PTT Security

Secure communication by eliminating the risk
of interception from third parties

View case study

PoC APPLICATION

The importance of secured communications is clearly understood when any team is communicating privately and doesn’t want a third party to listen in. In order to achieve that, they need to communicate in a way that ensures eliminating the risk of interception. Mobile Tornado’s PoC platform is built with security by design principles, meaning confidentiality, integrity, and availability. The development of the PoC system, installation, and maintenance are carried out in accordance with the rules set out by the latest security standards.

SYSTEM REQUIREMENTS

Our products and services comply with the security and privacy requirements of GDPR, ISO 27000 and AES-256. Our security model can be represented by 4 layers: Physical, Logical, Data and Code. While physical excess is fully restricted and access to the management portal is protected by TLS, logical protection deployed over the firewalls, switches, load-balancers, and SBCs.

Security Protection

Mobile Tornado’s security methodology utilises several mechanisms, the main ones are as follows:

  • Deep packet inspection and rate limits enforcement by SBC
  • Segmentation and segregation of networks and functions
  • Limitation of unnecessary lateral communications
  • Personal address book protection and IM manipulation protection
  • Remote control of user device and strict hardening of network devices
  • IP, users ID, and packet authentication and protocol compliance validation
  • Voice stream encryption by AES-256 and continues validation of the integrity
  • Private keys support in KMS and Constant security audits

Download Mobile Tornado’s latest mobile and desktop app

Download here

Please get in touch for more information or support on any of the PTT solutions that we provide

Email support Email sales