Bittium Tough Mobile 2

Order now
bittium.com

New Standard for
Ultra Secure Mobile Communications

Designed and built for professionals with the highest security requirements
 
Trusted by organizations in more than 40 countries
 
Data secured at all times with multilayered security integrated in hardware and source code
 
Designed and manufactured in Finland
 
Bittium Tough Mobile 2
Ultra secure professional and personal use within the same device without compromising usability.

Comprehensive End-to-End Mobile Security

Keep your data secured with multilayered security integrated in hardware and software of the Bittium Tough Mobile 2 smartphone. For complete end-to-end mobile security, complement the device with Bittium Secure Suite™ device management and encryption software product.

Bittium Tough Mobile™ 2 + Bittium Secure Suite™

Available for enterprise customers and organizations

What you get with
Bittium Secure Suite™

Bittium Secure Suite is an advanced software product that complements Bittium Tough Mobile 2 with a full set of services for secure communications. It is available for both private and public organizations, and requires installation of a client software and back-end server, which is provided either as a dedicated IT service or hosted by the customer.

For users with Bittium Secure Suite™
Audit logs for security related events
Remote wipe of device
Remote attestation
Application whitelisting support
Bittium SafeMove® MDM support
Bittium SafeMove® Mobile VPN to encrypt data in transit
Hardened password policy
Multicontainer feature

Read more View specs Start a trial

Security Without
Compromising Usability

Keep your data safe at all times

Next generation tamper detection for preventing data theft and spying
 
Hardware-based privacy mode for disabling microphones, cameras, Bluetooth, and reducing sensor sensitivity
 
 
Trusted boot with hardware and software integrity validation
Designed to be certified for RESTRICTED and CONFIDENTIAL
 
Device and data in transit secured with Bittium Secure Suite™ device management and encryption software product
 
 
Trusted design and manufacturing in Finland
 
Available in two variants, with or without Google Apps pre-installed

Performance

Take it to the next level

Professional & powerful

  • Hardened Android™ 9 Pie
  • Qualcomm® Snapdragon™ 670 chipset
  • Dedicated hardware secure element
  • Global connectivity
  • Dual SIM
  • Embedded 3000mAh battery
  • 12MP autofocus rear-facing camera, 5MP front-facing camera
  • High-quality speakers
  • Multi-microphone active noise cancellation

Product Design

Made to last

  • MIL-STD-810G shock and drop resistant
  • 5.2” sunlight readable full HD display
  • 12MP autofocus rear-facing and 5MP front-facing cameras
  • IP67 water and dust resistant
  • Glove & wet usable capacitive touchscreen
  • Privacy mode, emergency and push-to-talk buttons

Security for Professional and Personal Use

Several isolated and secure workspaces with the Multicontainer feature and Bittium Secure Suite™

Workspace 4

Workspace 3

Workspace 2

Workspace 1

Home screen

Next Previous
Available for customers using Bittium Secure Suite™
  • Latest commercial features
  • Multilayered security
  • Trusted design and manufacturing
  • Long device lifespan
  • Professional & personal use with the same device
  • Ultra secure communication

Your privacy is ensured when green LED blinks

Press and hold button to activate privacy mode

Unique Hardware-Based Privacy Mode

Privacy mode allows simultaneous use of the device, while protecting from:

  • Ambient listening by disconnecting microphones from the phone
  • Bluetooth sniffing by disabling Bluetooth
  • Camera spying by disabling device cameras
  • Sensor-based spying by reducing sensor accuracy

Three Variants

There are two different Bittium Tough Mobile 2 variants available, both providing a different level of security. These variants are based on the same hardware, including the security layers built in the device.

Bittium Tough Mobile 2

With Google Apps pre-installed.
For complete end-to-end mobile security, complement the device with Bittium Secure Suite™ device management and encryption software product.

Bittium Tough Mobile 2

Without Google Apps pre-installed.
For complete end-to-end mobile security, complement the device with Bittium Secure Suite™ device management and encryption software product.

Bittium Tough Mobile 2 C

Two separated operating systems.
Always complemented with Bittium Secure Suite™ device management and encryption software.

