for IT security considers many items (mail, files, secure backup, firewall…), but
not voice security;
• Solutions allowing communication encryption between mobile phones and fixed phones
do not exist worldwide;
• Tools for retrieving sensitive data from our phone calls are within anybody’s reach.
The case
• A professional system can be rented for less than 2000
EUROS a day;
• In theory it is against the law, but…it is quiet simple asking for
an offer to any investigation agency!
Practical approach: phone interception
l Messages are protected from wiretapping
l Messages are self-destructing after few minutes, without leaving any trace
l From now on, it is possible to securely texting your contacts
PrivateWave: protection for SMS
l It is not hard to imagine how companies can become vulnerable from improper care of their sensitive
data such as:
l Launching new products
l Private negotiations
l Market strategies
l Private information about M&A
l Communication between members of board of directors
l Communication with subsidiaries/representative branches abroad
l Moreover the “economic value” of the communication must be considered within respect to the
competitors investment in espionage.
Which phone call must be protected?
l It’s a complete suite with an high level of customizable features
l 3 edition:
l Enterprise
l Professional
l Government (the Government one has more customizable features for specific operative usage)
l It’s the first solution available on the market that integrates an encrypted fixed and mobile network
on the same infrastructure
l It allows:
l integration in to the existing telephony infrastructure
l building the secure voice network independently from the existing infrastructure
l protection against both internal and external intrusion and hacking attempts
l Very high usability
Enterprise Voice Security Suite
l GSM was definitively broken and the cost to make a GSM call interception is drastically reduced
l January 2010: first breach of the GSM protocol
http://events.ccc.de/congress/2009/Fahrplan/events/3654.en.html
http://www.guardian.co.uk/technology/2009/dec/29/gsm-mobile-algorithm-cracked-nohl
l August 2010: 1500 dollars to intercept a GSM call
http://www.engadget.com/2010/07/31/hacker-intercepts-phone-calls-with-homebuilt-1-500-imsi-catcher/
l January 2011: 15 dollars to intercept a GSM call
http://www.wired.com/threatlevel/2010/12/breaking-gsm-with-a-15-phone-plus-smarts/
Practical approach: phone interception
l Software voice encryption for Smartphone
l Blackberry OS and Blackberry 10
l iPhone and iPad
l Android
l Compatible with Samsung KNOX platform
l VoIP technology, on LTE, UMTS, EDGE, GPRS, WIFI
l Very easy to use
l Ready for organization-wide distribution
l Remote installation with OTA (Over the Air) deployment
PrivateWave – Secure Communication App
Supported devices – Fixed Phones
l Snom Landline Phones supported for voice encryption
l Phones
l Conference Room Devices (securely connect remote meeting rooms)
Supported PBX – Corporate Integration
l Integration within existing Corporate PBX to extend the secure telephony network to:
l Cisco Unified Communications Manager
l Avaya Aura® Communication Manager
SIEM and SSO
l Security Information and Event Management
l SIEM connector for HPArcSight
l Single Sign On (SAML 2.0)
Sample Architecture
Areas of use
Business sector and TELCOS Public sector
Military sectorFinancial sector
Areas of use: Management Communication
l Management communications:
l The customer will install in its own Datacenter our Enterprise Voice Security Suite;
l Managers mobile phones will have PrivateWave app installed;
l The system can be integrated with existing Cisco Call Manager (CUCM 8) or Avaya
Communication Manager to enable mobile to landline secure calling
l Managers can start talking in total security both from their mobile and fixed phones.
l All the communications between fixed phones and mobile phones of the company can
be registered and stored if needed by the company.
Solution Advantages
l Saving time and money
l No need to travel physically in order to meet with counterparts face-to-face.
l Serenity
l No need to worry about possible phone interceptions or misuse of the contents of the
communication;
l Easy to use
l The software is integrated with mobile phone’s OS and there is no need to change
or alter proper way of use (Select contact à Dial a secure call); desk phones can be
used for other daily operations inside an organization;
l PrivateServer is administered with web-like interface.
Solution for Government and Intelligence agencies
l Offering two different security protocols
l Secret communications: SIP/TLS, SDES and SRTP protocol with 256 bit key length. End to Site encryption with
optional point of call registration and interception even compliance with local laws.
l Top Secret communications: SIP/TLS, ZRTP and SRTP protocol with 256 bit key length. End to End encryption,
the calls can’t be intercepted also by the owner/administrator of the system.
l Customizations for Tactical and Operative departments
l Only for large projects.
l Obfuscation of the application with the integration inside a different mobile application as games, notes, etc.
l Using of secure phonebooks stored in a centric server with https protected access.
l Implementation of custom logics and features like crisis and emergency alerts through personalized sequence
of keys inside di application.
l For example: the application, through the digit of a specific security pin, can transmit an alert to a central
intelligence department managing also the geographical realtime whois on the registration public ip of the
application user.
l ....more available on project base.
l Certified to be secure
l Multiple independent research/industry institutions certify it
to be secure
l Open Source encryption codes
l Open to public review ( www.zrtp.org )
l Every security sensitive piece of code can be inspected and
reviewed
l Full Protection
l Protects from intelligence gathering through phone call logs
(signaling)
l Politically neutral
l Technology is resistant against possible political pressure on
manufacturer
Security Approach
l Quick Deployment
l No need to distribute hardware devices. No logistic handling
l Applicable on existing smartphone base
l Quick Installation
l No need to deploy keys across secured devices
l Keys are negotiated dynamically
l Integration
l Integrate within existing phones & telephony infrastructure
l No Vendor Lock-In
l We give our customers the freedom to be independent from us
Unique Advantages - Flexibility

