Bittium Tough Mobile 2

Buy now

New Standard for
Ultra Secure Mobile Communications

Designed and built for professionals with the highest security requirements
Trusted by organizations in more than 50 countries
Data secured at all times with multilayered security integrated in hardware and source code
Designed and manufactured in Finland
Play video ►
Bittium Tough Mobile 2
Ultra secure professional and personal use within the same device without compromising usability.
Play video ►

Comprehensive End-to-End Mobile Security

Keep your data secured with multilayered security integrated in hardware and software of the Bittium Tough Mobile 2 smartphone. For complete end-to-end mobile security, complement the device with Bittium Secure Suite™ device management and encryption software product.

Bittium Tough Mobile™ 2 + Bittium Secure Suite™

What you get with
Bittium Secure Suite™

Bittium Secure Suite is an advanced software product that complements Bittium Tough Mobile 2 with a full set of services for secure communications. It requires installation of a server software, which is provided either as a dedicated IT service or hosted by the customer.

For users with Bittium Secure Suite™
Audit logs for security related events
Remote wipe of device
Remote attestation
Application whitelisting support
Bittium SafeMove® MDM support
Bittium SafeMove® Mobile VPN to encrypt data in transit
Hardened password policy
Multicontainer feature

Read more View specs Start a trial





Security Without
Compromising Usability

Keep your data safe at all times

Next generation tamper detection for preventing data theft and spying
Hardware-based privacy mode for disabling microphones, cameras, Bluetooth, and reducing sensor sensitivity
Trusted boot with hardware and software integrity validation
Designed to be certified for RESTRICTED and CONFIDENTIAL
Ability to secure device and data in transit with Bittium Secure Suite™ device management and encryption software product
Trusted design and manufacturing in Finland
Available in three variants, and with or without Google Mobile Services

Bittium Secure Call™ - Application for Encrypted End-to-End Communication

Bittium Secure Call™ is a secure voice, video and messaging application with end-to-end encryption. The communication application is designed for enterprise, government and other professional users, and is available for Android™ and Windows platforms.

The application supports deployment in commercial and private networks with no dependency on public Internet or cloud services. It can be deployed and fully managed by the user organization.

Bittium Secure Call can be complemented with Bittium Secure Suite™ to offer device security management and the use of an additional VPN layer to provide dual encryption for secure communication.

The Bittium Secure Call communication application covers end-to-end encrypted voice and video calls, group calls, messages with attachments (picture, voice memo, video, contacts, voice messages), group messaging, and a feature that destroys messages after a predefined time.

Read more


Take it to the next level

Professional & powerful

  • Hardened Android™ 11 (or newer)
  • Qualcomm® Snapdragon™ 670 chipset
  • Global connectivity
  • Dual SIM
  • Embedded 3000mAh battery
  • High-quality speakers
  • Multi-microphone active noise cancellation
  • 12MP autofocus rear-facing and 5MP front-facing cameras
  • MIL-STD-810G shock and drop resistant
  • IP67 water and dust resistant
  • 5.2” sunlight readable full HD display
  • Glove & wet usable capacitive touchscreen
  • Privacy mode, emergency and push-to-talk buttons
  • Latest commercial features

Security for Professional and Personal Use

Several isolated and secure workspaces with the Multicontainer feature and Bittium Secure Suite™

Workspace 4

Workspace 3

Workspace 2

Workspace 1

Home screen

Next Previous
Available for customers using Bittium Secure Suite™

Bittium Tough Mobile™ 2 Tactical for Soldier Mobile Communications

Complete Solution for Soldier Mobile Communications

The ultra secure and rugged Bittium Tough Mobile™ 2 smartphone and its secure software solutions together with the Bittium Tough SDR Handheld™ tactical radio and dedicated accessories from Bittium Tough Mobile™ 2 Tactical­­ – a complete solution for soldier mobile communications.

Tough Mobile 2 Tactical is compatible with different battle management systems, which enables real-time and efficient creation and sharing of situational awareness in tactical networks. The Tough Mobile 2 smartphone offers the soldier a wider range of applications to be used in tactical networks and the smartphone´s big display enables a better user interface compared to traditional soldier radios.

Read more

Bittium Tough Mobile™ 2 Tactical Complete Solution

Complete Tactical Solution

Your privacy is ensured when green LED blinks

Press and hold button to activate privacy mode

Unique Hardware-Based Privacy Mode

Privacy mode allows simultaneous use of the device, while protecting from:

  • Ambient listening by disconnecting microphones from the phone
  • Bluetooth sniffing by disabling Bluetooth
  • Camera spying by disabling device cameras
  • Sensor-based spying by reducing sensor accuracy

Three Variants

There are currently three different Bittium Tough Mobile 2 variants available, all providing a different level of security. These variants are based on the same hardware, including the security layers built in the device.