Operating system
  • Android™ 9
  • Available with or without Google apps pre-installed
Chipset Qualcomm® Snapdragon™ 670
Memory 4GB RAM / 64GB eMMC. MicroSD expansion slot up to 256GB.
Display
  • 5.2” Full HD sunlight readable
  • Glove & wet usable capacitive touchscreen
Imaging & Video
  • 12MP autofocus rear-facing and 5MP front-facing cameras
  • 4K and Full HD video
Audio
  • High-quality front-facing dual speakers (109dB@5cm SPL)
  • Multi-microphone active noise cancellation
Physical Buttons
  • Privacy mode activation
  • Emergency button (programmable, use as emergency button requires a separate application providing the functionality)
  • PTT/PTV (programmable, use as PTT/PTV button requires a separate application providing the functionality)
  • Power/wake-up
  • Volume up and down
LTE and Bands

 

 

3GPP Rel 12
Dual SIM (DSDS LTE+LTE in idle)
IMS, VoLTE, CA
FDD bands: 1, 2, 3, 4, 5, 7, 8, 12, 13, 14, 17, 20, 25, 26, 28, 29, 30, 66
TDD bands: 38, 39 (34, 41 optional)
UMTS/HSPA Bands B1, B2, B4, B5, B8
GSM/GPRS/EDGE Bands 850/900/1800/1900 MHz
Complementary Radios Wi-Fi 802.11 a/b/g/n/ac (2.4 and 5Ghz)
BT5.0, NFC

For all Bittium Tough Mobile™ 2 users
  • All data in the device is encrypted with AES-256 encryption (including the memory card, when used in adoptable storage mode)
  • Dedicated secure element (chipset) for storing security keys and providing functionality for encryption and user authentication
  • Backup battery allowing monitoring of the device security and tamper detection at all times, even when the main battery has ran out
  • Android™ 9 Pie operating system with hardened security
  • Hardware-based Privacy Mode preventing ambient listening and spying of user/user environment
  • Hardware tamper detection preventing data theft and device implanting attempts
  • Secure boot, device HW and SW integrity check during boot
  • Disabled debug interfaces preventing attacks against device security
  • Device OS rollback prevention – not possible to use older device firmware for attacking the device
  • Die shield sensor in secure element to protect from physical intrusion and electromagnetic signal sniffing
  • Environmental attack protection in secure element preventing e.g. cryo/cold attacks and power glitch attacks
  • Application permission control – users can allow only trusted applications to access device data and functionality
  • User originated fast wipe of device data
For users with Bittium Secure Suite™
  • Audit logs for security related events
  • Remote wipe of device
  • Remote attestation
  • Application whitelisting support
  • Bittium SafeMove® MDM support
  • Bittium SafeMove® Mobile VPN to encrypt data in transit
  • Hardened password policy
  • Multicontainer feature
General 

Question:
Does Bittium Tough Mobile 2 differ from a regular smartphone?

Answer:

Bittium Tough Mobile 2 differs from a standard off-the-shelf smartphone as it is designed for secure use.

For example, it has a dedicated secure element storing encryption keys and performing cryptographic operations. The Android 9 Pie based operating system’s security is hardened by Bittium to utilize the dedicated hardware secure element.

It has a mechanical and electrical concept that has been designed to provide a long lifespan for the device. Bittium will also provide software security updates longer than what is usual for regular consumer smartphones.

The phone also has a unique hardware-based privacy mode for disabling microphones, cameras, Bluetooth, and reducing sensor sensitivity with a touch of a button.

Question:
Who can buy the phones and where?

Answer:

Tough Mobile 2 is designed for professional users who require a secure mobile communication solution in their organizations.

B2B customers in Finland and in other selected European countries (Austria, Belgium, France, Germany, Ireland, Italy, Luxemburg, Malta, Monaco, Spain, Sweden, United Kingdom) can buy 1-5pcs Tough Mobile 2 smartphones from the Bittium webshop.

For other available countries, or if you are individual user who is interested in purchasing our device, please visit our reseller Kickmobiles’ website.

If you would like to buy larger quantities, additional features, software or services, such as the Bittium Secure Suite™ back-end system, please contact us.

Question:
Where are the phones manufactured?