More Related Content

What's hot

CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...Block Armour
 
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014Andris Soroka
 
Ethical hacking, the way to get product & solution confidence and trust in an...
Ethical hacking, the way to get product & solution confidence and trust in an...Ethical hacking, the way to get product & solution confidence and trust in an...
Ethical hacking, the way to get product & solution confidence and trust in an...Pierre-Jean Verrando
 
Mobile_Security_En
Mobile_Security_EnMobile_Security_En
Mobile_Security_Ende77
 
Blockchain Defined Perimeter for Cloud Security
Blockchain Defined Perimeter for Cloud SecurityBlockchain Defined Perimeter for Cloud Security
Blockchain Defined Perimeter for Cloud SecurityBlock Armour
 
2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)Fabio Pietrosanti
 
Flak general v2 5
Flak general v2 5Flak general v2 5
Flak general v2 5digiflak
 
VoIP Wars: The Phreakers Awaken
VoIP Wars: The Phreakers AwakenVoIP Wars: The Phreakers Awaken
VoIP Wars: The Phreakers AwakenFatih Ozavci
 
VoIP Wars: Destroying Jar Jar Lync (Filtered version)
VoIP Wars: Destroying Jar Jar Lync (Filtered version)VoIP Wars: Destroying Jar Jar Lync (Filtered version)
VoIP Wars: Destroying Jar Jar Lync (Filtered version)Fatih Ozavci
 
TECTECO V3.20160526.key (2)
TECTECO V3.20160526.key (2)TECTECO V3.20160526.key (2)
TECTECO V3.20160526.key (2)Mark De Simone
 
Turgay dereli 283286 software eng. ass 2-
Turgay dereli 283286 software eng. ass 2-Turgay dereli 283286 software eng. ass 2-
Turgay dereli 283286 software eng. ass 2-Turgay Dereli
 
YubiKey 5 NFC
YubiKey 5 NFCYubiKey 5 NFC
YubiKey 5 NFCWJN
 
NXP MIFARE Webinar: How To Protect Contactless Systems Today And Tomorrow
NXP MIFARE Webinar: How To Protect Contactless Systems Today And TomorrowNXP MIFARE Webinar: How To Protect Contactless Systems Today And Tomorrow
NXP MIFARE Webinar: How To Protect Contactless Systems Today And TomorrowNXP MIFARE Team
 
Cd213 percy-audiocodes
Cd213 percy-audiocodesCd213 percy-audiocodes
Cd213 percy-audiocodesTran Thanh
 
Phone for Enterprises Business Corporations Governments
Phone for Enterprises Business Corporations GovernmentsPhone for Enterprises Business Corporations Governments
Phone for Enterprises Business Corporations GovernmentsJohn Adam
 

What's hot (20)

CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
 
Mbs w21
Mbs w21Mbs w21
Mbs w21
 
Week13
Week13Week13
Week13
 
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
 
Ethical hacking, the way to get product & solution confidence and trust in an...
Ethical hacking, the way to get product & solution confidence and trust in an...Ethical hacking, the way to get product & solution confidence and trust in an...
Ethical hacking, the way to get product & solution confidence and trust in an...
 
