Download - INFOGRAPHIC: The Evolution of Secure Mobile Computing

Transcript
Page 1: INFOGRAPHIC: The Evolution of Secure Mobile Computing

EVOLUTION OF SECURE MOBILE COMPUTING

1990s

2000s

Current

Near Future

Large cumbersome crypto, rack, laptop and other devices would be transported in several unwieldy pelicases.

SST Mobile Office Equipment becomes smaller and more powerful and can be contained in one large Pelicase

SST SCT1150E Secured Venue TabletEncrypted HDD capable of storing up to Top Secret Data

Next Generation Secured TabletEncrypted HDD capable of storing up to Top Secret Data with a Dongle containing Micro IP crypto device for transmission of Top Secret Data

Long Term FutureNext Generation Secured TabletEncrypted HDD capable of storing up to Top Secret Data with integrated Micro IP crypto device for transmission of Top Secret Data

2012 SST Secure Comms Hub – IP Crypto Device, 3G and Modem

www.sst.ws