Home About Company

SecureScrypt Server Dual Node

It is a common misbelieve that mobile phone calls cannot be wiretapped or become subject to intrusions and manipulations. Actually, some commercially available PC provides all the computing power to break the GSM encryption and to get access to the exchanged information. Thus, there is a high risk that calls can be tapped and confidential information may be misemployed.

Obviously, one can come around this threat by not applying mobile networks for such confidential or intimate calls. Considering our fast moving modern world this approach seems unworkably. Latest in business environments you will find that almost all information will be exchanged by mobile phone conversations without a care; time counts.

For business data applications applying public networks we consider the use of encryption technologies to be the common definition of IT security today. Mobile middleware components, like Iphone or other Smartphones, VPN software and routers, email signatures, etc., can be observed in most cases. But this statute for handling confidential data has not yet found the way into the awareness in public phone calls or GSM/mobile voice communications.

This status is quite remarkable since the rudimental character of the GSM encryption is well- known among experts, and it is not under the control of the user – in times of high network load the encryption may even be switched off totally by the network operator. It is a fact, that mobile voice communications can be tapped and monitored with minimum efforts.

This solution is the most secure solution, all Backend Components are installed in the Enterprise owned Data Center.

  • This solution offers the most advantages for the Enterprise: Following Enterprise internal IT Management Rules and Regulations
  • Peer to Peer secure Communication between Mobile Phones worldwide
  • Peer to Peer secure Communication between Mobile Phones and Fix Line Phones and Messaging
  • Secure Voice Conferences
  • Secure landing for communications from foreign countries
  • Global usage thru EDGE,3G, 4G, LTE, and WiFi/Wlan, as Wlan is the preferred securest Connection
  • 100% Cost Saving of International IDD and Roaming Charge
  • 100% Secure global messaging, no SMS charges
  • 100% Secure Enterprise internal email

Request a Live Demo

main features

Functionality for Mobile Applications

Our solution for everyone who has to work outside the office and therefore will exchange sensible information using public networks. In addition, the product offers the option to run conference calls applying mobile phones. Military-grade security at a reduced cost of ownership
Suitable for public institutions, military forces, police, emergency and political organizations
Customization options for security related functions, algorithms and parameters
Project-specific adaptations undertaken by a specialized team. Global installation thru the German SecureScrypt team. Global training.

No Configuration

The software will be installed using the synchronization software that comes with the mobile phone device; so there are no unknown procedures to run through. The only configuration required to run SecureScrypt is to setup Internet access on the applied device.

Request Appointment

Easy to Use

Trying to introduce security for mobile communications one has to place emphasis on user acceptance. All technical functionality is worthless in mobile environments if the users cannot handle it without long lasting manual studies, tests and try and error situations. The mother Company found in 1979 (BEI Germany) designed, implemented and operated radio communication networks large-scale around the world, on land, air and sea. Designed the first portable Satellite Phone with encryption in a mil-style Briefcase for Amazon and Africa expeditions, as well military operations.
Based on our extensive telecommunication background on both wired and wireless technologies coupled with a deep understanding of security and cryptography, SecureScrypt has been taken to the next levels of designing, running and operating secure communication networks worldwide.
Our expertise can serve your organization in the following areas:
Communications security
Infrastructure
Technology service offering
Operational considerations
We provide turnkey solutions and support our projects operationally from concept and design through to implementation, even after completion and handover.

Request Appointment

FIDOScrypt the ultimate level of Security

Strong Encryption is not enough or makes sense, if users careless operate their Smartphone and do not secure the access to the Phone. FIDOScrypt and SecureScrypt combined reach now a level of Security that will be impossible to breach. Password less, biometric access to the Phone, allows only its genuin owner to receive or send secure calls , messages, data, video, just anything else. With FIDOScrypt we have reached this highest possible level of Security. Our FIDO UAF based strong authentication framework enables online services and websites, whether on the open Internet or within enterprises, secure user authentication without the need of traditional passwords. It allows the transparent leverage of native security features in end-user computing devices for strong user authentication in order to reduce the problems associated with creating and remembering many passwords.It consists of the multifactor authentication client as well as server components enabling users to authenticate to any application or website using the existing security capabilities of their Smartphones, tablets or laptops..