Mobile_Security_En
Mobile_Security_EnMobile_Security_En
Mobile_Security_En
 
Blockchain Defined Perimeter for Cloud Security
Blockchain Defined Perimeter for Cloud SecurityBlockchain Defined Perimeter for Cloud Security
Blockchain Defined Perimeter for Cloud Security
 
2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)
 
My ppt
My pptMy ppt
My ppt
 
Flak general v2 5
Flak general v2 5Flak general v2 5
Flak general v2 5
 
VoIP Wars: The Phreakers Awaken
VoIP Wars: The Phreakers AwakenVoIP Wars: The Phreakers Awaken
VoIP Wars: The Phreakers Awaken
 
VoIP Wars: Destroying Jar Jar Lync (Filtered version)
VoIP Wars: Destroying Jar Jar Lync (Filtered version)VoIP Wars: Destroying Jar Jar Lync (Filtered version)
VoIP Wars: Destroying Jar Jar Lync (Filtered version)
 
TECTECO V3.20160526.key (2)
TECTECO V3.20160526.key (2)TECTECO V3.20160526.key (2)
TECTECO V3.20160526.key (2)
 
Turgay dereli 283286 software eng. ass 2-
Turgay dereli 283286 software eng. ass 2-Turgay dereli 283286 software eng. ass 2-
Turgay dereli 283286 software eng. ass 2-
 
Tatyana-Arnaudova - English
Tatyana-Arnaudova - EnglishTatyana-Arnaudova - English
Tatyana-Arnaudova - English
 
YubiKey 5 NFC
YubiKey 5 NFCYubiKey 5 NFC
YubiKey 5 NFC
 
digiCRYPT_ENG
digiCRYPT_ENGdigiCRYPT_ENG
digiCRYPT_ENG
 
NXP MIFARE Webinar: How To Protect Contactless Systems Today And Tomorrow
NXP MIFARE Webinar: How To Protect Contactless Systems Today And TomorrowNXP MIFARE Webinar: How To Protect Contactless Systems Today And Tomorrow
NXP MIFARE Webinar: How To Protect Contactless Systems Today And Tomorrow
 
Cd213 percy-audiocodes
Cd213 percy-audiocodesCd213 percy-audiocodes
Cd213 percy-audiocodes
 
Phone for Enterprises Business Corporations Governments
Phone for Enterprises Business Corporations GovernmentsPhone for Enterprises Business Corporations Governments
Phone for Enterprises Business Corporations Governments
 

Viewers also liked

Aimia: The Big Deal About Big Data -- How It Will Transform Pharma Meeting an...
Aimia: The Big Deal About Big Data -- How It Will Transform Pharma Meeting an...Aimia: The Big Deal About Big Data -- How It Will Transform Pharma Meeting an...
Aimia: The Big Deal About Big Data -- How It Will Transform Pharma Meeting an...David Nickelson, PsyD, JD
 
Лесной_план_региона_как_ориентир_для_инвестора
Лесной_план_региона_как_ориентир_для_инвестораЛесной_план_региона_как_ориентир_для_инвестора
Лесной_план_региона_как_ориентир_для_инвестораFedor Grabar
 
Econ214 macroeconomics chapter 19
Econ214 macroeconomics chapter 19Econ214 macroeconomics chapter 19
Econ214 macroeconomics chapter 19BHUOnlineDepartment
 
Grafico diario del dax perfomance index para el 12 12-2012
Grafico diario del dax perfomance index para el 12 12-2012Grafico diario del dax perfomance index para el 12 12-2012
Grafico diario del dax perfomance index para el 12 12-2012Experiencia Trading
 
