Bittium Tough Mobile 2

bittium.com

Highest Level of Security
for Mobile Communications

Trusted by organizations in more than 50 countries
 
CONFIDENTIAL level security for highest security requirements
 
Two hardened operating systems with complete data separation
 
Designed and manufactured in Finland
 
Dedicated hardware secure element for most critical security functions
 
Data in transit protection and device management with Bittium Secure Suite™
 
Play video ►
×
Bittium Tough Mobile 2 C
Ultra secure professional and personal use within the same device without compromising usability.
Play video ►

For Ultimate End-to-End Mobile Security

Bittium Tough Mobile™ 2 C smartphone with Bittium Secure Suite™ device management and encryption software, provides the highest level of privacy and security for people working in the enterprise, security, authority or government sector.

Unique hardware security solutions and multilayered security structure is based on the hardened Android™ 11 operating system and is reinforced with the dual-boot functionality, running two completely separate and hardened operating systems on a single platform.

Security settings can be configured with Bittium Secure Suite to Restricted, Confidential and beyond to meet the individual security needs of different organizations.

The complete solution is certified for CONFIDENTIAL level (NCSA-FI, TL III), and designed to be certified to CONFIDENTIAL level by national security authorities.

 

Bittium Secure Suite™ for Complete Mobile Security

What you get with
Bittium Secure Suite™

Bittium Tough Mobile 2 C always requires Bittium Secure Suite which is an advanced software product with a full set of services for secure communications. It requires installation of a server software, which is provided either as a dedicated IT service or hosted by the customer.

Bittium Secure Suite™
Configuration of security parameters and other settings
Audit logs for security related events
Remote wipe of device
Remote attestation
Application whitelisting support
Bittium SafeMove® MDM support
Bittium SafeMove® Mobile VPN to encrypt data in transit
Hardened password policy
Multicontainer feature

Read more View specs Start a trial

 

 

 

Bittium Tough Mobile 2 C Dual-Boot

Both operating systems support Multicontainer feature

Dual-boot functionality provides two completely separate operating systems with full data separation within one device.

Personal use with hardened Android™ 11, where e.g. social media applications are freely available

Confidential use with hardened Bittium Secure OS, allowing demanding authority and use cases

User can quickly switch between the two operating systems with dual-boot functionality.

Excellent usability and quick two-factor authentication with NFC token* and admin configurable authentication interval.

*Yubikey 5 NFC by Yubico included in the sales package

Android is a trademark of Google LLC

  • Two isolated operating systems
  • Customized for different security needs
  • Latest smartphone features
  • Multilayered security
  • Trusted design and manufacturing in Finland
  • Long device lifespan

Security Without Compromizing Usability

Keep your data safe at all times

Next generation tamper detection for preventing data theft and spying
 
Hardware-based privacy mode for disabling microphones, cameras, Bluetooth, and reducing sensor sensitivity
 
 
Trusted boot with hardware and software integrity validation
Designed to be certified for CONFIDENTIAL level
 
Device and data in transit secured with Bittium Secure Suite™ device management and encryption software product
 
 
Data secured at all times with multilayered security integrated in hardware and software
 
Two separated operating systems (dual-OS)
 

Bittium Secure Call™ - Application for Encrypted End-to-End Communication

Bittium Secure Call™ is a secure voice, video and messaging application with end-to-end encryption. The communication application is designed for enterprise, government and other professional users, and is available for Android™ and Windows platforms.

The application supports deployment in commercial and private networks with no dependency on public Internet or cloud services. It can be deployed and fully managed by the user organization.

Bittium Secure Call can be complemented with Bittium Secure Suite™ to offer device security management and the use of an additional VPN layer to provide dual encryption for secure communication.


The Bittium Secure Call communication application covers end-to-end encrypted voice and video calls, group calls, messages with attachments (picture, voice memo, video, contacts, voice messages), group messaging, and a feature that destroys messages after a predefined time.

Read more

Several isolated and secure workspaces with Multicontainer feature

Both operating systems are supported with the Multicontainer feature and Bittium Secure Suite

Workspace 2

Workspace 1

Home screen

Next Previous
Available for customers using Bittium Secure Suite™

Performance

Professional & powerful

  • Dual-OS
  • Hardened Android™ 11 (Personal mode)
  • Bittium Secure OS (Secure mode)
  • Qualcomm® Snapdragon™ 670 chipset
  • Dedicated hardware secure element
  • Global connectivity
  • Dual SIM
  • Embedded 3000mAh battery
  • 12MP autofocus rear-facing camera, 5MP front-facing camera
  • High-quality speakers
  • Multi-microphone active noise cancellation
  • MIL-STD-810G shock and drop resistant
  • IP67 water and dust resistant
  • 5.2” sunlight readable full HD display
  • Glove & wet usable capacitive touchscreen
  • 12MP autofocus rear-facing and 5MP front-facing cameras
  • Privacy mode, emergency and push-to-talk buttons

Your privacy is ensured when green LED blinks

Press and hold button to activate privacy mode

Unique Hardware-Based Privacy Mode

Privacy mode allows simultaneous use of the device, while protecting from:

  • Ambient listening by disconnecting microphones from the phone
  • Bluetooth sniffing by disabling Bluetooth
  • Camera spying by disabling device cameras
  • Sensor-based spying by reducing sensor accuracy

Three Variants

There are currently three different Bittium Tough Mobile 2 variants available, all providing a different level of security.
Variants are based on the same hardware, including the security layers built in the device.