Request Appointment

Security

Integral requirements on mobile communication systems are protections against inadmissible access to corporate network, applications and data and the secured transmission of all data between communication partners. SecureScrypt makes this possible.

Software-and/or Hardware solutions
Independent of mobile operators and suitable for any IP access type
All components managed entirely on customer premises
Compatible with a great variety of Smartphones and desktop PCs
High-Quality transmission in mobile networks and WiFi or even GPRS
Advanced security (multi-layer architecture with strong crypto-algorithms)
End-to-End encryption protecting data in-transit externally and internally
Centralized administration of users, devices and contacts
High-Availability platform with hot-standby operation

Request Appointment

Why SecureScrypt?

The Heartbeat of the Enigma Engine is the Dual Node Server with all Pre-Installed Software, hosted in the DataCenter of the Enterprise / Government ... untouchable even for SecureScrypt engineers after hand over. It was the sincere wish of our customers to have full management control over the server and we followed this wish. While others use public servers hosted somewhere and render any security therefore totally useless, SecureScrypt gives its customer peace of mind and the assurance that all secrets are 100% protected!

The Base of ALL SecureScrypt solutions is the enigma PS100 Security Card. It contains a special vaulted encryption Security Chip, which guarantees always the highest Security and Identification.

Works with worldwide standards - WiFi- 3G - 4G - LTE including user authentication, protection of all data, email, calendar, add ons, contacts etc. using a special transport encryption ...and it integrates with FIDOScrypt the worlds best authentication and verification system!

Application

Encrypted voice communications (focus: wireless networks)
1:1 calls and mobile conference calls (arbitrary number of participants)
Send chat messages, videos, pictures, audio and more to friends and business colleagues
Video Calls and Video Conference Calls possible (optional to standard version)
Contacts are identified automatically and securely in your address book
Strong authentication to prevent user impersonation with optional FIDOScrypt
Group chats, Create and manage groups and control who can join
Each call , National or International is always free of charge, no roaming or IDD charges
Optional unsecured calls available with no calling, roaming or IDD charges

Principles

VoIP based on UDP (connectionless)
State-of-the-art encryption mechanisms
No draw-backs in system integration and use of standard phone features
Compatible with a great variety of smartphones and desktop PCs
High-Quality transmission in mobile networks and WiFi
e.g. phone book / contacts synchronization
concurrent operation with other applications, common phone calls (not encrypted)

Handling

Intuitive graphical user interface and use of the standard function keys and Automatic connection establishment
NEW - Integration with FIDOScrypt - securing the Hardware / Mobile device access with Biometrics possible!

Supported Networks

Mobile: WiFi, UMTS, EDGE, GPRS, Fixed line: LAN (where suitable)
Integrating within the existing IT infrastructure seamlessly
All components managed entirely on customer premises
Centralized administration of users, devices and contacts

Secure Data Transmission

Military-Grade Encryption and Security Protocols
Highly classified information is secured via SwissSafe (SecureScrypt) Security Card (MicroSD)
Key exchange: Diffie-Hellmann 1024-4096 Bit
Advanced security (multi-layer architecture with strong crypto-algorithms)
User data encryption: AES 256 Bit
Secure Real-Time Contact List
Your enterprise can control and configure a separate business contact list.
Secured end-to-end connectivity (man-in-the-middle prevention)
Software-only and Hardware (SDCard) solution meeting highest Government Standards
Authentication: IMEI, verbal feedback of individual session fingerprints)
Centralized session management
Dynamic access control at the routing server
With no backdoors
And 100% fully verifiable source

Technology Partners