Neighborhood Watch prototype (storyboard narrative)
Neighborhood Watch prototype (storyboard narrative)Neighborhood Watch prototype (storyboard narrative)
Neighborhood Watch prototype (storyboard narrative)JosephHowerton
 
Os factores productivos
Os factores productivosOs factores productivos
Os factores productivosLeoperu Return
 
Greythorn Market Insights - February 2013
Greythorn Market Insights - February 2013Greythorn Market Insights - February 2013
Greythorn Market Insights - February 2013GreythornAU
 
Local sensitive hashing & minhash on facebook friend
Local sensitive hashing & minhash on facebook friendLocal sensitive hashing & minhash on facebook friend
Local sensitive hashing & minhash on facebook friendChengeng Ma
 
Individualisierte Mehrwertdienste - Wie Telekommunikationsunternehmen der Com...
Individualisierte Mehrwertdienste - Wie Telekommunikationsunternehmen der Com...Individualisierte Mehrwertdienste - Wie Telekommunikationsunternehmen der Com...
Individualisierte Mehrwertdienste - Wie Telekommunikationsunternehmen der Com...Iskander Business Partner GmbH
 
3 d pie chart circular puzzle with hole in center pieces 6 stages style 1 pow...
3 d pie chart circular puzzle with hole in center pieces 6 stages style 1 pow...3 d pie chart circular puzzle with hole in center pieces 6 stages style 1 pow...
3 d pie chart circular puzzle with hole in center pieces 6 stages style 1 pow...SlideTeam.net
 
Les Grossman's Pro Tips for Local SEO
Les Grossman's Pro Tips for Local SEOLes Grossman's Pro Tips for Local SEO
Les Grossman's Pro Tips for Local SEOGreg Gifford
 
JEM: a network for mathematics educators
JEM: a network for mathematics educatorsJEM: a network for mathematics educators
JEM: a network for mathematics educatorsOlga Caprotti
 
Church. Got an app for that?
Church. Got an app for that?Church. Got an app for that?
Church. Got an app for that?ASDSVV
 
NV kunstenaar Jan De Cock in de financiële problemen
NV kunstenaar Jan De Cock in de financiële problemenNV kunstenaar Jan De Cock in de financiële problemen
NV kunstenaar Jan De Cock in de financiële problemenThierry Debels
 

Viewers also liked (19)

Bia
BiaBia
Bia
 
Aimia: The Big Deal About Big Data -- How It Will Transform Pharma Meeting an...
Aimia: The Big Deal About Big Data -- How It Will Transform Pharma Meeting an...Aimia: The Big Deal About Big Data -- How It Will Transform Pharma Meeting an...
Aimia: The Big Deal About Big Data -- How It Will Transform Pharma Meeting an...
 
Лесной_план_региона_как_ориентир_для_инвестора
Лесной_план_региона_как_ориентир_для_инвестораЛесной_план_региона_как_ориентир_для_инвестора
Лесной_план_региона_как_ориентир_для_инвестора
 
Econ214 macroeconomics chapter 19
Econ214 macroeconomics chapter 19Econ214 macroeconomics chapter 19
Econ214 macroeconomics chapter 19
 
My social representation
My social representationMy social representation
My social representation
 
Grafico diario del dax perfomance index para el 12 12-2012
Grafico diario del dax perfomance index para el 12 12-2012Grafico diario del dax perfomance index para el 12 12-2012
Grafico diario del dax perfomance index para el 12 12-2012
 
Neighborhood Watch prototype (storyboard narrative)
Neighborhood Watch prototype (storyboard narrative)Neighborhood Watch prototype (storyboard narrative)
Neighborhood Watch prototype (storyboard narrative)
 
Os factores productivos
Os factores productivosOs factores productivos
Os factores productivos
 
Greythorn Market Insights - February 2013
Greythorn Market Insights - February 2013Greythorn Market Insights - February 2013
Greythorn Market Insights - February 2013
 
Local sensitive hashing & minhash on facebook friend
Local sensitive hashing & minhash on facebook friendLocal sensitive hashing & minhash on facebook friend
Local sensitive hashing & minhash on facebook friend
 
Individualisierte Mehrwertdienste - Wie Telekommunikationsunternehmen der Com...
Individualisierte Mehrwertdienste - Wie Telekommunikationsunternehmen der Com...Individualisierte Mehrwertdienste - Wie Telekommunikationsunternehmen der Com...
Individualisierte Mehrwertdienste - Wie Telekommunikationsunternehmen der Com...
 