Answer:

Tough Mobile 2 smartphones are designed and manufactured in Finland. Manufacturing is supervised by Bittium and can be audited for certification purposes.

Question:
Can Tough Mobile 2 be used in commercial networks?

Answer:

Yes, Tough Mobile 2 can be used in commercial networks as well as in private networks.

Question:
In which countries can I use Tough Mobile 2?

Answer:

Tough Mobile 2 can be used globally and it supports the majority of the used cellular bands. For additional details of the supported bands, please see the supported bands in the Tough Mobile 2 datasheet or in this website’s Connectivity Highlights section.

Question:
What does Tough Mobile 2’s “long lifespan” mean?

Answer:

The phone has a mechanical and electrical concept that has been designed to provide a long lifespan for the device. For example, it has military-grade durability (MIL-STD-810G) and in addition, Bittium provides operating system and software security updates longer than what is usually provided for regular smartphones.

Question:
Can I use any Android application with Tough Mobile 2?

Answer:

Yes, Tough Mobile 2 is verified by Google and it is compatible with all Android applications available for Android 9 Pie.

Question:
Can Tough Mobile 2 be customized?

Answer:

Yes, Tough Mobile 2 can be customized when buying larger quantities. Please contact us for further details.

Question:
Can I get Tough Mobile 2 without Google apps?

Answer:

Yes, there are two variants of Tough Mobile 2 available:

1) Tough Mobile 2 with Google apps pre-installed (like Google Play, Gmail, Maps) if you wish to utilize Google’s services.

2) Tough Mobile 2 without Google apps pre-installed, if you don’t want to utilize Google’s services.

Question:
When using the Tough Mobile 2 variant without Google apps and Google Play, am i able to install applications?

Answer:

If your organization has Bittium Secure Suite software product and its back-end server in use you can install approved Android applications through the Application Library.

If you don’t have Bittium Secure Suite with the server environment available, it is possible to use different 3rd party application stores for installing apps or side load them via Bluetooth or USB (as APKs). Please note that some applications may require Google (GMS) API’s, which are not available in Tough Mobile 2 without Google apps. Therefore, those applications may not work properly or even cannot be installed.

Question:
Can I receive further details about mobile security and specific product features?

Answer:

All publicly available product information is on our website. More detailed technical information, training and dedicated customer support is available for B2B customers under Non-Disclosure-Agreement (NDA). 

Security 

Question:
What does "ultra secure" mean?

Answer:

Ultra secure means that the device has been designed to meet even the highest governmental grade security requirements.

Tough Mobile 2 has been designed for ultra secure use, starting from tamper-proofed mechanics to always-on security monitoring of electronics and hardened software solutions utilizing the Android 9 Pie operating system.

Ultra security is always based on hardware originated tamper proof security solutions.

Bittium ultra security also means that the device has been designed and manufactured by a trusted vendor in Finland.

Question:
What does Tough Mobile 2’s “multilayered security” mean?

Answer:

Tough Mobile 2’s security is built in layers, both in hardware and software.

The security built in the hardware protects data at rest. Security starts from the design and manufacturing of the device, including a hardware secure element that for example stores all authentication data and encryption keys. For software-based security Bittium offers Bittium Secure Suite™ full set of services for securing the data in transit.

Question:
What does Tough Mobile 2’s dedicated hardware secure element do?

Answer:

The hardware secure element provides for example user authentication services for Android, stores device encryption keys and provides cryptographic operations. If the Android OS becomes compromised with malware with access to everything, it still would not be able to access the contents of the secure element.

Secure element also controls the tamper detection feature of the device – even if the device’s main battery has run out. The secure element is powered by its own backup battery.

Question:
How is data in Tough Mobile 2 encrypted?

Answer:

All data in Tough Mobile 2 is encrypted with AES-256 encryption. Tough Mobile 2 supports also encryption for data in SD cards. Data in transit can be encrypted with Bittium SafeMove® Mobile VPN included in Bittium Secure Suite.

Question:
How is Tough Mobile 2 tamper-proofed?