Bittium Tough Mobile 2

With Google Mobile Services
For complete end-to-end mobile security, complement the device with Bittium Secure Suite™ device management and encryption software product. Buy here.

Bittium Tough Mobile 2

Without Google Mobile Services
For complete end-to-end mobile security, complement the device with Bittium Secure Suite™ device management and encryption software product. Buy here.

Bittium Tough Mobile 2 C

Two separated operating systems
Requires Bittium Secure Suite™ device management and encryption software. Certified for CONFIDENTIAL level (NCSA-FI, TL III). Buy here.

Operating system
  • Android™ 11
  • Available with or without Google Mobile Services
Chipset Qualcomm® Snapdragon™ 670
Memory 4GB RAM / 64GB eMMC. MicroSD expansion slot up to 256GB.
  • 5.2” Full HD sunlight readable
  • Glove & wet usable capacitive touchscreen
Imaging & Video
  • 12MP autofocus rear-facing and 5MP front-facing cameras
  • 4K and Full HD video
  • High-quality front-facing dual speakers (109dB@5cm SPL)
  • Multi-microphone active noise cancellation
Physical Buttons
  • Privacy mode activation
  • Emergency button (programmable, use as emergency button requires a separate application providing the functionality)
  • PTT/PTV (programmable, use as PTT/PTV button requires a separate application providing the functionality)
  • Power/wake-up
  • Volume up and down
LTE and Bands 3GPP Rel 12
Dual SIM dual VOLTE (DSDV)
FDD bands: 1, 2, 3, 4, 5, 7, 8, 12, 13, 14, 17, 20, 25, 26, 28, 29, 30, 66
TDD bands: 38, 39, 40 (34, 41 optional)
UMTS/HSPA Bands B1, B2, B4, B5, B8
GSM/GPRS/EDGE Bands 850/900/1800/1900 MHz
Complementary Radios Wi-Fi 802.11 a/b/g/n/ac (2.4 and 5Ghz)
BT5.0, NFC

*U-NII-3 Wi-Fi channels are not supported

For all Bittium Tough Mobile™ 2 users
  • All data in the device is encrypted with AES-256 encryption (including the memory card, when used in adoptable storage mode)
  • Dedicated secure element (chipset) for storing security keys and providing functionality for encryption and user authentication
  • Backup battery allowing monitoring of the device security and tamper detection at all times, even when the main battery has ran out
  • Android™ 11 operating system with hardened security
  • Hardware-based Privacy Mode preventing ambient listening and spying of user/user environment
  • Hardware tamper detection preventing data theft and device implanting attempts
  • Secure boot, device HW and SW integrity check during boot
  • Disabled debug interfaces preventing attacks against device security
  • Device OS rollback prevention – not possible to use older device firmware for attacking the device
  • Die shield sensor in secure element to protect from physical intrusion and electromagnetic signal sniffing
  • Environmental attack protection in secure element preventing e.g. cryo/cold attacks and power glitch attacks
  • Application permission control – users can allow only trusted applications to access device data and functionality
  • User originated fast wipe of device data
For users with Bittium Secure Suite™
  • Audit logs for security related events
  • Remote wipe of device
  • Remote attestation
  • Application whitelisting support
  • Bittium SafeMove® MDM support
  • Bittium SafeMove® Mobile VPN to encrypt data in transit
  • Hardened password policy
  • Multicontainer feature

Desktop Stand

Vehicle Holder

Protective Case

Vehicle Holder with Charging and ext Antenna

Wired Remote Speaker Microphone EU

Lite COM Wired PTT Headset, Hold to Talk

Rugged Power Pack USB-C/USB-A

PTT Voice Responder

PTT Smart Button

Wall charger with USB cable

Wall charger with UK, EU and US adapters


Does Bittium Tough Mobile 2 differ from a regular smartphone?


Bittium Tough Mobile 2 differs from a standard off-the-shelf smartphone as it is designed for secure use.

For example, it has a dedicated secure element storing encryption keys and performing cryptographic operations. The Android 10 based operating system’s security is hardened by Bittium to utilize the dedicated hardware secure element.

It has a mechanical and electrical concept that has been designed to provide a long lifespan for the device. Bittium will also provide software security updates longer than what is usual for regular consumer smartphones.

The phone also has a unique hardware-based privacy mode for disabling microphones, cameras, Bluetooth, and reducing sensor sensitivity with a touch of a button.

Who can buy the phones and where?