Bittium Tough Mobile 2

With Google Mobile Services
For complete end-to-end mobile security, complement the device with Bittium Secure Suite™ device management and encryption software. Buy here.

Bittium Tough Mobile 2

Without Google Mobile Services
For complete end-to-end mobile security, complement the device with Bittium Secure Suite™ device management and encryption software. Buy here.

Bittium Tough Mobile 2 C

Two separated operating systems.
Requires Bittium Secure Suite™ device management and encryption software. Certified for CONFIDENTIAL level (NCSA-FI, TL III). Buy here.

Bittium
Secure
Operating
System
  • Dual boot; full data and secure element separation
  • Secure data folder for classified documents and other data files. Data available when screen lock is open.
  • Excellent usability and quick two-factor authentication with NFC token and admin configurable authentication interval, available in Secure and Personal modes
  • Hardened, configurable and restricted cellular network security (call, SMS/MMS, IMS, VoLTE, aGPS, SIM application toolkit)
  • Hardened Linux kernel
  • Secured local connectivity (Bluetooth/WiFi/NFC/USB)
  • Automatic system cleanup of secure data
  • Device can be configured to be used only in Bittium Secure OS Confidential mode, using full device storage capacity
  • Always on VPN
  • Secure shutdown after lost network connectivity based on configurable time
Advanced
Security
Features
  • Hardened Android™ 11 operating system
  • Hardened Bittium Secure operating system
  • All data in the device is encrypted with AES-256 encryption (including the memory card, when used in adoptable storage mode)
  • Dedicated secure element (chipset) for storing security keys and providing functionality for encryption and user authentication
  • Backup battery allowing monitoring of the device security and tamper detection at all times, even when the main battery has ran out
  • Hardware-based Privacy Mode preventing ambient listening and spying of user/user environment
  • Hardware tamper detection preventing data theft and device implanting attempts
  • Secure boot, device HW and SW integrity check during boot
  • Disabled debug interfaces preventing attacks against device security
  • Device OS rollback prevention – not possible to use older device firmware for attacking the device
  • Die shield sensor in secure element to protect from physical intrusion and electromagnetic signal sniffing
  • Environmental attack protection in secure element preventing e.g. cryo/cold attacks and power glitch attacks
  • Application permission control – users can allow only trusted applications to access
  • User originated fast wipe of device data
Bittium Secure
Suite™
  • Configuration of security parameters and other settings
  • Audit logs for security related events
  • Remote wipe of device
  • Remote attestation
  • Application whitelisting support
  • Bittium SafeMove® MDM support
  • Bittium SafeMove® Mobile VPN to encrypt data in transit
  • Hardened password policy
  • Both operating systems support Multicontainer feature
  • Notifications between Secure and Personal modes
    Two Operating Systems
    • Hardened Bittium Secure OS for CONFIDENTIAL level use
    • Hardened Android™ 11 for Personal use
    • Both operating systems support Multicontainer feature
    Chipset Qualcomm® Snapdragon™ 670
    Memory 4GB RAM / 64GB eMMC. MicroSD expansion slot up to 256GB
    Display
    • 5.2” Full HD sunlight readable
    • Glove & wet usable capacitive touchscreen
    Imaging & Video
    • 12MP autofocus rear-facing and 5MP front-facing cameras
    • 4K and Full HD video
    Audio
    • High-quality front-facing dual speakers (109dB@5cm SPL)
    • Multi-microphone active noise cancellation
    Physical Buttons
    • Privacy mode activation
    • Emergency button (programmable, use as emergency button requires a separate application providing the functionality)
    • PTT/PTV (programmable, use as PTT/PTV button requires a separate application providing the functionality)
    • Power/wake-up
    • Volume up and down
    LTE and Bands 3GPP Rel12
    Dual SIM dual VOLTE (DSDV)
    IMS, VoLTE, CA
    FDD bands: 1, 2, 3, 4, 5, 7, 8, 12, 13, 14, 17, 20, 25, 26, 28, 29, 30, 66
    TDD bands: 38, 39, 40 (34, 41 optional)
    UMTS/HSPA Bands B1, B2, B4, B5, B8
    GSM/GPRS/EDGE Bands 850/900/1800/1900 MHz
    Complementary Radios Wi-Fi 802.11 a/b/g/n/ac (2.4 and 5Ghz)
    BT5.0, NFC

    *U-NII-3 Wi-Fi channels are not supported

    Desktop Stand

    Vehicle Holder

    Protective Case

    Vehicle Holder with Charging and ext Antenna

    Wired Remote Speaker Microphone EU

    Lite COM Wired PTT Headset, Hold to Talk

    Rugged Power Pack USB-C/USB-A

    PTT Voice Responder

    PTT Smart Button

    Wall charger with USB cable

    Wall charger with UK, EU and US adapters

    General 

    Question:
    Does Bittium Tough Mobile 2 C differ from a regular smartphone?