Answer:

Tough Mobile 2’s secure element detects if someone is trying to for example drill, open, disassemble, or precision cut the device. If tampering is detected, the secure element cryptographically erases all data from the device, even if the main battery has ran out of power. The secure element is powered by its own rechargeable backup battery.

Question:
How is Tough Mobile 2 protected from unwanted hardware implants?

Answer:

Tough Mobile 2 is tamper-proofed, which means that the phone detects if it is dismantled or the SIM slot is opened. For security reasons all data is cryptographically erased in case of dismantling. When the SIM slot is opened, device locks instantly and only the device’s original user can dismiss notification of SIM slot opening by authenticating to the device and continue using the device.

Question:
How is Tough Mobile 2 protected from malicious firmware?

Answer:

Tough Mobile 2 can be used only with Bittium signed firmware delivered by Bittium. Device utilizes secure/trusted boot, OS rollback prevention and the device is non-rootable. In each start up the device checks firmware and hardware integrity. To provide additional security layer, Bittium Secure Suite can be used to remotely attest the device firmware and hardware.

Question:
What does Bittium Secure Suite provide and how can I take it into use with Tough Mobile 2?

Answer:

Bittium Secure Suite is an advanced software product that complements Bittium Tough Mobile 2 with a full set of services for secure communications, including MDM, VPN, remote attestation and application whitelisting. It is available for both private and public organizations, and requires installation of a back-end server, which is provided either as a dedicated IT service or hosted by the customer.

Please contact us to start a trial.

Question:
Is VPN included with Tough Mobile 2?

Answer:

Tough Mobile 2 has Bittium SafeMove® Mobile VPN client software pre-installed. The complementary Bittium Secure Suite software product for Tough Mobile 2 is required to utilize that VPN client to secure data in transit. Please contact us for more information and for starting a Bittium Secure Suite trial.

Tough Mobile 2 device supports also any 3rd party VPN solutions supported by Android 9 Pie.

Question:
What does the Multicontainer solution do?

Answer:

Multicontainer solution enables several isolated workspaces within the same Tough Mobile 2 device preventing data contamination between applications/services located in container workspaces. With Multicontainer, it is possible to use classified data and services from several separate organizations as each container workspace isolates applications, data and network traffic from all
other workspace containers. Device can also be used as personal smartphone as workspace containers can be used also to isolate personal applications, data and network traffic from work data.

Services within the workspaces are protected and managed with Bittium Secure Suite. Services in workspace containers can connect to isolated back-ends via container-specific VPN tunnels, providing unique data-in-transit protection for each workspace.

Question:
How can I enable the Multicontainer solution?

Answer:

Multicontainer solution is enabled with the Bittium Secure Suite back-end system as each container uses its own VPN tunnel and server environment for isolating and encrypting data in transit. Please contact us to get the complete solution for your organization.

Question:
How can I create a single container in Tough Mobile 2?

Answer:

User can create a single container without the requirement for using the device management (Bittium Secure Suite) capabilities and Secure Suite license. The container can be created by using the SafeMove application readily available on the device.

First you need to check that you have downloaded and installed the latest system updates in order to take one Container into use, go to Settings -> System -> Advanced -> System updates -> Check now.

After that, you are able to create one container, go to SafeMove application -> press “three stripes” from the top left corner -> Create container -> Provision later.

Question:
What does the hardware-based Privacy Mode mean and how does it work?

Answer:

With Privacy Mode the user can prevent eavesdropping and spying through device by disabling microphones, Bluetooth, cameras and reducing sensor accuracy on the device at the hardware-level. Privacy Mode can be activated/deactivated by pressing and holding the privacy button, which is the topmost button on the right-hand side of the phone. A green indicator light starts blinking on the front side of the phone when Privacy Mode is active.

Question:
How can I make encrypted calls with Tough Mobile 2?

Answer:

A separate application is needed for making encrypted calls with Tough Mobile 2. Please contact us for more information.

Question:
How is Tough Mobile 2’s operating system hardened?

Answer:

For example, Tough Mobile 2’s security/encryption key management, user authentication and true random number generation are moved from Android to Bittium hardware-based secure element. If you would like to discuss what additional hardenings have been made, please contact us.

Question:
How can I quickly erase all my data from the phone in emergency situations?

