SlideShare a Scribd company logo
1 of 16
Enabling the Mobile Workforce & Protecting theCorporate IP Cross Carrier and Cross Device Platform. Mark Lawrence – MarkL@protectedmobility.com www.protectedmobility.com © 2011 Protected Mobility
© 2011 Protected Mobility The Challenges We Meet The Time is Now Smartphones have taken over the phone market  Regulatory requirement support The world is changing – good guys are turning bad, your IP walks out the door every night in someone’s hands A sense of Privacy – wiretapping, illicit intercept, and  eavesdropping is easy, is cheap and it happens constantly Scandals –  The Famous - Woods, Favre, & Hilton  The Powerful - Congressmen, Politicians, Government Ministers, & Wealthy Protection of  Intellectual Property (IP) and Privacy Inexpensive and easy to use protection 2
© 2011 Protected Mobility No additional infrastructure required for: Everyone Texts – In Good Times and Bad 6.6 Trillion Texts Worldwide in 2010 Easy to intercept and view stored texts In adverse situations  Japan Earthquake & Tsunami, 9/11, 7/7, Katrina, Pakistani Flood, Tornado, etc.  Voice and Internet FAILED, BUT SMS/Texting stayed available for use. Critical communications to recover and respond. © 2011 Protected Mobility 3
© 2011 Protected Mobility The Problem & protectedSMS = Vulnerabilities The Cloud Web server Tower Tower Gateway Mobile Switching Center (GMSC) Mobile Switching Center  (MSC)  Short Message Service Center  (SMSC) ,[object Object]
AES256 / FIPS 140-2 / HIPAA
Reviewed and Tested by Federal Law Enforcement
No Changes to the User Experience
Text as usual and secure on standardsmartphone devices/network
Simple to install, easy to use, No Training Required
Messages are stored Encrypted
Even if someone is using spyware on the phone, they cannot read the text4
© 2011 Protected Mobility Cipher Text & Decrypted Text Screens – Blackberry Same conversation  appears as plain text in  protectedSMS Conversation appears as cipher text in native SMS reader © 2011 Protected Mobility 5
Available now July 2011 © 2011 Protected Mobility Solution Sets SMS Blackberry/Android/iPhone/Win7/iPads/Slates/PC/Netbook Enterprise Management System (EMS) File Protection  MMS  Picture Protection Video Protection Instant Messenger Summer/Fall 2011 © 2011 Protected Mobility
© 2011 Protected Mobility Cross Platform AND Cross Carrier (International Too) Blackberry Android iPhone iPad Windows Netbook/Laptop Tablets/Slates Mac PC/Linux 7
© 2011 Protected Mobility Secure Chat Screens – Android & Blackberry Android Message recipient and address book source phone number Blackberry Indicates message was sent secure Indicates message received secure © 2011 Protected Mobility 8
Protected Mobility Enterprise Center  (PMEC) © 2011 Protected Mobility Control Multiple Platforms From Single Device

More Related Content

Recently uploaded

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Featured

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Featured (20)