    Answer:

    Bittium Tough Mobile 2 C differs from a standard off-the-shelf smartphone as it is designed for secure use.

    For example, it has a dedicated secure element storing encryption keys and performing cryptographic operations. The Android based operating system’s security is hardened by Bittium to utilize the dedicated hardware secure element.

    It has a mechanical and electrical concept that has been designed to provide a long lifespan for the device. Bittium will also provide software security updates longer than what is usual for regular consumer smartphones.

    It has dual-boot functionality, running two completely separate and hardened operating systems on a single platform: Confidential and Personal. This unique dual-boot functionality enables both personal and professional use with high-level information security on a single device, eliminating the need for carrying two separate devices.

    The phone also has a unique hardware-based privacy mode for disabling microphones, cameras, Bluetooth, and reducing sensor sensitivity with a touch of a button.

    Question:
    Who can buy the phones and where?

    Answer:

    Bittium Tough Mobile 2 C is available for enterprise and government customers. The customers will also need the Bittium Secure Suite server, which is installed in their IT infrastructure. Please contact us for more information.

    Question:
    Where are the phones manufactured?

    Answer:

    Tough Mobile 2 C smartphones are designed and manufactured in Finland. Manufacturing is supervised by Bittium and can be audited for certification purposes.

    Question:
    Can Tough Mobile 2 C be used in commercial networks?

    Answer:

    Yes, Tough Mobile 2 C can be used in commercial networks as well as in private networks.

    Question:
    In which countries can I use Tough Mobile 2 C?

    Answer:

    Tough Mobile 2 C can be used globally and it supports the majority of the used cellular bands. For additional details of the supported bands, please see the supported bands in this website’s Connectivity Highlights section.

    Question:
    What does Tough Mobile 2 C’s “long lifespan” mean?

    Answer:

    The phone has a mechanical and electrical concept that has been designed to provide a long lifespan for the device. For example, it has military-grade durability (MIL-STD-810G) and in addition, Bittium provides operating system and software security updates longer than what is usually provided for regular smartphones.

    Question:
    Can I use any Android application with Tough Mobile 2 C?

    Answer:

    Yes, Tough Mobile 2 C is verified by Google and it is compatible with all Android applications available for Android 11.

    Question:
    Can Tough Mobile 2 C be customized?

    Answer:

    Yes, Tough Mobile 2 C can be customized to meet the security needs of different companies and organizations, further enhancing the smartphone usability. Please contact us for further details.

    Question:
    Can I get Tough Mobile 2 C without Google Mobile Services?

    Answer:

    Yes. Although Personal mode operating system always includes Google Mobile Services, with Bittium Secure Suite it is possible to disable the Personal mode, leaving only Bittium Secure operating system without Google Mobile Services in use.

    Question:
    When using Tough Mobile 2 C without Google Mobile Services and Google Play, am i able to install applications?

    Answer:

    With Bittium Secure Suite software product and its back-end server you can install approved Android applications through the Application Library.

    Question:
    Can I receive further details about mobile security and specific product features?

    Answer:

    All publicly available product information is on our website. More detailed technical information, training and dedicated customer support is available for B2B customers under Non-Disclosure-Agreement (NDA). 

    Question:
    What is the difference between the two operating systems in Tough Mobile 2 C?

    Answer:

    Operating system in the Confidential mode is completely separated and hardened for secure use, and it’s intended for ultimate, government-level secure communications.

    Hardened Android operating system in the Personal mode is for personal use where e.g. Google services and other social media applications are freely available.

    This unique dual-boot functionality enables both personal and professional use with high-level information security on a single device, eliminating the need for carrying two separate devices. The user can switch between the two different modes with dual-boot functionality.

    Question:
    What does Tough Mobile 2 C sales box include?

    Answer:

    Bittium Tough Mobile 2 C sales box include: Embedded 3000mAh Li-Ion battery, Charger with EU or UK plug, USB-C cable, Stereo headset, SIM tray tool, User guide, Secure Suite and NFC Dongle.

    Question:
    How long will the security updates be available?

    Answer:

    Bittium Tough Mobile 2 C is guaranteed to have a long life cycle and support for security updates. Device security updates will be available minimum until year 2024.

    Security 

    Question:
    What does 'highest level for security' mean?

    Answer:

    Highest level of security means that the device has been designed to meet even the highest governmental grade security requirements.

    Tough Mobile 2 C has been designed for ultra secure use, starting from tamper-proofed mechanics to always-on security monitoring of electronics and hardened software solutions utilizing the Android 10 operating system.

    Security is always based on hardware originated tamper proof security solutions.

