Latin America. Today the complex phone system makes it impossible to predict which way a phone call will take within the network. Calls are routinely carried over unencrypted directional microwave links that are easy to intercept with modest equipment.
In order to reduce costs, calls are redirected through networks or operators with dubious security standards. All of your company's confidentiality can be compromised by a single corrupt employee of the phone company. There are even devices on the market that allow anyone to listen to calls on mobile networks and are increasingly in demand.
Key Business Process Solutions, wholesale distributor of telecommunications equipment, networks, video surveillance and professional software solutions, presents the new range of CryptoPhone, cell phones, landlines or satellite phones that secure your calls against any interception.
GSMK CryptoPhone, a company based in Germany, is the first to develop, produce and market shielded mobile and desktop phones, against all kinds of attacks such as Trojans, viruses and malware. CryptoPhone products are not compatible with conventional phones, as they require to be paired with another similar device either cell phone or landline. The information travels in the form of data, not voice and its main mode of use is via the internet, achieving 360º protection. Oriented to protect the communication of governments and companies that require high protection and confidentiality in their conversations, data (sms, e-mail), discarding 100% any intervention.
"We designed Cryptophone to offer protection against anyone who tries to listen to your conversations, both on the fixed and air networks. Cryptophone provides end-to-end security by encrypting all the way between both phones," said Jorg Altenheimer, Managing Director for Key Business Process Solutions, Mexico. "The team that developed this encrypted phone has applied nearly 15 years to the analysis of its concept. During this time we have exchanged ideas with the world's leading security people about how to develop it correctly. One concept was clear from the start: that the system's source code would be available to the crypto/academic community (and the general public) to allow flaws and vulnerabilities to be discovered and fixed as soon as possible. To our knowledge there is no encrypted landline, mobile or satellite phone on the market that offers this important feature," alteheimer said.
Leave your comment