Answer:

Tough Mobile 2 is provided with a Fast Wipe functionality to erase all data in emergency situations. User can trigger Fast Wipe from drop-down menu by pressing the red Fast Wipe icon and giving the device PIN.

Question:
How do I get security updates to Tough Mobile 2?

Answer:

All Tough Mobile 2 updates are delivered Over-The-Air (OTA). The device will check the availability of software updates automatically and inform you when an update is available. User can decide when to download and install the software update.

Question:
Can Tough Mobile 2 be security certified for national security purposes?

Answer:

Yes, Tough Mobile 2 has been designed to be certified for national security purposes. Device and manufacturing audits are possible for certification purposes.

Technical 

Question:
How can I activate the Emergency button?

Answer:

Use of the emergency button requires a separate application providing the functionality. When the suitable application supporting Bittium emergency button has been installed, go to Settings → Buttons → Emergency Button Function and select Emergency application from the list.

Question:
How can I activate the Push-To-Talk button?

Answer:

Use of the PTT/PTV button requires a separate application providing the functionality. When the suitable application supporting Bittium PTT button has been installed, go to Settings → Buttons → PTT Button Function and select PTT application from the list.

Question:
What does “MIL-STD-810G” mean?

Answer:

MIL-STD-810G is a US military standard that defines a broad set of environmental (such as shock, vibration, temperature, humidity) requirements for mobile devices that are designed for use in harsh environments. Tough Mobile 2 has been tested against the MIL-STD-810G shock and drop standards.

Question:
What does “IP67 water and dust resistant” mean?

Answer:

IP67 level water and dust resistant means that the device is built to be protected from dust and is operational after being submerged in 1 meter of water for 30 minutes. IP67 does not mean that device is designed to be used underwater.

Question:
Does the device support dual-SIM functionality?

Answer:

Yes, Tough Mobile 2 supports Dual SIM Dual Standby and has dual nano-SIM slots.

Question:
Can the internal memory/storage be expanded?

Answer:

Yes, Tough Mobile 2 has a combined nano-SIM/MicroSD expansion slot which can be used to provide up to 256GB of additional memory/storage.

Question:
Does the device support external keyboard and display?

Answer:

Yes, Tough Mobile 2 supports external keyboards and displays via its USB-C connector.

Question:
How can I take screenshots with Tough Mobile 2?

Answer:

You can take screenshots by pressing and holding the Power button until pop-up menu appears. From pop-up menu select “Screenshot”. If containers are enabled, taking screenshots is disabled by default.

Question:
What is the battery size/life for the device?

Answer:

Tough Mobile 2 has a 3000mAh embedded battery. Due to the device’s highly optimized power management, it will provide up to 460h standby time and up to 20h talk times. Actual results may vary depending on usage and environmental factors.

To make your battery last longer, you have multiple options.

Turn off tethering and hotspots when you’re not using them, go to Settings -> Network & Internet -> Hotspot & tethering -> Wi-Fi hotspot.

Turn off your Wi-Fi and Wi-Fi scanning when you are not using them, go to Settings -> Network & Internet -> Wi-Fi.

Turn off your Bluetooth when you are not using it, go to Settings -> Connected devices -> Connection preferences -> Bluetooth.

Turn off location when it is not necessary, go to Settings -> Security & location -> Location. Note that some applications and features don’t work without location services.

Turn off Google apps automatic downloads and updates;

go to Google Play -> Settings -> App download preference -> Ask me every time.
go to Google Play -> Settings -> Auto-Update apps -> Don’t auto-update apps.

Question:
Which charger plugs are provided with the phone?

Answer:

Bittium can provide Tough Mobile 2 with either EU, UK or US charger plugs.

Question:
How can I activate the Recovery mode?

Answer:

Make sure the device is powered off.

Press ‘volume up’ button and keep it pressed -> press the ‘power’ button shortly and release it.

You should now enter the screen where you see an Android robot icon and text ‘no command’.

-> Release ‘volume up’ key -> press the ‘power’ key, keep it pressed and press shortly ‘volume up’ key -> release ‘power’ key.

You should now enter the recovery menu where you can perform a factory reset. Use volume up and down keys for navigation, ‘power’ key for menu item selection.