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 

Securing Your SMS (Texts) - Protected Mobility Slideshare Overview 07 19 2011

  • 1. Enabling the Mobile Workforce & Protecting theCorporate IP Cross Carrier and Cross Device Platform. Mark Lawrence – MarkL@protectedmobility.com www.protectedmobility.com © 2011 Protected Mobility
  • 2. © 2011 Protected Mobility The Challenges We Meet The Time is Now Smartphones have taken over the phone market Regulatory requirement support The world is changing – good guys are turning bad, your IP walks out the door every night in someone’s hands A sense of Privacy – wiretapping, illicit intercept, and eavesdropping is easy, is cheap and it happens constantly Scandals – The Famous - Woods, Favre, & Hilton The Powerful - Congressmen, Politicians, Government Ministers, & Wealthy Protection of Intellectual Property (IP) and Privacy Inexpensive and easy to use protection 2
  • 3. © 2011 Protected Mobility No additional infrastructure required for: Everyone Texts – In Good Times and Bad 6.6 Trillion Texts Worldwide in 2010 Easy to intercept and view stored texts In adverse situations Japan Earthquake & Tsunami, 9/11, 7/7, Katrina, Pakistani Flood, Tornado, etc. Voice and Internet FAILED, BUT SMS/Texting stayed available for use. Critical communications to recover and respond. © 2011 Protected Mobility 3
  • 4.
  • 5. AES256 / FIPS 140-2 / HIPAA
  • 6. Reviewed and Tested by Federal Law Enforcement
  • 7. No Changes to the User Experience
  • 8. Text as usual and secure on standardsmartphone devices/network
  • 9. Simple to install, easy to use, No Training Required
  • 11. Even if someone is using spyware on the phone, they cannot read the text4
  • 12. © 2011 Protected Mobility Cipher Text & Decrypted Text Screens – Blackberry Same conversation appears as plain text in protectedSMS Conversation appears as cipher text in native SMS reader © 2011 Protected Mobility 5
  • 13. Available now July 2011 © 2011 Protected Mobility Solution Sets SMS Blackberry/Android/iPhone/Win7/iPads/Slates/PC/Netbook Enterprise Management System (EMS) File Protection MMS Picture Protection Video Protection Instant Messenger Summer/Fall 2011 © 2011 Protected Mobility
  • 14. © 2011 Protected Mobility Cross Platform AND Cross Carrier (International Too) Blackberry Android iPhone iPad Windows Netbook/Laptop Tablets/Slates Mac PC/Linux 7
  • 15. © 2011 Protected Mobility Secure Chat Screens – Android & Blackberry Android Message recipient and address book source phone number Blackberry Indicates message was sent secure Indicates message received secure © 2011 Protected Mobility 8
  • 16. Protected Mobility Enterprise Center (PMEC) © 2011 Protected Mobility Control Multiple Platforms From Single Device
  • 17. © 2011 Protected Mobility 10 Take Control and Protect(PMEC)
  • 18. © 2011 Protected Mobility Protected Mobility Enterprise Center, (PMEC) The Enterprise Management System (EMS) Provides Control over active Protected Mobility Mobile Applications (SMS, MMS, file, etc.) Provides control over your Enterprise Policies and Practices - Key usage and storage including key renewal Secure relationship management One to Many secure communications Departmental or Project Specific assignments Adherence to Travel restrictions 11
  • 19. © 2011 Protected Mobility Enterprise Management made easy! Management Server (Physical or Virtual) NOT required for Protected Mobility messaging, only Management Sets and Stores Keys as well as Grouping of Keys Central Control for Operational Functions GPS/Carrier Location Reporting Secure Message/Data Wiping Time before Messages are securely wiped Secure Application Wiping Passphrase reset Interface to allow Auditing 12
  • 20. PMEC Screen Sample –Devices & Drop Down Menu © 2010-2011 Protected Mobility Manage All Users, Groups, Devices and Reporting from one Control Panel
  • 21. © 2011 Protected Mobility Examples of Enterprise Business Use Cases 14 On command - Wipe IP from devices Interface Corp Apps to make them secure Auto Authenticate Users Redefine the Control of Corporate Electronic IP Create a Web of Trust with Clients / Business Partners Specialized Closed Audit Designs Available Private Labeling for Enterprise Branding (IP – Intellectual Property)
  • 22. Examples of Deployed Business Use Cases © 2011 Protected Mobility Law Enforcement International, Federal, State and Local Routine and Special Ops Government Agencies Intelligence, Regulatory and Diplomatic Defense: COTS on the Battlefield First Responders Police, Fire, Medical and Transportation Finanical Institutions For Employee-to-Employee and Employee-to-Client Communications M&A, Compliance, Legal, Institutional Crisis Management Teams Energy & Mining Enterprises Companies
  • 23. © 2011 Protected Mobility For More Information Contact: Mark Lawrence Vice President of Sales MarkL@ProtectedMobility.com 16

Editor's Notes

  1. This slide depicts the Android and Blackberry protectedSMS handset screen.The secure contact name and phone number are displayed along with the Secure LOCK on both platforms.Highlight name identification and visual security reminder (padlock & “Secure”).This is an extremely easy to install and use secure applicationEmphasis is user friendly – all the encryption process occurs in the background. One application for both secure and standard SMS messages; protectedSMS can handle everyday standard SMS (clear text messages) and Secure protectedSMS so there is no need for another SMS app.The application can be configured by the user for password / pass phrase protection.Secure messages can only be sent to secure contacts that have registered to each other.All data in the protectedSMS application remains encrypted until accessed. Conversations are encrypted until accessed.