The importance of secured communications is clearly understood when any team is communicating privately and doesn't want a third party to listen in. In order to achieve that, they need to communicate in a way that ensures eliminating the risk of interception.
Mobile Tornado's PoC platform is built with security by design principles, meaning confidentiality, integrity, and availability.
The development of the POC system, installation, and maintenance are carried out in accordance with the rules set out by the latest security standards. Our products and services comply with the security and privacy requirements of GDPR, ISO 27000 and AES-256.
Our security model can be represented by 4 layers: Physical, Logical, Data and Code. While physical excess is fully restricted and access to the management portal is protected by TLS, logical protection deployed over the firewalls, switches, load-balancers, and SBCs.
Mobile Tornado's security methodology utilizes several mechanisms, the main ones are as follows:
Deep packet inspection and rate limits enforcement by SBC
Segmentation and segregation of networks and functions
Limitation of unnecessary lateral communications
Multiple factor subscriber authentication
IP, users ID, and packet authentication
Voice stream encryption by AES-256
Continues validation of the integrity
Strict hardening of network devices
Personal address book protection
Protocol compliance validation
Remote control of user device
Private keys support in KMS
Voice recording encryption
IM manipulation protection
Constant security audits