Note: If ‘power’ key is pressed over 10s, the phone will automatically restart.  Start over from the beginning if this happens.

 

Support 

Question:
How long is the product warranty?

Answer:

Product warranty for Bittium Tough Mobile 2 is one (1) year, including all accessories provided in the sales box, against defects in materials or workmanship. If the device is found to be defective within the one year warranty period, Bittium will repair or replace it with a new or refurbished device, at its option, at no charge to the customer, except as set forth below.

This warranty does not cover cosmetic damage, or device failure caused by liquid damages, or damage due to misuse, abuse, negligence, accident, modification or disassembly of any part of the device. The warranty does not cover damage due to improper operation or maintenance, connection to improper voltage supply, or attempted repair by anyone other than a facility authorized by Bittium to service this Tough Mobile 2.

Question:
Can the product warranty be extended?

Answer:

Yes, private and public organizations can purchase Extended Warranty for additional 12-36 months. Please contact us for more information.

Question:
How do I update the software on my Tough Mobile 2?

Answer:

All Tough Mobile 2 updates are delivered Over-The-Air (OTA). The device will check the availability of software updates automatically and inform you when an update is available. You can decide when to download and install the software update.

To manually check the availability of updates from your Tough Mobile 2, go to Settings → System → Advanced → System Updates → Check now.

Question:
How can I change the battery?

Answer:

Bittium offers a replacement service if there is a need to replace the battery. Distributors and partners, please visit the Bittium Tough Mobile Support Portal for Partners to submit service requests. If you do not have an account for the Support Portal, please fill the Bittium Tough Mobile Support Request Form to make your service request.

Question:
Who can I contact for product support and maintenance?

Answer:

Please first read through all the FAQ and Support information on the Tough Mobile 2 webpage.

If your problem is not solved, distributors and partners please visit the Bittium Tough Mobile Support Portal for Partners to submit error reports, support requests, service requests, and feature requests. If you don’t have an account for the Support Portal, please fill the Bittium Tough Mobile Support Request Form to make your support request.

Top performance and innovation strength, everything in service of a common goal, delivering a high-quality product to professionals who depend on these products under all circumstances. Abiom contributes its innovative products and services to a better service of the public security and associated to a higher quality of safety for the citizen. The knowledge and expertise in the area of radio communication, mobile data and light and sound systems makes Abiom your central point of contact for communication and mobility issues. Company is fully qualified to advise, build-in and service all products/solutions. If the right solution is not available in your situation, Abiom will develop it for you.

For further information, visit: www.abiom.nl

For twenty years Ardaco has been at the forefront of developing information and communication technology to help organizations communicate securely and efficiently. A leader in the field, and dedicated to innovation, Ardaco has created communication platforms and secure document handling which place the customer in complete control.

Silentel is comprehensive mobile communication security solution based around a secure server located with you or with Ardaco. Silentel is fast to implement by all of your selected users and then the ability to talk, message, chat and group chat, send images, documents and any other files securely.

For further information, visit: www.ardaco.com

  Armour Communications Limited provides market leading technology for secure communications solutions for voice, video, messaging and data on everyday smartphones and tablets.

Supplying Government, Enterprise and Finance markets with an easy to use, intuitive app, downloadable from the app stores and compatible across Android and iPhone, with optional PBX integration for landline connection. Delivering advanced security techniques and functionality for a highly scalable cloud-based service or an on-premises solution providing customers complete control and privacy of their communications.

Armour´s product offerings include FIPS, NATO and CPA approved solutions to OFFICIAL-SENSITIVE, with additional security layers to mitigate threats up to SECRET.

For further information, visit: www.armourcomms.com

Beatrice Technologies, Inc. is dedicated to bringing you quality and reliability in technology, with advanced products that help leverage your business critical communications. Beatrice is committed to providing quality and reliability to all our customers.

For further information, visit: www.beatriceco.com/bti_bittium/

With over 15 years’ experience of helping governments and businesses secure their valuable data, Becrypt has a long heritage of providing enterprise data protection solutions to the most security conscious organisations. Innovating to provide the highest levels of product assurance, our data protection solutions allow diverse platforms to be adopted within the enterprise with confidence. Working with device manufacturers, we deliver comprehensive mobile security as a seamless user experience that supports productivity without compromising protection.