Bittium secure communications solutions, including Bittium Tough Mobile 2 smartphones, are available from selected reseller and system integrator partners.

Bittium Secure Call and Bittium Secure Suite require installation of a server software, which is provided either as a dedicated IT service, or as an on-site solution hosted and managed by the customer.

Buy here.

Where are the phones manufactured?


Tough Mobile 2 smartphones are designed and manufactured in Finland. Manufacturing is supervised by Bittium and can be audited for certification purposes.

Can Tough Mobile 2 be used in commercial networks?


Yes, Tough Mobile 2 can be used in commercial networks as well as in private networks.

In which countries can I use Tough Mobile 2?


Tough Mobile 2 can be used globally and it supports the majority of the used cellular bands. For additional details of the supported bands, please see the supported bands in the Tough Mobile 2 datasheet or in this website’s Connectivity Highlights section.

What does Tough Mobile 2’s “long lifespan” mean?


The phone has a mechanical and electrical concept that has been designed to provide a long lifespan for the device. For example, it has military-grade durability (MIL-STD-810G) and in addition, Bittium provides operating system and software security updates longer than what is usually provided for regular smartphones.

Can I use any Android application with Tough Mobile 2?


Yes, Tough Mobile 2 is verified by Google and it is compatible with all Android applications available for Android 11 or newer.

Can Tough Mobile 2 be customized?


Yes, Tough Mobile 2 can be customized when buying larger quantities. Please contact us for further details.

Can I get Tough Mobile 2 without Google Mobile Services?


Yes, there are two variants of Tough Mobile 2 available:

1) Tough Mobile 2 with Google Mobile Services (like Google Play, Gmail, Maps) if you wish to utilize Google’s services.

2) Tough Mobile 2 without Google Mobile Services, if you don’t want to utilize Google’s services.

When using the Tough Mobile 2 variant without Google Mobile Services and Google Play, am i able to install applications?


If your organization has Bittium Secure Suite software product and its back-end server in use you can install approved Android applications through the Application Library.

If you don’t have Bittium Secure Suite with the server environment available, it is possible to use different 3rd party application stores for installing apps or side load them via Bluetooth or USB (as APKs). Please note that some applications may require Google (GMS) API’s, which are not available in Tough Mobile 2 without Google Mobile Services. Therefore, those applications may not work properly or even cannot be installed.

Can I receive further details about mobile security and specific product features?


All publicly available product information is on our website. More detailed technical information, training and dedicated customer support is available for B2B customers under Non-Disclosure-Agreement (NDA). 

How long will the security updates be available?


Bittium Tough Mobile 2 is guaranteed to have a long life cycle and support for security updates. Device security updates will be available minimum until year 2024.


What does "ultra secure" mean?


Ultra secure means that the device has been designed to meet even the highest governmental grade security requirements.

Tough Mobile 2 has been designed for ultra secure use, starting from tamper-proofed mechanics to always-on security monitoring of electronics and hardened software solutions utilizing the Android operating system.

Ultra security is always based on hardware originated tamper proof security solutions.

Bittium ultra security also means that the device has been designed and manufactured by a trusted vendor in Finland.

What does Tough Mobile 2’s “multilayered security” mean?


Tough Mobile 2’s security is built in layers, both in hardware and software.

The security built in the hardware protects data at rest. Security starts from the design and manufacturing of the device, including a hardware secure element that for example stores all authentication data and encryption keys. For software-based security Bittium offers Bittium Secure Suite™ full set of services for securing the data in transit.

What does Tough Mobile 2’s dedicated hardware secure element do?


The hardware secure element provides for example user authentication services for Android, stores device encryption keys and provides cryptographic operations. If the Android OS becomes compromised with malware with access to everything, it still would not be able to access the contents of the secure element.

Secure element also controls the tamper detection feature of the device – even if the device’s main battery has run out. The secure element is powered by its own backup battery.

How is data in Tough Mobile 2 encrypted?


All data in Tough Mobile 2 is encrypted with AES-256 encryption. Tough Mobile 2 supports also encryption for data in SD cards. Data in transit can be encrypted with Bittium SafeMove® Mobile VPN included in Bittium Secure Suite.

How is Tough Mobile 2 tamper-proofed?


Tough Mobile 2’s secure element detects if someone is trying to for example drill, open, disassemble, or precision cut the device. If tampering is detected, the secure element cryptographically erases all data from the device, even if the main battery has ran out of power. The secure element is powered by its own rechargeable backup battery.

How is Tough Mobile 2 protected from unwanted hardware implants?