    Smartphone’s unique HW security solutions and multilayered security structure are reinforced with the dual-boot functionality, running two completely separate and hardened operating systems on a single platform: Confidential and Personal.

    Bittium highest security also means that the device has been designed and manufactured by a trusted vendor in Finland.

    Question:
    What does Tough Mobile 2 C’s “multilayered security” mean?

    Answer:

    Tough Mobile 2 C’s security is built in layers, both in hardware and software.

    The security built in the hardware protects data at rest. Security starts from the design and manufacturing of the device, including a hardware secure element that for example stores all authentication data and encryption keys. For software-based security Tough Mobile 2 C always comes with Bittium Secure Suite™ full set of services for securing the data in transit.

    Question:
    What does Tough Mobile 2 C’s dedicated hardware secure element do?

    Answer:

    The hardware secure element provides for example user authentication services for Android, stores device encryption keys and provides cryptographic operations. If the Android OS becomes compromised with malware with access to everything, it still would not be able to access the contents of the secure element.

    Secure element also controls the tamper detection feature of the device – even if the device’s main battery has run out. The secure element is powered by its own backup battery.

    Question:
    How is data in Tough Mobile 2 C encrypted?

    Answer:

    All data in Tough Mobile 2 C is encrypted with AES-256 encryption. Tough Mobile 2 C supports also encryption for data in SD cards. Data in transit is encrypted with Bittium SafeMove® Mobile VPN included in Bittium Secure Suite.

    Question:
    How is Tough Mobile 2 C tamper-proofed?

    Answer:

    Tough Mobile 2 C’s secure element detects if someone is trying to for example drill, open, disassemble, or precision cut the device. If tampering is detected, the secure element cryptographically erases all data from the device, even if the main battery has ran out of power. The secure element is powered by its own rechargeable backup battery.

    Question:
    How is Tough Mobile 2 C protected from unwanted hardware implants?

    Answer:

    Tough Mobile 2 C is tamper-proofed, which means that the phone detects if it is dismantled or the SIM slot is opened. For security reasons all data is cryptographically erased in case of dismantling. When the SIM slot is opened, device locks instantly and only the device’s original user can dismiss notification of SIM slot opening by authenticating to the device and continue using the device.

    Question:
    How is Tough Mobile 2 C protected from malicious firmware?

    Answer:

    Tough Mobile 2 C can be used only with Bittium signed firmware delivered by Bittium. Device utilizes secure/trusted boot, OS rollback prevention and the device is non-rootable. In each start up the device checks firmware and hardware integrity. For additional security layer, Bittium Secure Suite can be used to remotely attest the device firmware and hardware.

    Question:
    What does Bittium Secure Suite provide and how can I take it into use with Tough Mobile 2 C?

    Answer:

    Bittium Secure Suite is an advanced software product that complements Bittium Tough Mobile 2 C with a full set of services for secure communications, including MDM, VPN, remote attestation and application whitelisting. It is available for both private and public organizations, and requires installation of a back-end server, which is provided either as a dedicated IT service or hosted by the customer.

    Please contact us to start a trial.

    Question:
    Is VPN included with Tough Mobile 2 C?

    Answer:

    Tough Mobile 2 C is always complemented with Bittium Secure Suite software which has Bittium SafeMove® Mobile VPN client software pre-installed to secure data in transit. Please contact us for more information and for starting a Bittium Secure Suite trial.

    Tough Mobile 2 C device supports also any 3rd party VPN solutions supported by Android 11.

    Question:
    What does the Multicontainer solution do?

    Answer:

    Both operating systems support Multicontainer feature, enabling the use of several secure, isolated workspaces within one operating system, preventing data contamination between applications/services located in container workspaces. With Multicontainer, it is possible to use classified data and services from several separate organizations as each container workspace isolates applications, data and network traffic from all
    other workspace containers.

    User can switch between the different workspaces by swiping sideways from the home screen.

    Services within the workspaces are protected and managed with Bittium Secure Suite. Services in workspace containers can connect to isolated back-ends via container-specific VPN tunnels, providing unique data-in-transit protection for each workspace.

    Question:
    How can I enable the Multicontainer solution?

    Answer:

    Multicontainer solution is enabled with the Bittium Secure Suite back-end system as each container uses its own VPN tunnel and server environment for isolating and encrypting data in transit. Please contact us to get the complete solution for your organization.

    Question:
    How can I create a single container in Tough Mobile 2 C?

    Answer:

    Multicontainer solution is enabled and controlled with Bittium Secure Suite back-end system.

    Question:
    What does the hardware-based Privacy Mode mean and how does it work?

    Answer:

    With Privacy Mode the user can prevent eavesdropping and spying through device by disabling microphones, Bluetooth, cameras and reducing sensor accuracy on the device at the hardware-level. Privacy Mode can be activated/deactivated by pressing and holding the privacy button, which is the topmost button on the right-hand side of the phone. A green indicator light starts blinking on the front side of the phone when Privacy Mode is active.

    Question:
    How can I make encrypted calls with Tough Mobile 2 C?