For further information, visit: www.becrypt.com

Danoffice IT provides professional and efficient IT & IS turnkey solutions to international organizations and businesses operating worldwide with its one-stop-shopping platform including a large number of high quality brands, skilled certified personnel and added value services.

Danoffice IT elaborates on 22 years of experience exclusively supplying and servicing hardware to international organizations, governmental and non-governmental organizations and business-to-business partners HQ, operating globally.

Your business, our passion – are the keywords which define Danoffice IT worldwide.

Danoffice IT strive for excellence and appreciate the importance of being a flexible and reliable partner, offering tailor-made IT & IS solutions.

For further information, visit: www.danofficeit.com

Dencrypt A/S is a danish company specialising in dynamic encryption of data communication with focus on combining a user-friendly operation with state-of-the-art encryption technology. Dencrypt´s solutions provide an effective protection against eavesdropping and industrial espionage and targets companies and organisations for whom protection of confidential information, critical technology or customer relations is important. Dencrypt is on the market with the DC1000 SecureTalk solution for encrypted voice and chat and delivers to the Danish Armed Forces, government offices and private companies.

For further information, visit: www.dencrypt.dk

Etherstack is a mission-critical communications technology company specialising in TETRA, DMR, P25 and PTT over LTE.

Etherstack engineers apply state-of-the art innovation to public safety radio while keeping it secure and reliable. Achievements include the world´s first all-IP PTT core switching infrastructure, protocol stack licensing to over 70% of public safety radio manufacturers and a range of niche products from USB crypto modules to portable repeaters.

The company has R&D facilities in London, Sydney, New York and Yokohama.

For further information, visit: www.etherstack.com

ENENSYS Technologies is a global designer and manufacturer of innovative professional equipment for the Digital Video Delivery and Broadcast industry. For 15 years, ENENSYS enables Efficient Video Delivery over Terrestrial (ATSC 3.0, DVB-T/T2, ISDB-T/Tb, HbbTV…), Satellite (DVB-S/S2/S2X) & Telecom Networks (4G/5G, IPTV, OTT), and provides Test & Monitoring equipment with the TestTree brand.

With the acquisition of Expway, ENENSYS covers the entire Media Delivery Chain, from the head-end all the way to the receiver. ENENSYS provides operators a unique end-to-end solution for broadcast over 4G/5G network: the most advanced eMBMS solution on the market, with the largest eMBMS commercial deployments.

For further information, visit: www.enensys.com

EO SECURITY is an independent Czech company with a transparent ownership structure.

Since 2016, EO SECURITY has been operating in the fields of cyber security, data security and eavesdropping protection.

Thanks to the team of experts in these areas, company provides clients with comprehensive services.

From analysis and testing of existing security to design and implementation of a new solution.

For further information, visit: www.eo-security.com 

Fox-IT prevents, solves and mitigates the most serious threats caused by cyber attacks, data leaks, or fraud with innovative solutions for governments, defense agencies, law enforcement, critical infrastructure and banking and commercial enterprise clients worldwide. Fox-IT combines smart ideas with advanced technology to create solutions that contribute to a more secure society.

For further information, visit: www.fox-it.com

Grivas S.A. is a Greek company based in Athens and has been established in the market for 26 years.  Company is an IT Integrator and specializes in providing Intelligence Forensics, Software and Hardware as well as Security and IT equipment to the Greek and Cypriot Law Enforcement Authorities, Governmental and Private sector Organizations.

Grivas S.A. provides whole solutions including maintenance, training, consultancy and support services.

For further information, visit: www.grivas.com.gr

GSMK CryptoPhone® secure mobile devices offer trustworthy 360-degree protection: voice & message encryption plus device security in an easy-to-use package. They are the only secure mobile telephony products on the market that come with source code available for independent security assessments. Featuring the strongest and most secure encryption algorithms available today as well as extraordinarily robust communication links that have been carefully optimized to reliably deliver secure end-to-end encrypted communications even under adverse network conditions, GSMK CryptoPhone technology offers true strategic security for encryption of voice and messages with latest-generation voice codecs and full interoperability across network borders. A hardened operating system reliably protects the device against outside attacks, thus offering true 360-degree protection when it counts most.