Tough Mobile 2 is tamper-proofed, which means that the phone detects if it is dismantled or the SIM slot is opened. For security reasons all data is cryptographically erased in case of dismantling. When the SIM slot is opened, device locks instantly and only the device’s original user can dismiss notification of SIM slot opening by authenticating to the device and continue using the device.

How is Tough Mobile 2 protected from malicious firmware?


Tough Mobile 2 can be used only with Bittium signed firmware delivered by Bittium. Device utilizes secure/trusted boot, OS rollback prevention and the device is non-rootable. In each start up the device checks firmware and hardware integrity. To provide additional security layer, Bittium Secure Suite can be used to remotely attest the device firmware and hardware.

What does Bittium Secure Suite provide and how can I take it into use with Tough Mobile 2?


Bittium Secure Suite is an advanced software product that complements Bittium Tough Mobile 2 with a full set of services for secure communications, including MDM, VPN, remote attestation and application whitelisting. It is available for both private and public organizations, and requires installation of a back-end server, which is provided either as a dedicated IT service or hosted by the customer.

Please contact us to start a trial.

Is VPN included with Tough Mobile 2?


Tough Mobile 2 has Bittium SafeMove® Mobile VPN client software pre-installed. The complementary Bittium Secure Suite software product for Tough Mobile 2 is required to utilize that VPN client to secure data in transit. Please contact us for more information and for starting a Bittium Secure Suite trial.

Tough Mobile 2 device supports also any 3rd party VPN solutions supported by Android operating system.

What does the Multicontainer solution do?


Multicontainer solution enables several isolated workspaces within the same Tough Mobile 2 device preventing data contamination between applications/services located in container workspaces. With Multicontainer, it is possible to use classified data and services from several separate organizations as each container workspace isolates applications, data and network traffic from all
other workspace containers. Device can also be used as personal smartphone as workspace containers can be used also to isolate personal applications, data and network traffic from work data.

Services within the workspaces are protected and managed with Bittium Secure Suite. Services in workspace containers can connect to isolated back-ends via container-specific VPN tunnels, providing unique data-in-transit protection for each workspace.

How can I enable the Multicontainer solution?


Multicontainer solution is enabled with the Bittium Secure Suite back-end system as each container uses its own VPN tunnel and server environment for isolating and encrypting data in transit. Please contact us to get the complete solution for your organization.

How can I create a single container in Tough Mobile 2?


User can create a single container without the requirement for using the device management (Bittium Secure Suite) capabilities and Secure Suite license. The container can be created by using the SafeMove application readily available on the device.

First you need to check that you have downloaded and installed the latest system updates in order to take one Container into use, go to Settings -> System -> Advanced -> System updates -> Check now.

After that, you are able to create one container, go to SafeMove application -> press “three stripes” from the top left corner -> Create container -> Provision later.

What does the hardware-based Privacy Mode mean and how does it work?


With Privacy Mode the user can prevent eavesdropping and spying through device by disabling microphones, Bluetooth, cameras and reducing sensor accuracy on the device at the hardware-level. Privacy Mode can be activated/deactivated by pressing and holding the privacy button, which is the topmost button on the right-hand side of the phone. A green indicator light starts blinking on the front side of the phone when Privacy Mode is active.

How can I make encrypted calls with Tough Mobile 2?


A separate application is needed for making encrypted calls with Tough Mobile 2. Please contact us for more information.

How is Tough Mobile 2’s operating system hardened?


For example, Tough Mobile 2’s security/encryption key management, user authentication and true random number generation are moved from Android to Bittium hardware-based secure element. If you would like to discuss what additional hardenings have been made, please contact us.

How can I quickly erase all my data from the phone in emergency situations?


Tough Mobile 2 is provided with a Fast Wipe functionality to erase all data in emergency situations. User can trigger Fast Wipe from drop-down menu by pressing the red Fast Wipe icon and giving the device PIN.

How do I get security updates to Tough Mobile 2?


All Tough Mobile 2 updates are delivered Over-The-Air (OTA). The device will check the availability of software updates automatically and inform you when an update is available. User can decide when to download and install the software update.

Can Tough Mobile 2 be security certified for national security purposes?


Yes, Tough Mobile 2 has been designed to be certified for national security purposes. Device and manufacturing audits are possible for certification purposes.


How can I activate the Emergency button?


Use of the emergency button requires a separate application providing the functionality. When the suitable application supporting Bittium emergency button has been installed, go to Settings → Buttons → Emergency Button Function and select Emergency application from the list.

How can I activate the Push-To-Talk button?


Use of the PTT/PTV button requires a separate application providing the functionality. When the suitable application supporting Bittium PTT button has been installed, go to Settings → Buttons → PTT Button Function and select PTT application from the list.