    Answer:

    Making encrypted calls is possible with dedicated secure voice applications, which are available from Bittium and its solution partners. Please contact us for more information.

    Question:
    How is Tough Mobile 2 C’s operating system hardened?

    Answer:

    For example, Tough Mobile 2 C’s security/encryption key management, user authentication and true random number generation are moved from Android to Bittium hardware-based secure element. If you would like to discuss what additional hardenings have been made, please contact us.

    Question:
    How can I quickly erase all my data from the phone in emergency situations?

    Answer:

    Tough Mobile 2 C is provided with a Fast Wipe functionality to erase all data in emergency situations. User can trigger Fast Wipe from drop-down menu by pressing the red Fast Wipe icon and giving the device PIN.

    Question:
    How do I get security updates to Tough Mobile 2 C?

    Answer:

    All Tough Mobile 2 C updates are delivered Over-The-Air (OTA).

    Bittium Secure Suite allows full control over which devices are updated, when, and with which firmware. The OTA delivery can also be protected by VPN. Bittium can also provide its customers with professional service tools for local updates.

    Question:
    Can Tough Mobile 2 C be security certified for national security purposes?

    Answer:

    Yes, Tough Mobile 2 C has been designed to be certified for national security purposes. CONFIDENTIAL level approvals are in progress. Device and manufacturing audits are possible for certification purposes.

    Technical 

    Question:
    How can I activate the Emergency button?

    Answer:

    Use of the emergency button requires a separate application providing the functionality. When the suitable application supporting Bittium emergency button has been installed, go to Settings → Buttons → Emergency Button Function and select Emergency application from the list.

    Question:
    How can I activate the Push-To-Talk button?

    Answer:

    Use of the PTT/PTV button requires a separate application providing the functionality. When the suitable application supporting Bittium PTT button has been installed, go to Settings → Buttons → PTT Button Function and select PTT application from the list.

    Question:
    What does “MIL-STD-810G” mean?

    Answer:

    MIL-STD-810G is a US military standard that defines a broad set of environmental (such as shock, vibration, temperature, humidity) requirements for mobile devices that are designed for use in harsh environments. Tough Mobile 2 C has been tested against the MIL-STD-810G shock and drop standards.

    Question:
    What does “IP67 water and dust resistant” mean?

    Answer:

    IP67 level water and dust resistant means that the device is built to be protected from dust and is operational after being submerged in 1 meter of water for 30 minutes. IP67 does not mean that device is designed to be used underwater.

    Question:
    Does the device support dual-SIM functionality?

    Answer:

    Yes, Tough Mobile 2 C supports Dual SIM Dual Standby and has dual nano-SIM slots.

    Question:
    Can the internal memory/storage be expanded?

    Answer:

    Yes, Tough Mobile 2 C has a combined nano-SIM/MicroSD expansion slot which can be used to provide up to 256GB of additional memory/storage.

    Question:
    Does the device support external keyboard and display?

    Answer:

    Yes, Tough Mobile 2 C supports external keyboards and displays via its USB-C connector in Personal mode only.

    Question:
    How can I take screenshots with Tough Mobile 2 C?

    Answer:

    You can take screenshots by pressing and holding the Power button until pop-up menu appears. From pop-up menu select “Screenshot”. If containers are enabled, taking screenshots is disabled by default.

    Question:
    What is the battery size/life for the device?

    Answer:

    Tough Mobile 2 C has a 3000mAh embedded battery. Due to the device’s highly optimized power management, it will provide up to 460h standby time and up to 20h talk times. Actual results may vary depending on usage and environmental factors.

    To make your battery last longer, you have multiple options.

    Turn off tethering and hotspots when you’re not using them, go to Settings -> Network & Internet -> Hotspot & tethering -> Wi-Fi hotspot.

    Turn off your Wi-Fi and Wi-Fi scanning when you are not using them, go to Settings -> Network & Internet -> Wi-Fi.

    Turn off your Bluetooth when you are not using it, go to Settings -> Connected devices -> Connection preferences -> Bluetooth.

    Turn off location when it is not necessary, go to Settings -> Security & location -> Location. Note that some applications and features don’t work without location services.

    Turn off Google apps automatic downloads and updates;

    go to Google Play -> Settings -> App download preference -> Ask me every time.
    go to Google Play -> Settings -> Auto-Update apps -> Don’t auto-update apps.

    Question:
    Which charger plugs are provided with the phone?

    Answer:

    Bittium can provide Tough Mobile 2 C with either EU, UK or US charger plugs.

    Question:
    How can I activate the Recovery mode?

    Answer:

    Make sure the device is powered off.

    Press ‘volume up’ button and keep it pressed -> press the ‘power’ button shortly and release it.

    You should now enter the screen where you see an Android robot icon and text ‘no command’.

    -> Release ‘volume up’ key -> press the ‘power’ key, keep it pressed and press shortly ‘volume up’ key -> release ‘power’ key.

    You should now enter the recovery menu where you can perform a factory reset. Use volume up and down keys for navigation, ‘power’ key for menu item selection.

