Bittium Tough Mobile 2

bittium.com

Highest Level of Security
for Mobile Communications

Trusted by organizations in more than 40 countries
 
CONFIDENTIAL level security for highest security requirements
 
Two hardened operating systems with complete data separation
 
Designed and manufactured in Finland
 
Dedicated hardware secure element for most critical security functions
 
Data in transit protection and device management with Bittium Secure Suite™
 
Bittium Tough Mobile 2 C
Ultra secure professional and personal use within the same device without compromising usability.

Perfect Platform for Ultimate End-To-End Security

Bittium Tough Mobile™ 2 C smartphone together with Bittium Secure Suite™ device management and encryption software provides highest level of privacy and security for government agencies and authorities.

Smartphone’s unique hardware security solutions and multilayered security structure is based on the hardened Android™ 9 operating system and is reinforced with the dual-boot functionality, running two completely separate and hardened operating systems on a single platform: Confidential and Personal. Both operating systems also support Multicontainer feature, enabling the use of several secure, isolated work spaces within one operating system.

Bittium Secure Suite enables remote management of devices and applications of the device fleet, protects sensitive data at rest on the smartphone, as well as encrypted IP-based data transfer.

Security settings and other parameters of Bittium Tough Mobile 2 C operating systems can be configured with Bittium Secure Suite to Restricted, Confidential and beyond. This makes it possible to meet the individual security needs of different organizations, further enhancing the smartphone usability.

This smartphone based solution is designed to be certified to CONFIDENTIAL level by national security authorities.

 

Bittium Tough Mobile 2 C Dual-Boot

Both operating systems support Multicontainer feature

Dual-boot functionality provides two completely separate operating systems with full data separation within one device.

Personal use with hardened Android™ 9, where e.g. social media applications are freely available

Confidential use with hardened Bittium Secure OS, allowing demanding authority and use cases

User can quickly switch between the two operating systems with dual-boot functionality.

Excellent usability and quick two-factor authentication with NFC token* and admin configurable authentication interval.

*Yubikey 5 NFC by Yubico included in the sales package

Android is a trademark of Google LLC

  • Two isolated operating systems
  • Customized for different security needs
  • Latest smartphone features
  • Multilayered security
  • Trusted design and manufacturing in Finland
  • Long device lifespan

Security Without Compromizing Usability

Keep your data safe at all times

Next generation tamper detection for preventing data theft and spying
 
Hardware-based privacy mode for disabling microphones, cameras, Bluetooth, and reducing sensor sensitivity
 
 
Trusted boot with hardware and software integrity validation
Designed to be certified for CONFIDENTIAL level
 
Device and data in transit secured with Bittium Secure Suite™ device management and encryption software product
 
 
Data secured at all times with multilayered security integrated in hardware and software
 
Two separated operating systems (dual-OS)

Bittium Secure Suite™ for Complete Mobile Security

Available for enterprise and government customers

What you get with
Bittium Secure Suite™

Bittium Tough Mobile 2 C always comes with Bittium Secure Suite which is an advanced software product with a full set of services for secure communications. This combined solution is available for both private and public organizations and scales up from 10 to thousands, and requires installation of a client software and back-end server, which is provided either as a dedicated IT service or hosted by the customer.

Bittium Secure Suite™
Configuration of security parameters and other settings
Audit logs for security related events
Remote wipe of device
Remote attestation
Application whitelisting support
Bittium SafeMove® MDM support
Bittium SafeMove® Mobile VPN to encrypt data in transit
Hardened password policy
Multicontainer feature

Read more View specs Start a trial

Several isolated and secure workspaces with Multicontainer feature

Both operating systems are supported with the Multicontainer feature and Bittium Secure Suite

Workspace 2

Workspace 1

Home screen

Next Previous
Available for customers using Bittium Secure Suite™

Performance

Professional & powerful

  • Dual-OS
  • Hardened Android™ 9 (Personal mode)
  • Bittium Secure OS (Secure mode)
  • Qualcomm® Snapdragon™ 670 chipset
  • Dedicated hardware secure element
  • Global connectivity
  • Dual SIM
  • Embedded 3000mAh battery
  • 12MP autofocus rear-facing camera, 5MP front-facing camera
  • High-quality speakers
  • Multi-microphone active noise cancellation
  • MIL-STD-810G shock and drop resistant
  • IP67 water and dust resistant
  • 5.2” sunlight readable full HD display
  • Glove & wet usable capacitive touchscreen
  • 12MP autofocus rear-facing and 5MP front-facing cameras
  • Privacy mode, emergency and push-to-talk buttons