What does “MIL-STD-810G” mean?


MIL-STD-810G is a US military standard that defines a broad set of environmental (such as shock, vibration, temperature, humidity) requirements for mobile devices that are designed for use in harsh environments. Tough Mobile 2 has been tested against the MIL-STD-810G shock and drop standards.

What does “IP67 water and dust resistant” mean?


IP67 level water and dust resistant means that the device is built to be protected from dust and is operational after being submerged in 1 meter of water for 30 minutes. IP67 does not mean that device is designed to be used underwater.

Does the device support dual-SIM functionality?


Yes, Tough Mobile 2 supports Dual SIM Dual Standby and has dual nano-SIM slots.

Can the internal memory/storage be expanded?


Yes, Tough Mobile 2 has a combined nano-SIM/MicroSD expansion slot which can be used to provide up to 256GB of additional memory/storage.

Does the device support external keyboard and display?


Yes, Tough Mobile 2 supports external keyboards and displays via its USB-C connector.

How can I take screenshots with Tough Mobile 2?


You can take screenshots by pressing and holding the Power button until pop-up menu appears. From pop-up menu select “Screenshot”. If containers are enabled, taking screenshots is disabled by default.

What is the battery size/life for the device?


Tough Mobile 2 has a 3000mAh embedded battery. Due to the device’s highly optimized power management, it will provide up to 460h standby time and up to 20h talk times. Actual results may vary depending on usage and environmental factors.

To make your battery last longer, you have multiple options.

Turn off tethering and hotspots when you’re not using them, go to Settings -> Network & Internet -> Hotspot & tethering -> Wi-Fi hotspot.

Turn off your Wi-Fi and Wi-Fi scanning when you are not using them, go to Settings -> Network & Internet -> Wi-Fi.

Turn off your Bluetooth when you are not using it, go to Settings -> Connected devices -> Connection preferences -> Bluetooth.

Turn off location when it is not necessary, go to Settings -> Security & location -> Location. Note that some applications and features don’t work without location services.

Turn off Google apps automatic downloads and updates;

go to Google Play -> Settings -> App download preference -> Ask me every time.
go to Google Play -> Settings -> Auto-Update apps -> Don’t auto-update apps.

Which charger plugs are provided with the phone?


Bittium can provide Tough Mobile 2 with either EU, UK or US charger plugs.

How can I activate the Recovery mode?


Make sure the device is powered off.

Press ‘volume up’ button and keep it pressed -> press the ‘power’ button shortly and release it.

You should now enter the screen where you see an Android robot icon and text ‘no command’.

-> Release ‘volume up’ key -> press the ‘power’ key, keep it pressed and press shortly ‘volume up’ key -> release ‘power’ key.

You should now enter the recovery menu where you can perform a factory reset. Use volume up and down keys for navigation, ‘power’ key for menu item selection.

Note: If ‘power’ key is pressed over 10s, the phone will automatically restart.  Start over from the beginning if this happens.


How long is the product warranty?


Product warranty for Bittium Tough Mobile 2 is one (1) year, including all accessories provided in the sales box, against defects in materials or workmanship. If the device is found to be defective within the one year warranty period, Bittium will repair or replace it with a new or refurbished device, at its option, at no charge to the customer, except as set forth below.

This warranty does not cover cosmetic damage, or device failure caused by liquid damages, or damage due to misuse, abuse, negligence, accident, modification or disassembly of any part of the device. The warranty does not cover damage due to improper operation or maintenance, connection to improper voltage supply, or attempted repair by anyone other than a facility authorized by Bittium to service this Tough Mobile 2.

Can the product warranty be extended?


Yes, private and public organizations can purchase Extended Warranty for additional 12-36 months. Please contact us for more information.

How do I update the software on my Tough Mobile 2?


All Tough Mobile 2 updates are delivered Over-The-Air (OTA). The device will check the availability of software updates automatically and inform you when an update is available. You can decide when to download and install the software update.

To manually check the availability of updates from your Tough Mobile 2, go to Settings → System → Advanced → System Updates → Check now.

How can I change the battery?


Bittium offers a replacement service if there is a need to replace the battery. Distributors and partners, please visit the Bittium Tough Mobile Support Portal for Partners to submit service requests. If you do not have an account for the Support Portal, please fill the Bittium Tough Mobile Support Request Form to make your service request.

Who can I contact for product support and maintenance?


Please first read through all the FAQ and Support information on the Tough Mobile 2 webpage.

