Mercury

Overview

More information of higher value is accessible via mobile devices and attacks on mobile platforms are increasing – exponentially. But mobile security levels are generally low, mostly being pinpoint solutions.

Mobile devices are built with security measures whereby the focus is on separations and restrictions in the system architecture and flow. To counter latest malware and trojans, these security measures are not enough.

  • Malware attacks use exploits in order to bypass mobile security
  • Factory security measures inhibit protection by standard applications
  • To deliver true security, solutions need access to the device’s OS and beneath it.
  • OS versions are re-written to fit specific device
  • Security level is same-same

Accessing the inner workings of the phone’s security mechanism, we enhance its security capabilities, expand its functionalities, and protect it, completely, from within.

Layered Approach

The layers of our comprehensive mobile security are:

  • Device Security
  • Anti-APT
  • Anti-forensics
  • Network Security
  • Avoids rogue networks
  • Obstructs eavesdropping
  • Communications Security
  • Secured P2P comms
  • Secured organizational comms
  • Management Application
  • Settings, configurations, alerts
  • On individual device and central management

Features

Unique Advantages

  • BYOD-compliant - enables use of any phone
  • Eliminates need for two devices
  • Looks like regular phone
  • Open garden approach – enjoy an unlimited mobile experience
  • Download any app from the store
  • Control all apps, including vendor/SP apps
  • Server-less secured communications
  • No single point of failure
  • Even the “SP” does not have access to content
  • Difficult to block
  • Software-based - seamless operation, built into OS
  • Encryption over native apps
  • Security always up and running

Your benefits

  • APT attacks will be detected and stopped
  • Interception and traffic manipulation attempts by rogue networks will be detected and stopped
  • If your phone is lost, stolen or confiscated - NO ONE can gain access or take information from the phone
  • If your location or identity needs to remain unknown, the phone can send misleading or false information

Deployments

Knowledge Base

Documents