THE BYOD SMARTPHONESECURITY PROTECTION SOLUTION FOR TELCO, ENTERPRISE AND GOVERNMENT
Networks presents the only all-in-one
ANTI-TAPPING / ANTI-HACKING / THREAT MANAGEMENT
solution for comprehensive protection of BYOD smartphones.
Networks’ solution provides protection to:
ENTERPRISE, GOVERNMENT and the TELECOMMUNICATIONS INDUSTRY.
![](http://isasecurity.org/wp-content/uploads/2021/02/cropped-123.png)
Smartphones are exposed to constant cyber threats.
Tapping
Eavesdropping—either at the access network or the switch.
Hacking
Data theft, malicious software or use of the device as a backdoor into the corporate network
![](http://isasecurity.org/wp-content/uploads/2021/02/A56.png)
The only anti-hacking, anti-tapping& threat management protection for Bring-Your-Own-Device smartphones.
Anti-tapping
Point-to-any-point, military-grade voice and text message encryption and eavesdropping prevention.
Anti-hacking
Cyber-attack, data theft and malware detection and prevention
Threat Management
Robust, AI-powered threat management with a user-friendly dashboard
![](http://isasecurity.org/wp-content/uploads/2021/02/A55.png)
An intuitive, easy-to-use managementdashboard that centrally controls allShieldiT features
v Complements ShieldiT
v Allows CISOs to control and monitor the security of smartphones
v Control access to the premium “international calls” feature
v Manage encryption keys
v The synergy of ManageiT & ShieldiT affords corporations the ability to control and conduct incident response from the management console.
![](http://isasecurity.org/wp-content/uploads/2021/02/cropped-12345.png)
“Assac Networks offers a secured smartphone solution for a fraction of the cost of an encrypted phone which sells for thousands of dollars per device. ShieldiT is the leading secure and affordable smartphone protection for enterprise users.”
v Unified managed Anti-hacking and Anti-tapping solution for BYOD Smartphones
v Fully controlled Encryption with autonomous CA
v High Level Cyber Protection
v Easy and rapid smooth Integration with corporates network
v Affordable, best price performance
![](http://isasecurity.org/wp-content/uploads/2021/02/A12.png)
ShieldiT and ManageiT are easily integrated into existing ITinfrastructures
v Voice networks (PBX): integration via the Assac Gateway
v Computer networks: integration via the SIEM (QRadar) and MDM policy enforcement (IBM)
![](http://isasecurity.org/wp-content/uploads/2021/02/A22.png)
Four major telecommunications companies POCs with Telefonica & Telkomsel
Business Model
v Fixed Price or Revenue Share (following a POC)
Subscription Period
v Minimum one year
Services Offered
v Complete cloud-based combined license w/ SDK for operators
v Virtual machine running on operator’s network
v Bulk end-user license for ShieldiT app
v Manager’s license for ManageiT console included
v Full OEM
v Integration with telco switch for PSTN calls
![](http://isasecurity.org/wp-content/uploads/2021/02/A31.png)
Enterprise Benefits
Business Model
v SaaS (Software as a Service)
Subscription Period
v One or three years
Services Offered
v End-user license for ShieldiT app
v Manager’s license for ManageiT console
![](http://isasecurity.org/wp-content/uploads/2021/02/A32.png)
Keeping Sensitive Government Communications Confidential
Business Model
v Leveraging long-term relationships and reputation of Assac Networks, sold through defense system integrators
Contract Duration
v Three years
Services Offered
v On-premise or cloud deployment
v End-user license for ShieldiT app
v Manager’s license for ManageiT console
v Professional services (CA, OEM, additional equipment, etc.)
![](http://isasecurity.org/wp-content/uploads/2021/02/A321.png)