If your problem is not solved, distributors and partners please visit the Bittium Tough Mobile Support Portal for Partners to submit error reports, support requests, service requests, and feature requests. If you don’t have an account for the Support Portal, please fill the Bittium Tough Mobile Support Request Form to make your support request.

Top performance and innovation strength, everything in service of a common goal, delivering a high-quality product to professionals who depend on these products under all circumstances. Abiom contributes its innovative products and services to a better service of the public security and associated to a higher quality of safety for the citizen. The knowledge and expertise in the area of radio communication, mobile data and light and sound systems makes Abiom your central point of contact for communication and mobility issues. Our company is fully qualified to advise, build-in and service all products/solutions. If the right solution is not available in your situation, we will develop it for you.

For further information, visit:

For twenty years Ardaco has been at the forefront of developing information and communication technology to help organizations communicate securely and efficiently. A leader in the field, and dedicated to innovation, Ardaco has created communication platforms and secure document handling which place the customer in complete control.

Silentel is comprehensive mobile communication security solution based around a secure server located with you or with Ardaco. Silentel is fast to implement by all of your selected users and then the ability to talk, message, chat and group chat, send images, documents and any other files securely.

For further information, visit:

Armour Communications Limited provides market leading technology for secure communications solutions for voice, video, messaging and data on everyday smartphones and tablets.

Supplying Government, Enterprise and Finance markets with an easy to use, intuitive app, downloadable from the app stores and compatible across Android and iPhone, with optional PBX integration for landline connection. Delivering advanced security techniques and functionality for a highly scalable cloud-based service or an on-premises solution providing customers complete control and privacy of their communications.

Armour´s product offerings include FIPS, NATO and CPA approved solutions to OFFICIAL-SENSITIVE, with additional security layers to mitigate threats up to SECRET.

For further information, visit:

Beatrice Technologies, Inc. is dedicated to bringing you quality and reliability in technology, with advanced products that help leverage your business critical communications. Beatrice is committed to providing quality and reliability to all our customers.

For further information, visit:

With over 15 years’ experience of helping governments and businesses secure their valuable data, Becrypt has a long heritage of providing enterprise data protection solutions to the most security conscious organisations. Innovating to provide the highest levels of product assurance, our data protection solutions allow diverse platforms to be adopted within the enterprise with confidence. Working with device manufacturers, we deliver comprehensive mobile security as a seamless user experience that supports productivity without compromising protection.

For further information, visit:

Danoffice IT provides professional and efficient IT & IS turnkey solutions to international organizations and businesses operating worldwide with its one-stop-shopping platform including a large number of high quality brands, skilled certified personnel and added value services.

Danoffice IT elaborates on 22 years of experience exclusively supplying and servicing hardware to international organizations, governmental and non-governmental organizations and business-to-business partners HQ, operating globally. Your business, our passion – are the keywords which define Danoffice IT worldwide. Danoffice IT strive for excellence and appreciate the importance of being a flexible and reliable partner, offering tailor-made IT & IS solutions.

For further information, visit:

DEC offers complete peace of mind when it comes to the privacy and safety of your information. With over 40 years of experience and partners in 48 countries, we help our clients make their communications private with a top-level mobile device and software communication platform – DEC Secure. DEC Secure includes Secure Call, Secure Zone and Secure VPN and provides multiple layers of security to ensure that all your communications needs are met.

For further information, visit

Dencrypt A/S is a danish company specialising in dynamic encryption of data communication with focus on combining a user-friendly operation with state-of-the-art encryption technology. Dencrypt´s solutions provide an effective protection against eavesdropping and industrial espionage and targets companies and organisations for whom protection of confidential information, critical technology or customer relations is important. Dencrypt is on the market with the DC1000 SecureTalk solution for encrypted voice and chat and delivers to the Danish Armed Forces, government offices and private companies.

For further information, visit:

Etherstack is a mission-critical communications technology company specialising in TETRA, DMR, P25 and PTT over LTE.

Etherstack engineers apply state-of-the art innovation to public safety radio while keeping it secure and reliable. Achievements include the world´s first all-IP PTT core switching infrastructure, protocol stack licensing to over 70% of public safety radio manufacturers and a range of niche products from USB crypto modules to portable repeaters.

The company has R&D facilities in London, Sydney, New York and Yokohama.

For further information, visit:

ENENSYS Technologies is a global designer and manufacturer of innovative professional equipment for the Digital Video Delivery and Broadcast industry. For 15 years, ENENSYS enables Efficient Video Delivery over Terrestrial (ATSC 3.0, DVB-T/T2, ISDB-T/Tb, HbbTV…), Satellite (DVB-S/S2/S2X) & Telecom Networks (4G/5G, IPTV, OTT), and provides Test & Monitoring equipment with the TestTree brand.

