THE BYOD SMARTPHONESECURITY PROTECTION SOLUTION FOR TELCO, ENTERPRISE AND GOVERNMENT


Networks presents the only all-in-one 

ANTI-TAPPING / ANTI-HACKING / THREAT MANAGEMENT
solution for comprehensive protection of BYOD smartphones.

 

Networks’ solution provides protection to:

 ENTERPRISE, GOVERNMENT and the TELECOMMUNICATIONS INDUSTRY.

Smartphones are exposed to constant cyber threats.

Tapping

Eavesdropping—either at the access network or the switch. 

 

Hacking

Data theft, malicious software or use of the device as a backdoor into the corporate network

The only anti-hacking, anti-tapping& threat management protection for Bring-Your-Own-Device smartphones.

Anti-tapping

Point-to-any-point, military-grade voice and text message encryption and eavesdropping prevention.

 

Anti-hacking

Cyber-attack, data theft and malware detection and prevention

 

 Threat Management

Robust, AI-powered threat management with a user-friendly dashboard

An intuitive, easy-to-use managementdashboard that centrally controls allShieldiT features

v Complements ShieldiT

 v Allows CISOs to control and monitor the security of smartphones

v Control access to the premium “international calls” feature

 v Manage encryption keys

v The synergy of ManageiT & ShieldiT affords corporations the ability to control and conduct incident response from the management console.

“Assac Networks offers a secured smartphone solution for a fraction of the cost of an encrypted phone which sells for thousands of dollars per device. ShieldiT is the leading secure and affordable smartphone protection for enterprise users.”

v Unified managed Anti-hacking and Anti-tapping solution for BYOD Smartphones

v Fully controlled Encryption with autonomous CA

v High Level Cyber Protection

v Easy and rapid smooth Integration with corporates network

v Affordable, best price performance


ShieldiT and ManageiT are easily integrated into existing ITinfrastructures

v Voice networks (PBX): integration via the Assac Gateway

v Computer networks: integration via the SIEM (QRadar) and MDM policy enforcement (IBM)

Four major telecommunications companies POCs with Telefonica & Telkomsel

Business Model

v Fixed Price or Revenue Share (following a POC)

 

Subscription Period

v Minimum one year

 

Services Offered           

v Complete cloud-based combined license w/ SDK for operators       

v Virtual machine running on operator’s network

v Bulk end-user license for ShieldiT app

v Manager’s license for ManageiT console included

v Full OEM

v Integration with telco switch for PSTN calls

Enterprise Benefits

Business Model                

v SaaS (Software as a Service)

 

 Subscription Period  

v One or three years

 

 Services Offered            

v End-user license for ShieldiT app

v Manager’s license for ManageiT console

Keeping Sensitive Government Communications Confidential


Business Model 

v Leveraging long-term relationships and reputation of Assac Networks, sold through defense system integrators

 

Contract Duration

v Three years

 

Services Offered

v On-premise or cloud deployment

v End-user license for ShieldiT app

v Manager’s license for ManageiT console

v Professional services (CA, OEM, additional equipment, etc.)