3 d pie chart circular puzzle with hole in center pieces 6 stages style 1 pow...
3 d pie chart circular puzzle with hole in center pieces 6 stages style 1 pow...3 d pie chart circular puzzle with hole in center pieces 6 stages style 1 pow...
3 d pie chart circular puzzle with hole in center pieces 6 stages style 1 pow...
 
Les Grossman's Pro Tips for Local SEO
Les Grossman's Pro Tips for Local SEOLes Grossman's Pro Tips for Local SEO
Les Grossman's Pro Tips for Local SEO
 
JEM: a network for mathematics educators
JEM: a network for mathematics educatorsJEM: a network for mathematics educators
JEM: a network for mathematics educators
 
Kunst, økonomi, kreativ kapitalisme
Kunst, økonomi, kreativ kapitalismeKunst, økonomi, kreativ kapitalisme
Kunst, økonomi, kreativ kapitalisme
 
Church. Got an app for that?
Church. Got an app for that?Church. Got an app for that?
Church. Got an app for that?
 
Naturalismo
NaturalismoNaturalismo
Naturalismo
 
NV kunstenaar Jan De Cock in de financiële problemen
NV kunstenaar Jan De Cock in de financiële problemenNV kunstenaar Jan De Cock in de financiële problemen
NV kunstenaar Jan De Cock in de financiële problemen
 
Publish
PublishPublish
Publish
 

Similar to Secure communication solutions for businesses

Secur Digital Presentation 22jul10 Frm Show
Secur Digital Presentation 22jul10 Frm ShowSecur Digital Presentation 22jul10 Frm Show
Secur Digital Presentation 22jul10 Frm Showfmitchell
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Moon Technolabs Pvt. Ltd.
 
Secure channels main deck
Secure channels main deckSecure channels main deck
Secure channels main deckRichard Blech
 
Securty Issues from 1999
Securty Issues from 1999Securty Issues from 1999
Securty Issues from 1999TomParker
 
OmniSpotlight 05-2014
OmniSpotlight 05-2014OmniSpotlight 05-2014
OmniSpotlight 05-2014Anita Lösch
 
World's Most Secure Privacy Phones
World's Most Secure Privacy PhonesWorld's Most Secure Privacy Phones
World's Most Secure Privacy PhonesJohn Adam
 
Top firewall companies 2020 converted
Top firewall companies 2020 convertedTop firewall companies 2020 converted
Top firewall companies 2020 convertedemmaelice
 
Trustless Computing Initiative
Trustless Computing InitiativeTrustless Computing Initiative
Trustless Computing InitiativeTRUSTLESS.AI
 
Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna
Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna
Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna Leonardo
 
Multisentry Solutions Company Profile
Multisentry Solutions Company ProfileMultisentry Solutions Company Profile
Multisentry Solutions Company ProfilePier Vittorio Sassone
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...OKsystem
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...GARL
 
Companies from Flanders Belgium at Mobile World Congress 2015 in Barcelona
Companies from Flanders Belgium at Mobile World Congress 2015 in BarcelonaCompanies from Flanders Belgium at Mobile World Congress 2015 in Barcelona
Companies from Flanders Belgium at Mobile World Congress 2015 in BarcelonaFlanders Investment & Trade
 
Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056mashiur
 
Solution Guide Secure Access Architecture
Solution Guide Secure Access ArchitectureSolution Guide Secure Access Architecture
Solution Guide Secure Access ArchitectureExclusive Networks ME
 
White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarketFinite Moments
 

Similar to Secure communication solutions for businesses (20)

Secur Digital Presentation 22jul10 Frm Show
Secur Digital Presentation 22jul10 Frm ShowSecur Digital Presentation 22jul10 Frm Show
Secur Digital Presentation 22jul10 Frm Show
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it
 