With the acquisition of Expway, ENENSYS covers the entire Media Delivery Chain, from the head-end all the way to the receiver. ENENSYS provides operators a unique end-to-end solution for broadcast over 4G/5G network: the most advanced eMBMS solution on the market, with the largest eMBMS commercial deployments.

For further information, visit:

EO SECURITY is an independent Czech company with a transparent ownership structure.

Since 2016, EO SECURITY has been operating in the fields of cyber security, data security and eavesdropping protection. Thanks to the team of experts in these areas, company provides clients with comprehensive services. From analysis and testing of existing security to design and implementation of a new solution.

For further information, visit:

Fox-IT prevents, solves and mitigates the most serious threats caused by cyber attacks, data leaks, or fraud with innovative solutions for governments, defense agengies, law enforcement, critical infrastructure and banking and commercial enterprise clients worldwide. Fox-IT combines combines smart ideas with advanced technology to create solutions that contribute to a more secure society. We develop products and custom solutions for our clients to quarantee the safety of sensitive and critical government systems, to protect industrial networks, to defend online banking systems, and to secure confidential data.

For further information, visit:

Grivas S.A. is a Greek company based in Athens and has been established in the market for 26 years.  Company is an IT Integrator and specializes in providing Intelligence Forensics, Software and Hardware as well as Security and IT equipment to the Greek and Cypriot Law Enforcement Authorities, Governmental and Private sector Organizations.

Grivas S.A. provides whole solutions including maintenance, training, consultancy and support services.

For further information, visit:

Established in 2015, Gryphon is a Canadian company that has built a complete, end to end communications solution, combining secure hardware, state of the art encryption and hardened software. Company provides a turn-key secure communications platform that protects customer confidentiality, secures the customers’ digital assets and ensures privacy of their data and communications when outside a trusted environment or while at home.

Gryphon protects your Voice, Messaging, and File Sharing, and provides protection for your mobile devices. Over the past 5 years Gryphon has established a prominent customer base including International Governments and Small/Medium Enterprises globally.

For further information, visit:

GSMK CryptoPhone® secure mobile devices offer trustworthy 360-degree protection: voice & message encryption plus device security in an easy-to-use package. They are the only secure mobile telephony products on the market that come with source code available for independent security assessments. Featuring the strongest and most secure encryption algorithms available today as well as extraordinarily robust communication links that have been carefully optimized to reliably deliver secure end-to-end encrypted communications even under adverse network conditions, GSMK CryptoPhone technology offers true strategic security for encryption of voice and messages with latest-generation voice codecs and full interoperability across network borders. A hardened operating system reliably protects the device against outside attacks, thus offering true 360-degree protection when it counts most.

For further information, visit:

Communication connects everything that we do. G6 Global exists to create the best communications system for your operational needs.

G6 Global is based in Bristol, England. G6 Global team has worked in almost every corner of the globe; Iraq, Afghanistan, Sierra Leone, Rwanda, Libya, Albania, Azerbaijan, Kosovo, USA, Netherlands, Germany, France, UK, and many other locations.

G6 Global staff has experience of working in hostile environments; often with military personnel. Client base is made up from Security Companies, Close Protection Teams, Surveillance Companies, HNW & UHNW clients both in the UK and across the world, whose communications needs are complex and mission critical.

For further information, visit:

INSTAVOX provides in France an integrated PTT over cellular solution that takes advantage of the long experience of its mother company NOVELAD in PMR critical solutions. INSTAVOX combines a POC application edited by TASSTA with the most secure, ruggedized and reliable devices and state of the art configuration support to provide critical communication services to police forces, security organizations and strategic sites.

For further information, visit:

KICKmobiles® Ltd was incorporated in 2008 to cater to global customers with factory unlocked mobile phone devices. In particular, we supply specialized products such as world´s most Private and Secure, Rugged, Tough, Luxury, Classic, Vintage, Gold Customized, Special/Limited Editions and VIP cell phones. We cater to global customers via our online store and physical luxury store in Kensington-London, United Kingdom. We are also specialised in secure and private communication solutions to Individual, Enterprise and Government customers. Bittium Tough Mobile prospective customers can now directly order and checkout / enquire via online at or In-Store, Kensington-London with Tax Free Shopping for eligible customers.
Nemergent Solutions SL is an SME located at Bilbao, Spain, founded in January 2017 by experienced researchers from the University of the Basque Country. It is positioned as a technology provider with significant expertise in designing novel multi-sector mission critical solutions over mobile broadband technologies. The innovation-driven nature of the company promotes the establishment of research links with different UE, Control Room and 4G/5G core leading companies.

