Defend confidential data with dedicated security layers...Defend confidential data with dedicated...

4
Defend confidential data with dedicated security layers

Transcript of Defend confidential data with dedicated security layers...Defend confidential data with dedicated...

Page 1: Defend confidential data with dedicated security layers...Defend confidential data with dedicated security layers #PROBLEM Cyberattacks targetted at government sector around the

Defend confidential data with dedicated security layers

Page 2: Defend confidential data with dedicated security layers...Defend confidential data with dedicated security layers #PROBLEM Cyberattacks targetted at government sector around the

Defend confidential datawith dedicated security layers

#PROBLEMCyberattacks targettedat government sector around the world.

SOUTH KORE

In July 2011, South Kwas hacked, resultinin the theft of the pedetails of up to 35 mpeople.

INDIA

In July 2016, Cymmetriadiscovered and revealeddubbed “Patchwork”, whan estimated 2500 corpand government agencie

UNITED KINGD OM

In May 2017, a ransomware virus has reportedly targeted organisations in more than 70 countries, including the National Health Service in the UK. The NHS announced that 16 organisations had been affected by the attack.

UNITED STATES

The records of 21.5 million people, including social security numbers, dates of birth, addresses, fingerprints and security clearance related information were stolen from the United States Office of Personnel Management. Most of the victims are employees of the United States Government and unsuccessful applicants to it.

GERMANY

The Sofacy Group is suspected to be behind an attack in August 2016 on members of the Bundestag and political parties. Authorities fear that sensitive information could be gathered by hackers to later manipulate the public ahead of the elections.

UKR AINE

A cyberattack on Ukraine’s powergrid left more than 200,000 people temporarily without power.

Page 3: Defend confidential data with dedicated security layers...Defend confidential data with dedicated security layers #PROBLEM Cyberattacks targetted at government sector around the

FAMOC defend encrypts and protects any data stored in the secure container on the device. Access is based on password, biometry or/and second factor authentication.

FULLY MANAGED AND PROTECTED SECURE CONTAINER

Optional private part of the device is fully separated from the secure container and is also fully encrypted. Users can be allowed to install any applications from application stores, however policies on what the apps have access to are enforced. Antimalware and antivirus controls are also enforced, as well as state-of-the-art Mobile Threat Protection for the whole device.

CONTROLLED AND PROTECTED PRIVATE PART OF THE MOBILE DEVICE

Custom communication channel, based on VPN technology. Dedicated, custom VPN client to meet the organization’s needs. Certificate based authentication with second factor auth available.

SECURE ENCRYPTED CONNECTION TO ORGANIZATION’S INFRASTRUCTURE

FAMOC defend supports encrypted, secure voice calls and chats (also in multiuser / conference modes) as well as video calls. Integrations with third party solutions available (e.g. Indra ComSec, Navayo Secfone).

SECURE VOICE, CHAT AND VIDEO

#SOLUTION

A

Korea ng ersonal million

a researchers d the cyber attack hich compromised orate es.

With FAMOC defendstate institutions get first-day support of all mobile operating systems, can control the way communication is encrypted and manage access to the network from remote devices.

Page 4: Defend confidential data with dedicated security layers...Defend confidential data with dedicated security layers #PROBLEM Cyberattacks targetted at government sector around the

F A M O C . C O MI N F O @ F A M O C . C O M

c o n t a c t u s : l e a r n m o r e :

FAMOC helps companies give people what they want – brand new shiny devices, emerging technologies and tools necessary to make their job done.

We handle the security part, taking into account the greatest risk that comes from within: your staff.

A POWERFUL TOOL TO SECURE YOUR APPS, DATA AND DEVICES ACROSS DIFFERENT MOBILE OPERATING SYSTEMS.

By working closely with government customers and adding numerous integrations we are able to ensure FAMOC defend can meet and exceed any requirements.