Secure channels main deck
Secure channels main deckSecure channels main deck
Secure channels main deck
 
Securty Issues from 1999
Securty Issues from 1999Securty Issues from 1999
Securty Issues from 1999
 
OmniSpotlight 05-2014
OmniSpotlight 05-2014OmniSpotlight 05-2014
OmniSpotlight 05-2014
 
SYPHERSAFE
SYPHERSAFESYPHERSAFE
SYPHERSAFE
 
World's Most Secure Privacy Phones
World's Most Secure Privacy PhonesWorld's Most Secure Privacy Phones
World's Most Secure Privacy Phones
 
Top firewall companies 2020 converted
Top firewall companies 2020 convertedTop firewall companies 2020 converted
Top firewall companies 2020 converted
 
Trustless Computing Initiative
Trustless Computing InitiativeTrustless Computing Initiative
Trustless Computing Initiative
 
Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna
Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna
Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna
 
Multisentry Solutions Company Profile
Multisentry Solutions Company ProfileMultisentry Solutions Company Profile
Multisentry Solutions Company Profile
 
Mobile Voice Recording (MVR)
Mobile Voice Recording (MVR)Mobile Voice Recording (MVR)
Mobile Voice Recording (MVR)
 
Vega Econd En 1
Vega Econd En 1Vega Econd En 1
Vega Econd En 1
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
 
Companies from Flanders Belgium at Mobile World Congress 2015 in Barcelona
Companies from Flanders Belgium at Mobile World Congress 2015 in BarcelonaCompanies from Flanders Belgium at Mobile World Congress 2015 in Barcelona
Companies from Flanders Belgium at Mobile World Congress 2015 in Barcelona
 
Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056
 
Solution Guide Secure Access Architecture
Solution Guide Secure Access ArchitectureSolution Guide Secure Access Architecture
Solution Guide Secure Access Architecture
 