Your privacy is ensured when green LED blinks

Press and hold button to activate privacy mode

Unique Hardware-Based Privacy Mode

Privacy mode allows simultaneous use of the device, while protecting from:

  • Ambient listening by disconnecting microphones from the phone
  • Bluetooth sniffing by disabling Bluetooth
  • Camera spying by disabling device cameras
  • Sensor-based spying by reducing sensor accuracy

Three Variants

There are currently three different Bittium Tough Mobile 2 variants available, all providing a different level of security.
Variants are based on the same hardware, including the security layers built in the device.

Bittium Tough Mobile 2

With Google Mobile Services
For complete end-to-end mobile security, complement the device with Bittium Secure Suite™ device management and encryption software.

Bittium Tough Mobile 2

Without Google Mobile Services
For complete end-to-end mobile security, complement the device with Bittium Secure Suite™ device management and encryption software.

Bittium Tough Mobile 2 C

Two separated operating systems.
Always complemented with Bittium Secure Suite™ device management and encryption software.

Bittium
Secure
Operating
System
  • Dual boot; full data and secure element separation
  • Secure data folder for classified documents and other data files. Data available when screen lock is open.
  • Excellent usability and quick two-factor authentication with NFC token and admin configurable authentication interval, available in Secure and Personal modes
  • Hardened, configurable and restricted cellular network security (call, SMS/MMS, IMS, VoLTE, aGPS, SIM application toolkit)
  • Hardened Linux kernel
  • Secured local connectivity (Bluetooth/WiFi/NFC/USB)
  • Automatic system cleanup of secure data
  • Device can be configured to be used only in Bittium Secure OS Confidential mode, using full device storage capacity
  • Always on VPN
  • Secure shutdown after lost network connectivity based on configurable time
Advanced
Security
Features
  • Hardened Android™ 9 operating system
  • Hardened Bittium Secure operating system
  • All data in the device is encrypted with AES-256 encryption (including the memory card, when used in adoptable storage mode)
  • Dedicated secure element (chipset) for storing security keys and providing functionality for encryption and user authentication
  • Backup battery allowing monitoring of the device security and tamper detection at all times, even when the main battery has ran out
  • Hardware-based Privacy Mode preventing ambient listening and spying of user/user environment
  • Hardware tamper detection preventing data theft and device implanting attempts
  • Secure boot, device HW and SW integrity check during boot
  • Disabled debug interfaces preventing attacks against device security
  • Device OS rollback prevention – not possible to use older device firmware for attacking the device
  • Die shield sensor in secure element to protect from physical intrusion and electromagnetic signal sniffing
  • Environmental attack protection in secure element preventing e.g. cryo/cold attacks and power glitch attacks
  • Application permission control – users can allow only trusted applications to access
  • User originated fast wipe of device data
Bittium Secure
Suite™
  • Configuration of security parameters and other settings
  • Audit logs for security related events
  • Remote wipe of device
  • Remote attestation
  • Application whitelisting support
  • Bittium SafeMove® MDM support
  • Bittium SafeMove® Mobile VPN to encrypt data in transit
  • Hardened password policy
  • Both operating systems support Multicontainer feature
  • Notifications between Secure and Personal modes
    Two Operating Systems
    • Hardened Bittium Secure OS for CONFIDENTIAL level use
    • Hardened Android™ 9 (or newer) for Personal use
    • Both operating systems support Multicontainer feature
    Chipset Qualcomm® Snapdragon™ 670
    Memory 4GB RAM / 64GB eMMC. MicroSD expansion slot up to 256GB
    Display
    • 5.2” Full HD sunlight readable
    • Glove & wet usable capacitive touchscreen
    Imaging & Video
    • 12MP autofocus rear-facing and 5MP front-facing cameras
    • 4K and Full HD video
    Audio
    • High-quality front-facing dual speakers (109dB@5cm SPL)
    • Multi-microphone active noise cancellation
    Physical Buttons
    • Privacy mode activation
    • Emergency button (programmable, use as emergency button requires a separate application providing the functionality)
    • PTT/PTV (programmable, use as PTT/PTV button requires a separate application providing the functionality)
    • Power/wake-up
    • Volume up and down
    LTE and Bands