For further information, visit: www.cryptophone.de

INSTAVOX provides in France an integrated PTT over cellular solution that takes advantage of the long experience of its mother company NOVELAD in PMR critical solutions. INSTAVOX combines a POC application edited by TASSTA with the most secure, ruggedized and reliable devices and state of the art configuration support to provide critical communication services to police forces, security organizations and strategic sites.

For further information, visit: www.instavox.fr

KICKmobiles® Ltd was incorporated in 2008 to cater to global customers with factory unlocked mobile phone devices. In particular, we supply specialized products such as world´s most Private and Secure, Rugged, Tough, Luxury, Classic, Vintage, Gold Customized, Special/Limited Editions and VIP cell phones. We cater to global customers via our online store and physical luxury store in Kensington-London, United Kingdom. We are also specialised in secure and private communication solutions to Individual, Enterprise and Government customers. Bittium Tough Mobile prospective customers can now directly order and checkout / enquire via online at www.kickmobiles.com/bittium or In-Store, Kensington-London with Tax Free Shopping for eligible customers.
Oceus Networks Inc., a solutions company, provides agile and innovative mobile technologies that enable secure, high-speed communications to customers leveraging the latest in standards-based commercial off-the-shelf (COTS) technology. We provide products and solutions at best value to enable success for our customers’ unique missions. Privately U.S.-owned and operated, Oceus Networks’ headquarters are located in Reston, Virginia.

For further information, visit: www.oceusnetworks.com

Qnective is a leading provider of sophisticated communication solutions and services, with deep expertise in wireless technologies, networking and highly-secure encryption mechanisms. Qnective combines mobile experienced professionals with advanced cryptography and security experts in order to develop state of the art secure communication platforms for private enterprises and public organizations. Founded in 2007, Qnective is privately held and headquartered in Zurich, Switzerland.

For further information, visit: www.qnective.com

Saab serves the global market of governments, authorities and corporations with products, services and solutions ranging from military defence to civil security. Saab TactiCall ICS interconnects various communication technologies regardless of radioband, frequency and hardware, reduces effort, reduces risk and increase tempo. The system is scalable from one to several operator positions or communication interfaces and makes up the centerpiece in remote controlled setups from single radio to complete operations.TactiCall Mobile solutions take ICS one step further and brings TactiCall to your smartphones, tablets and laptops. TactiCall Mobile users will be able to communicate with individuals or groups on other mobile devices, user terminals, portable radios and TETRA terminals as well as with users in their remote office environment.

For further information, visit: www.saabgroup.com

TASSTA offers voice communications, messaging and data solutions to be connected to every corner around the globe. TASSTA’s mission-critical push-to-talk solution prevents the limits of all communication. The solution is equipped with the safest and most reliable networks to offer the most extensive area coverage and the highest voice quality.

TASSTA offers the most efficient way to communicate due to a certified Lone Worker Protection solution within teams, with broadband, WiFi, and the best carrier, device, and application options. TASSTA brings changes in the world of communication with an application for smartphones and computers that become an alternative affordable solution for classical radio with numerous additional functions.

For further information, visit: www.tassta.com

TC Connect is a leading system integrator delivering voice and data communications solutions for professional users. TC Connect is specialized in developing customer-specific system solutions that are tailored to suit their customers’ business needs with high demands on functionality and reliability.

Being able to communicate safely and without unwanted interruptions is crucial for TC Connect’s customers, operating in the segments of Public Sector, Healthcare, Security, Infra Structure, Energy and Industry. TC Connect has been working for designing, building, delivering, integrating and adapting products and services for decades and it’s a part of TCECUR group with its roots in the telecom industry. TC Connect has experience, knowledge, processes and the internal resources required to create and maintain customized solutions. TC Connect areas of expertise are Mobile coverage and indoor solutions, Mobile measurement and control, Operation and monitoring, Security and safety, Terminals and accessories as well as Services.

For further information, visit: www.tcconnect.se

Download brochure
Contact us