White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarket
 

Secure communication solutions for businesses

  • 1. PrivateWave Enterprise Solutions Secure Communication Solutions
  • 2. l Established in 2006 withinAcceleratore Imprese Politecnico di Milano l Web Site: www.privatewave.com l Customers: different Italian and international companies, government agencies PrivateWave Company Presentation
  • 3. l PrivateWave promotes the value of total transparency in all the applications developed, using only open source and public technologies, with a security certified and monitored by the biggest worldwide experts in this sector. l PrivateWave develops and produces encryption products with a focus on the usability. Any user, even with no technical background, is able to communicate in a safe and secure way without any difficulty. Vision Transparency, Usability and Security!
  • 4. • Nowadays mobile phone is: − A personal communication means; − One of the most important business tools; − Largely distributed; − Universal solution for communications • The voice is the most widespread communications way, not only in a company; • Budget for IT security considers many items (mail, files, secure backup, firewall…), but not voice security; • Solutions allowing communication encryption between mobile phones and fixed phones do not exist worldwide; • Tools for retrieving sensitive data from our phone calls are within anybody’s reach. The case
  • 5. • A professional system can be rented for less than 2000 EUROS a day; • In theory it is against the law, but…it is quiet simple asking for an offer to any investigation agency! Practical approach: phone interception
  • 6. l Messages are protected from wiretapping l Messages are self-destructing after few minutes, without leaving any trace l From now on, it is possible to securely texting your contacts PrivateWave: protection for SMS
  • 7. l It is not hard to imagine how companies can become vulnerable from improper care of their sensitive data such as: l Launching new products l Private negotiations l Market strategies l Private information about M&A l Communication between members of board of directors l Communication with subsidiaries/representative branches abroad l Moreover the “economic value” of the communication must be considered within respect to the competitors investment in espionage. Which phone call must be protected?
  • 8. l It’s a complete suite with an high level of customizable features l 3 edition: l Enterprise l Professional l Government (the Government one has more customizable features for specific operative usage) l It’s the first solution available on the market that integrates an encrypted fixed and mobile network on the same infrastructure l It allows: l integration in to the existing telephony infrastructure l building the secure voice network independently from the existing infrastructure l protection against both internal and external intrusion and hacking attempts l Very high usability Enterprise Voice Security Suite
  • 9. l GSM was definitively broken and the cost to make a GSM call interception is drastically reduced l January 2010: first breach of the GSM protocol http://events.ccc.de/congress/2009/Fahrplan/events/3654.en.html http://www.guardian.co.uk/technology/2009/dec/29/gsm-mobile-algorithm-cracked-nohl l August 2010: 1500 dollars to intercept a GSM call http://www.engadget.com/2010/07/31/hacker-intercepts-phone-calls-with-homebuilt-1-500-imsi-catcher/ l January 2011: 15 dollars to intercept a GSM call http://www.wired.com/threatlevel/2010/12/breaking-gsm-with-a-15-phone-plus-smarts/ Practical approach: phone interception
  • 10. l Software voice encryption for Smartphone l Blackberry OS and Blackberry 10 l iPhone and iPad l Android l Compatible with Samsung KNOX platform l VoIP technology, on LTE, UMTS, EDGE, GPRS, WIFI l Very easy to use l Ready for organization-wide distribution l Remote installation with OTA (Over the Air) deployment PrivateWave – Secure Communication App
  • 11. Supported devices – Fixed Phones l Snom Landline Phones supported for voice encryption l Phones l Conference Room Devices (securely connect remote meeting rooms)
  • 12. Supported PBX – Corporate Integration l Integration within existing Corporate PBX to extend the secure telephony network to: l Cisco Unified Communications Manager l Avaya Aura® Communication Manager
  • 13. SIEM and SSO l Security Information and Event Management l SIEM connector for HPArcSight l Single Sign On (SAML 2.0)
  • 15. Areas of use Business sector and TELCOS Public sector Military sectorFinancial sector
  • 16. Areas of use: Management Communication l Management communications: l The customer will install in its own Datacenter our Enterprise Voice Security Suite; l Managers mobile phones will have PrivateWave app installed; l The system can be integrated with existing Cisco Call Manager (CUCM 8) or Avaya Communication Manager to enable mobile to landline secure calling l Managers can start talking in total security both from their mobile and fixed phones. l All the communications between fixed phones and mobile phones of the company can be registered and stored if needed by the company.
  • 17. Solution Advantages l Saving time and money l No need to travel physically in order to meet with counterparts face-to-face. l Serenity l No need to worry about possible phone interceptions or misuse of the contents of the communication; l Easy to use l The software is integrated with mobile phone’s OS and there is no need to change or alter proper way of use (Select contact à Dial a secure call); desk phones can be used for other daily operations inside an organization; l PrivateServer is administered with web-like interface.
  • 18. Solution for Government and Intelligence agencies l Offering two different security protocols l Secret communications: SIP/TLS, SDES and SRTP protocol with 256 bit key length. End to Site encryption with optional point of call registration and interception even compliance with local laws. l Top Secret communications: SIP/TLS, ZRTP and SRTP protocol with 256 bit key length. End to End encryption, the calls can’t be intercepted also by the owner/administrator of the system. l Customizations for Tactical and Operative departments l Only for large projects. l Obfuscation of the application with the integration inside a different mobile application as games, notes, etc. l Using of secure phonebooks stored in a centric server with https protected access. l Implementation of custom logics and features like crisis and emergency alerts through personalized sequence of keys inside di application. l For example: the application, through the digit of a specific security pin, can transmit an alert to a central intelligence department managing also the geographical realtime whois on the registration public ip of the application user. l ....more available on project base.
  • 19. l Certified to be secure l Multiple independent research/industry institutions certify it to be secure l Open Source encryption codes l Open to public review ( www.zrtp.org ) l Every security sensitive piece of code can be inspected and reviewed l Full Protection l Protects from intelligence gathering through phone call logs (signaling) l Politically neutral l Technology is resistant against possible political pressure on manufacturer Security Approach
  • 20. l Quick Deployment l No need to distribute hardware devices. No logistic handling l Applicable on existing smartphone base l Quick Installation l No need to deploy keys across secured devices l Keys are negotiated dynamically l Integration l Integrate within existing phones & telephony infrastructure l No Vendor Lock-In l We give our customers the freedom to be independent from us Unique Advantages - Flexibility