PTT Security

The importance of secured communications is clearly understood when any team is communicating privately and doesn't want a third party to listen in. In order to achieve that, they need to communicate in a way that ensures eliminating the risk of interception. 

Mobile Tornado's PoC platform is built with security by design principles, meaning confidentiality, integrity, and availability. 
The development of the POC system, installation, and maintenance are carried out in accordance with the rules set out by the latest security standards. Our products and services comply with the security and privacy requirements of GDPR, ISO 27000 and AES-256.

Our security model can be represented by 4 layers: Physical, Logical, Data and Code. While physical excess is fully restricted and access to the management portal is protected by TLS, logical protection deployed over the firewalls, switches, load-balancers, and SBCs. 

Mobile Tornado's security methodology utilizes several mechanisms, the main ones are as follows:

  • Deep packet inspection and rate limits enforcement by SBC

  • Segmentation and segregation of  networks and functions 

  • Limitation of unnecessary lateral communications

  • Multiple factor subscriber authentication

  • IP, users ID, and packet authentication 

  • Voice stream encryption by AES-256

  • Continues validation of the integrity

  • Strict hardening of network devices

  • Personal address book protection

  • Protocol compliance validation

  • Remote control of user device

  • Private keys support in KMS

  • Voice recording encryption

  • IM manipulation protection

  • Constant security audits

We’d love to hear from you


Whether you have a question about features, need a demo, or anything else, our team is

ready to answer your questions