    Note: If ‘power’ key is pressed over 10s, the phone will automatically restart.  Start over from the beginning if this happens.

    Support 

    Question:
    How long is the product warranty?

    Answer:

    Product warranty for Bittium Tough Mobile 2 C is one (1) year, including all accessories provided in the sales box, against defects in materials or workmanship. If the device is found to be defective within the one year warranty period, Bittium will repair or replace it with a new or refurbished device, at its option, at no charge to the customer, except as set forth below.

    This warranty does not cover cosmetic damage, or device failure caused by liquid damages, or damage due to misuse, abuse, negligence, accident, modification or disassembly of any part of the device. The warranty does not cover damage due to improper operation or maintenance, connection to improper voltage supply, or attempted repair by anyone other than a facility authorized by Bittium to service this Tough Mobile 2 C.

    Question:
    Can the product warranty be extended?

    Answer:

    Yes, private and public organizations can purchase Extended Warranty for additional 12-36 months. Please contact us for more information.

    Question:
    How do I update the software on my Tough Mobile 2 C?

    Answer:

    All Tough Mobile 2 C updates are delivered Over-The-Air (OTA).

    Bittium Secure Suite allows full control over which devices are updated, when and with which firmware. The OTA delivery can also be protected by VPN. Bittium can also provide its customers with professional service tools for local updates.

    Question:
    How can I change the battery?

    Answer:

    Bittium offers a replacement service if there is a need to replace the battery. Distributors and partners, please visit the Bittium Tough Mobile Support Portal for Partners to submit service requests. If you do not have an account for the Support Portal, please fill the Bittium Tough Mobile Support Request Form to make your service request.

    Question:
    Who can I contact for product support and maintenance?

    Answer:

    Please first read through all the FAQ and Support information on the Tough Mobile 2 C webpage.

    If your problem is not solved, distributors and partners please visit the Bittium Tough Mobile Support Portal for Partners to submit error reports, support requests, service requests, and feature requests. If you don’t have an account for the Support Portal, please fill the Bittium Tough Mobile Support Request Form to make your support request.

    Top performance and innovation strength, everything in service of a common goal, delivering a high-quality product to professionals who depend on these products under all circumstances. Abiom contributes its innovative products and services to a better service of the public security and associated to a higher quality of safety for the citizen. The knowledge and expertise in the area of radio communication, mobile data and light and sound systems makes Abiom your central point of contact for communication and mobility issues. Our company is fully qualified to advise, build-in and service all products/solutions. If the right solution is not available in your situation, we will develop it for you.

    For further information, visit: www.abiom.nl

    Airbus is a leader in designing, manufacturing and delivering aerospace products, services and solutions to customers on a worldwide scale. With around 130,000 employees and as the largest aeronautics and space company in Europe and a worldwide leader, Airbus is at the forefront of the aviation industry. Company builds the most innovative commercial aircraft and consistently capture about half of all commercial airliner orders. Thanks to the deep understanding of changing market needs, customer focus and technological innovation, Airbus offers products that connect people and places via air and space.

    For further information, visit: www.airbus.com

    For twenty years Ardaco has been at the forefront of developing information and communication technology to help organizations communicate securely and efficiently. A leader in the field, and dedicated to innovation, Ardaco has created communication platforms and secure document handling which place the customer in complete control.

    Silentel is comprehensive mobile communication security solution based around a secure server located with you or with Ardaco. Silentel is fast to implement by all of your selected users and then the ability to talk, message, chat and group chat, send images, documents and any other files securely.

    For further information, visit: www.ardaco.com

    Armour Communications Limited provides market leading technology for secure communications solutions for voice, video, messaging and data on everyday smartphones and tablets.

    Supplying Government, Enterprise and Finance markets with an easy to use, intuitive app, downloadable from the app stores and compatible across Android and iPhone, with optional PBX integration for landline connection. Delivering advanced security techniques and functionality for a highly scalable cloud-based service or an on-premises solution providing customers complete control and privacy of their communications.

    Armour´s product offerings include FIPS, NATO and CPA approved solutions to OFFICIAL-SENSITIVE, with additional security layers to mitigate threats up to SECRET.

    For further information, visit: www.armourcomms.com

    Beatrice Technologies, Inc. is dedicated to bringing you quality and reliability in technology, with advanced products that help leverage your business critical communications. Beatrice is committed to providing quality and reliability to all our customers.

    For further information, visit: www.beatriceco.com

    Danoffice IT provides professional and efficient IT & IS turnkey solutions to international organizations and businesses operating worldwide with its one-stop-shopping platform including a large number of high quality brands, skilled certified personnel and added value services.

    Danoffice IT elaborates on 22 years of experience exclusively supplying and servicing hardware to international organizations, governmental and non-governmental organizations and business-to-business partners HQ, operating globally. Your business, our passion – are the keywords which define Danoffice IT worldwide. Danoffice IT strive for excellence and appreciate the importance of being a flexible and reliable partner, offering tailor-made IT & IS solutions.