Nemergent has a vast portfolio that includes a complete and fully 3GPP standard compliant Mission Critical Services (MCPTT, MCData & MCVideo) ecosystem. The server-side components are designed as NFV components, fostering agile and flexible deployments towards 5G.

For further information, visit:

Oceus Networks Inc., a solutions company, provides agile and innovative mobile technologies that enable secure, high-speed communications to customers leveraging the latest in standards-based commercial off-the-shelf (COTS) technology. We provide products and solutions at best value to enable success for our customers’ unique missions. Privately U.S.-owned and operated, Oceus Networks’ headquarters are located in Reston, Virginia.

For further information, visit:

Since 1989, Orbitica team, from the aeronautics and space sectors, ensures the development of their activity with the same desire to provide professionals with their technical and commercial experience on high-tech products and services.

Companys’ competence is widely recognized in 4 areas of activity for demanding environments: GPS – GNSS, Satellite Communication and Data Transmissions, Radio communication and IT Extreme.

Orbitica distributes their products and services directly to their customers, but also through an international network of resellers.

For further information, visit:

POST Luxembourg was founded in 1842 as a public service and has been a wholly state-owned company since 1992. It is the country’s largest provider of postal and telecommunications services and also offers financial and philatelic services. Telecommunication services range from fixed and mobile telephony to Internet access and television, as well as many tailor-made services designed for businesses. Owner of its fixed and mobile infrastructures, POST, together with its subsidiary POST Telecom S.A., offers high-speed secure connectivity solutions as well as voice and data management services for individuals and professional customers.

For further information, visit:

Qnective is a leading provider of sophisticated communication solutions and services, with deep expertise in wireless technologies, networking and highly-secure encryption mechanisms. Qnective combines mobile experienced professionals with advanced cryptography and security experts in order to develop state of the art secure communication platforms for private enterprises and public organizations. Founded in 2007, Qnective is privately held and headquartered in Zurich, Switzerland.

For further information, visit:

Saab serves the global market of governments, authorities and corporations with products, services and solutions ranging from military defence to civil security. Saab TactiCall ICS interconnects various communication technologies regardless of radioband, frequency and hardware, reduces effort, reduces risk and increase tempo. The system is scalable from one to several operator positions or communication interfaces and makes up the centerpiece in remote controlled setups from single radio to complete operations. TactiCall Mobile solutions take ICS one step further and brings TactiCall to your smartphones, tablets and laptops. TactiCall Mobile users will be able to communicate with individuals or groups on other mobile devices, user terminals, portable radios and TETRA terminals as well as with users in their remote office environment.

For further information, visit:

Seolane provides breakthrough solutions adapted to the transportation and security demanding sectors. Delivering a complete range of integrated solutions, Seolane’s experts provide the best responses to current needs in critical communications, ultra secure mobile devices and edge computing. Seolane is also a key player for delivering AI solutions in complex environments like Smart Cities, Transportation and Security, aimed at improving quality of life and organisations efficiencies in fast changing environments. Seolane is also active in RF sensing solutions for security that can be deployed airborne on drones.

For further information, visit:

TC Connect is a leading system integrator delivering voice and data communications solutions for professional users. TC Connect is specialized in developing customer-specific system solutions that are tailored to suit their customers’ business needs with high demands on functionality and reliability.

Being able to communicate safely and without unwanted interruptions is crucial for TC Connect’s customers, operating in the segments of Public Sector, Healthcare, Security, Infra Structure, Energy and Industry. TC Connect has been working for designing, building, delivering, integrating and adapting products and services for decades and it’s a part of TCECUR group with its roots in the telecom industry. TC Connect has experience, knowledge, processes and the internal resources required to create and maintain customized solutions. TC Connect areas of expertise are Mobile coverage and indoor solutions, Mobile measurement and control, Operation and monitoring, Security and safety, Terminals and accessories as well as Services.

For further information, visit:

Telesuprecon is a prominent System’s Integrator with over two decades of experience, operating in West Africa, Middle East and India, with core competences and references in turnkey deliveries for Enterprise, Telecom Operator and Mission Critical organizations. With operations in three continents and nine countries, Telesuprecon offers advanced EPC, Operation and Maintenance, including managed service and support in financing, for Fibre Optics Systems, Mobile Operator Infrastructure, Mission Critical Systems, Smart Cities, National Identity Authentication, Enterprise Mobility and Enterprise Security. Telesuprecon main assets are service quality, technology understanding and engineering capabilities, professional technical writing and bidding on cost, quality and scheduled delivery of projects and program.

For further information, visit:

Download brochure
Contact us