PrivateWave - sales presentation_en
-
Upload
marco-pissarello -
Category
Documents
-
view
88 -
download
3
Transcript of PrivateWave - sales presentation_en
PrivateWave Enterprise Solutions
Secure Communication Solutions
l Established in 2006 within Acceleratore Imprese Politecnico di Milano
l Web Site: www.privatewave.com
l Customers: different Italian and international companies, government agencies
PrivateWave Company Presentation
l PrivateWave promotes the value of total transparency in all the applications developed, using only open source and public technologies, with a security certified and monitored by the biggest worldwide experts in this sector.
l PrivateWave develops and produces encryption products with a focus on the usability. Any user, even with no technical background, is able to communicate in a safe and secure way without any difficulty.
VisionTransparency, Usability and Security!
• Nowadays mobile phone is:
− A personal communication means;
− One of the most important business tools;
− Largely distributed;
− Universal solution for communications
• The voice is the most widespread communications way, not only in a company;
• Budget for IT security considers many items (mail, files, secure backup, firewall…), but not voice security;
• Solutions allowing communication encryption between mobile phones and fixed phones do not exist worldwide;
• Tools for retrieving sensitive data from our phone calls are within anybody’s reach.
The case
• A professional system can be rented for less than 2000 EUROS a day;
• In theory it is against the law, but…it is quiet simple asking for an offer to any investigation agency!
Practical approach: phone interception
l Messages are protected from wiretapping
l Messages are self-destructing after few minutes, without leaving any trace
l From now on, it is possible to securely texting your contacts
PrivateWave: protection for SMS
l It is not hard to imagine how companies can become vulnerable from improper care of their sensitive data such as:
l Launching new products
l Private negotiations
l Market strategies
l Private information about M&A
l Communication between members of board of directors
l Communication with subsidiaries/representative branches abroad
l Moreover the “economic value” of the communication must be considered within respect to the competitors investment in espionage.
Which phone call must be protected?
l It’s a complete suite with an high level of customizable features
l 3 edition:
l Enterprise
l Professional
l Government (the Government one has more customizable features for specific operative usage)
l It’s the first solution available on the market that integrates an encrypted fixed and mobile network on the same infrastructure
l It allows:
l integration in to the existing telephony infrastructure
l building the secure voice network independently from the existing infrastructure
l protection against both internal and external intrusion and hacking attempts
l Very high usability
Enterprise Voice Security Suite
l GSM was definitively broken and the cost to make a GSM call interception is drastically reduced
l January 2010: first breach of the GSM protocol
http://events.ccc.de/congress/2009/Fahrplan/events/3654.en.html
http://www.guardian.co.uk/technology/2009/dec/29/gsm-mobile-algorithm-cracked-nohl
l August 2010: 1500 dollars to intercept a GSM call
http://www.engadget.com/2010/07/31/hacker-intercepts-phone-calls-with-homebuilt-1-500-imsi-catcher/
l January 2011: 15 dollars to intercept a GSM call
http://www.wired.com/threatlevel/2010/12/breaking-gsm-with-a-15-phone-plus-smarts/
Practical approach: phone interception
l Software voice encryption for Smartphonel Blackberry OS and Blackberry 10
l iPhone and iPad
l Android
l Compatible with Samsung KNOX platform
l VoIP technology, on LTE, UMTS, EDGE, GPRS, WIFI
l Very easy to use
l Ready for organization-wide distribution
l Remote installation with OTA (Over the Air) deployment
PrivateWave – Secure Communication App
Supported devices – Fixed Phones
l Snom Landline Phones supported for voice encryption
l Phones
l Conference Room Devices (securely connect remote meeting rooms)
Supported PBX – Corporate Integration
l Integration within existing Corporate PBX to extend the secure telephony network to:
l Cisco Unified Communications Manager
l Avaya Aura® Communication Manager
SIEM and SSO
l Security Information and Event Management
l SIEM connector for HP ArcSight
l Single Sign On (SAML 2.0)
Sample Architecture
Areas of use
Business sector and TELCOS Public sector
Military sectorFinancial sector
Areas of use: Management Communication
l Management communications:
l The customer will install in its own Datacenter our Enterprise Voice Security Suite;
l Managers mobile phones will have PrivateWave app installed;
l The system can be integrated with existing Cisco Call Manager (CUCM 8) or Avaya Communication Manager to enable mobile to landline secure calling
l Managers can start talking in total security both from their mobile and fixed phones.
l All the communications between fixed phones and mobile phones of the company can be registered and stored if needed by the company.
Solution Advantages
l Saving time and money
l No need to travel physically in order to meet with counterparts face-to-face.
l Serenity
l No need to worry about possible phone interceptions or misuse of the contents of the communication;
l Easy to use
l The software is integrated with mobile phone’s OS and there is no need to change or alter proper way of use (Select contact à Dial a secure call); desk phones can be used for other daily operations inside an organization;
l PrivateServer is administered with web-like interface.
Solution for Government and Intelligence agencies
l Offering two different security protocolsl Secret communications: SIP/TLS, SDES and SRTP protocol with 256 bit key length. End to Site encryption with
optional point of call registration and interception even compliance with local laws.
l Top Secret communications: SIP/TLS, ZRTP and SRTP protocol with 256 bit key length. End to End encryption, the calls can’t be intercepted also by the owner/administrator of the system.
l Customizations for Tactical and Operative departmentsl Only for large projects.
l Obfuscation of the application with the integration inside a different mobile application as games, notes, etc.
l Using of secure phonebooks stored in a centric server with https protected access.
l Implementation of custom logics and features like crisis and emergency alerts through personalized sequence of keys inside di application.
l For example: the application, through the digit of a specific security pin, can transmit an alert to a central intelligence department managing also the geographical realtime whois on the registration public ip of the application user.
l ....more available on project base.
l Certified to be securel Multiple independent research/industry institutions certify it
to be secure
l Open Source encryption codesl Open to public review ( www.zrtp.org )
l Every security sensitive piece of code can be inspected and reviewed
l Full Protectionl Protects from intelligence gathering through phone call logs
(signaling)
l Politically neutrall Technology is resistant against possible political pressure on
manufacturer
Security Approach
l Quick Deploymentl No need to distribute hardware devices. No logistic handling
l Applicable on existing smartphone base
l Quick Installationl No need to deploy keys across secured devices
l Keys are negotiated dynamically
l Integrationl Integrate within existing phones & telephony infrastructure
l No Vendor Lock-Inl We give our customers the freedom to be independent from us
Unique Advantages - Flexibility