    For further information, visit: www.danofficeit.com

    DEC offers complete peace of mind when it comes to the privacy and safety of your information. With over 40 years of experience and partners in 48 countries, we help our clients make their communications private with a top-level mobile device and software communication platform – DEC Secure. DEC Secure includes Secure Call, Secure Zone and Secure VPN and provides multiple layers of security to ensure that all your communications needs are met.

    For further information, visit decsecure.com

    Dencrypt A/S is a danish company specialising in dynamic encryption of data communication with focus on combining a user-friendly operation with state-of-the-art encryption technology. Dencrypt´s solutions provide an effective protection against eavesdropping and industrial espionage and targets companies and organisations for whom protection of confidential information, critical technology or customer relations is important. Dencrypt is on the market with the DC1000 SecureTalk solution for encrypted voice and chat and delivers to the Danish Armed Forces, government offices and private companies.

    For further information, visit: www.dencrypt.dk

    Etherstack is a mission-critical communications technology company specialising in TETRA, DMR, P25 and PTT over LTE.

    Etherstack engineers apply state-of-the art innovation to public safety radio while keeping it secure and reliable. Achievements include the world´s first all-IP PTT core switching infrastructure, protocol stack licensing to over 70% of public safety radio manufacturers and a range of niche products from USB crypto modules to portable repeaters.

    The company has R&D facilities in London, Sydney, New York and Yokohama.

    For further information, visit: www.etherstack.com

    EO SECURITY is an independent Czech company with a transparent ownership structure.

    Since 2016, EO SECURITY has been operating in the fields of cyber security, data security and eavesdropping protection. Thanks to the team of experts in these areas, company provides clients with comprehensive services. From analysis and testing of existing security to design and implementation of a new solution.

    For further information, visit: http://www.eo-security.com

    Fox Crypto is a 100% Dutch B.V. and a separate division of Fox-IT. Company is known for uncompromising security when it comes to protecting highly classified information and the integrity of data. For 20 years, they have been entrusted with the protection of state secrets, among other things. Fox Crypto invents, creates and manages cryptographic products for media and file encryption, network security, domain separation, secure mobile communications, and encryption key management, among others.

    Since 2018, Fox Crypto has been a Strategic Partner of the Ministry of Defense for the development and continued availability of cryptographic products. Fox Crypto only provides products or services to customers when it can be reasonably assumed that they will not be used for human rights violations.

    For further information, visit: www.foxcrypto.com

    Grivas S.A. is a Greek company based in Athens and has been established in the market for 26 years.  Company is an IT Integrator and specializes in providing Intelligence Forensics, Software and Hardware as well as Security and IT equipment to the Greek and Cypriot Law Enforcement Authorities, Governmental and Private sector Organizations.

    Grivas S.A. provides whole solutions including maintenance, training, consultancy and support services.

    For further information, visit: www.grivas.com.gr

    Communication connects everything that we do. G6 Global exists to create the best communications system for your operational needs.

    G6 Global is based in Bristol, England. G6 Global team has worked in almost every corner of the globe; Iraq, Afghanistan, Sierra Leone, Rwanda, Libya, Albania, Azerbaijan, Kosovo, USA, Netherlands, Germany, France, UK, and many other locations.

    G6 Global staff has experience of working in hostile environments; often with military personnel. Client base is made up from Security Companies, Close Protection Teams, Surveillance Companies, HNW & UHNW clients both in the UK and across the world, whose communications needs are complex and mission critical.

    For further information, visit: www.g6-global.com

    Inmosat (Intercomunicaciones Móviles Satelitales S.A. de C.V.) is a proud Mexican brand with 25 years of experience enabling connectivity, focused on the creation of satellite telecommunications solutions with a high value of integration.

    Well established in the market as a leader company, Inmosat is always seeking innovation to satisfy and cover the necessities of their customers, and it is oriented to provide technological solutions to government agencies and national security entities. Inmosat has all the necessary permits to provide the best quality and service, as well as their own monitoring center operated 24/7, 365 days of the year, a laboratory for solutions, and repair facilities.

    For further information, visit: www.inmosat.com.mx

    KICKmobiles® Ltd was incorporated in 2008 to cater to global customers with factory unlocked mobile phone devices. In particular, we supply specialized products such as world´s most Private and Secure, Rugged, Tough, Luxury, Classic, Vintage, Gold Customized, Special/Limited Editions and VIP cell phones. We cater to global customers via our online store and physical luxury store in Kensington-London, United Kingdom. We are also specialised in secure and private communication solutions to Individual, Enterprise and Government customers. Bittium Tough Mobile prospective customers can now directly order and checkout / enquire via online at www.kickmobiles.com/bittium or In-Store, Kensington-London with Tax Free Shopping for eligible customers.
    Since 1989, Orbitica team, from the aeronautics and space sectors, ensures the development of their activity with the same desire to provide professionals with their technical and commercial experience on high-tech products and services.

    Companys’ competence is widely recognized in 4 areas of activity for demanding environments: GPS – GNSS, Satellite Communication and Data Transmissions, Radio communication and IT Extreme.

    Orbitica distributes their products and services directly to their customers, but also through an international network of resellers.

    For further information, visit: www.orbitica.com

    POST Luxembourg was founded in 1842 as a public service and has been a wholly state-owned company since 1992. It is the country’s largest provider of postal and telecommunications services and also offers financial and philatelic services. Telecommunication services range from fixed and mobile telephony to Internet access and television, as well as many tailor-made services designed for businesses. Owner of its fixed and mobile infrastructures, POST, together with its subsidiary POST Telecom S.A., offers high-speed secure connectivity solutions as well as voice and data management services for individuals and professional customers.

    For further information, visit: www.post.lu

    Saab serves the global market of governments, authorities and corporations with products, services and solutions ranging from military defence to civil security. Saab TactiCall ICS interconnects various communication technologies regardless of radioband, frequency and hardware, reduces effort, reduces risk and increase tempo. The system is scalable from one to several operator positions or communication interfaces and makes up the centerpiece in remote controlled setups from single radio to complete operations. TactiCall Mobile solutions take ICS one step further and brings TactiCall to your smartphones, tablets and laptops. TactiCall Mobile users will be able to communicate with individuals or groups on other mobile devices, user terminals, portable radios and TETRA terminals as well as with users in their remote office environment.

    For further information, visit: www.saabgroup.com

    Senop is a trusted provider of advanced optronics and critical communication solutions for the defense and industrial markets. Senop is the leading developer of high-quality custom optics and optical component in the Nordic. Senop makes the invisible visible and secures your communications. Advanced electro-optical systems, high-tech night vision systems, MIL-compliant system platforms, demanding system integrations and critical communications solutions are our core competence. Senop is a subsidiary of Millog Ltd and a part of Patria Group.

    For further information, visit: www.senop.fi

    Seolane provides breakthrough solutions adapted to the transportation and security demanding sectors. Delivering a complete range of integrated solutions, Seolane’s experts provide the best responses to current needs in critical communications, ultra secure mobile devices and edge computing. Seolane is also a key player for delivering AI solutions in complex environments like Smart Cities, Transportation and Security, aimed at improving quality of life and organisations efficiencies in fast changing environments. Seolane is also active in RF sensing solutions for security that can be deployed airborne on drones.

    For further information, visit: www.seolane.net

    Softcat is a leading provider of technology solutions and services to organisations in both private companies and public sector organisations in the UK and Ireland. Softcat provides: asset management, business intelligence & analytics, collaboration, commodity sourcing, datacentre, end user computing & mobility, networking & security, software licensing and IT services.

    For further information, visit: www.softcat.com

    TC Connect is a leading system integrator delivering voice and data communications solutions for professional users. TC Connect is specialized in developing customer-specific system solutions that are tailored to suit their customers’ business needs with high demands on functionality and reliability.

    Being able to communicate safely and without unwanted interruptions is crucial for TC Connect’s customers, operating in the segments of Public Sector, Healthcare, Security, Infra Structure, Energy and Industry. TC Connect has been working for designing, building, delivering, integrating and adapting products and services for decades and it’s a part of TCECUR group with its roots in the telecom industry. TC Connect has experience, knowledge, processes and the internal resources required to create and maintain customized solutions. TC Connect areas of expertise are Mobile coverage and indoor solutions, Mobile measurement and control, Operation and monitoring, Security and safety, Terminals and accessories as well as Services.

    For further information, visit: www.tcconnect.se

    Privately owned Telegrupp Ltd is one of Estonia’s largest systems integrators, providing telecom, IT and security services. Telegrupp’s capabilities include systems prototyping and software design and delivers turnkey security, communications and IT infrastructure to offices and data-centers. Providing the highest quality, Telegrupp helps customers save maintenance and service costs. The company’s quality system uses feedback and help from customers and partners, combining it with current industry standards.

    For further information, visit: www.telegrupp.ee

    Telia Cygate provides customers a unique combination of secure ICT solutions and services. Company’s top expertise is based on the high knowledge of cyber security, data networks, data center and cloud technologies. The best specialists, leading partners and over 25 years’ experience makes Cygate one of the industry leaders in Finland. Company is a part of Telia Company and employ over 400 people in Finland. Telia Cygate has adopted the Telia brand. However, Telia Cygate Oy will remain as a legal company.

    For further information, visit: www.telia.fi

    Tutus is a privately-held Swedish company that was founded in 1992. Ever since, the company has been developing top quality network encryption solutions for use in military, government and corporate IT applications that demand the highest levels of secure communication.

    As an independent company, Tutus cooperates with industries and governmental agencies in order to provide reliable, high-assurance and cost-effective crypto solutions to meet their security needs. All of our products are approved at the Restricted / Restreint classification level on the EU and national levels. Tutus is the main supplier of government approved and certified IT-security products in Sweden.

    For further information, visit: www.tutus.se

    Download brochure
    Contact us