     

     

    3GPP Rel12
    Dual SIM (DSDS LTE+LTE in idle)
    IMS, VoLTE, CA
    FDD bands: 1, 2, 3, 4, 5, 7, 8, 12, 13, 14, 17, 20, 25, 26, 28, 29, 30, 66
    TDD bands: 38, 39, 40 (34, 41 optional)
    UMTS/HSPA Bands B1, B2, B4, B5, B8
    GSM/GPRS/EDGE Bands 850/900/1800/1900 MHz
    Complementary Radios Wi-Fi 802.11 a/b/g/n/ac (2.4 and 5Ghz)
    BT5.0, NFC

    *U-NII-3 Wi-Fi channels are not supported

    Desktop Stand

    Vehicle Holder

    Protective Case

    Vehicle Holder with Charging and ext Antenna

    Wired Remote Speaker Microphone EU

    Lite COM Wired PTT Headset, Hold to Talk

    Rugged Power Pack USB-C/USB-A

    PTT Voice Responder

    PTT Smart Button

    Wall charger with USB cable

    Wall charger with UK, EU and US adapters

    General 

    Question:
    Does Bittium Tough Mobile 2 C differ from a regular smartphone?

    Answer:

    Bittium Tough Mobile 2 C differs from a standard off-the-shelf smartphone as it is designed for secure use.

    For example, it has a dedicated secure element storing encryption keys and performing cryptographic operations. The Android 9 based operating system’s security is hardened by Bittium to utilize the dedicated hardware secure element.

    It has a mechanical and electrical concept that has been designed to provide a long lifespan for the device. Bittium will also provide software security updates longer than what is usual for regular consumer smartphones.

    It has dual-boot functionality, running two completely separate and hardened operating systems on a single platform: Confidential and Personal. This unique dual-boot functionality enables both personal and professional use with high-level information security on a single device, eliminating the need for carrying two separate devices.

    The phone also has a unique hardware-based privacy mode for disabling microphones, cameras, Bluetooth, and reducing sensor sensitivity with a touch of a button.

    Question:
    Who can buy the phones and where?

    Answer:

    Bittium Tough Mobile 2 C is available for enterprise and government customers. The customers will also need the Bittium Secure Suite server, which is installed in their IT infrastructure. Please contact us for more information.

    Question:
    Where are the phones manufactured?

    Answer:

    Tough Mobile 2 C smartphones are designed and manufactured in Finland. Manufacturing is supervised by Bittium and can be audited for certification purposes.

    Question:
    Can Tough Mobile 2 C be used in commercial networks?

    Answer:

    Yes, Tough Mobile 2 C can be used in commercial networks as well as in private networks.

    Question:
    In which countries can I use Tough Mobile 2 C?

    Answer:

    Tough Mobile 2 C can be used globally and it supports the majority of the used cellular bands. For additional details of the supported bands, please see the supported bands in this website’s Connectivity Highlights section.

    Question:
    What does Tough Mobile 2 C’s “long lifespan” mean?

    Answer:

    The phone has a mechanical and electrical concept that has been designed to provide a long lifespan for the device. For example, it has military-grade durability (MIL-STD-810G) and in addition, Bittium provides operating system and software security updates longer than what is usually provided for regular smartphones.

    Question:
    Can I use any Android application with Tough Mobile 2 C?

    Answer:

    Yes, Tough Mobile 2 C is verified by Google and it is compatible with all Android applications available for Android 9.

    Question:
    Can Tough Mobile 2 C be customized?

    Answer:

    Yes, Tough Mobile 2 C can be customized to meet the security needs of different companies and organizations, further enhancing the smartphone usability. Please contact us for further details.

    Question:
    Can I get Tough Mobile 2 C without Google Mobile Services?

    Answer:

    Yes. Although Personal mode operating system always includes Google Mobile Services, with Bittium Secure Suite it is possible to disable the Personal mode, leaving only Bittium Secure operating system without Google Mobile Services in use.

    Question:
    When using Tough Mobile 2 C without Google Mobile Services and Google Play, am i able to install applications?

    Answer:

    With Bittium Secure Suite software product and its back-end server you can install approved Android applications through the Application Library.

    Question:
    Can I receive further details about mobile security and specific product features?

    Answer:

    All publicly available product information is on our website. More detailed technical information, training and dedicated customer support is available for B2B customers under Non-Disclosure-Agreement (NDA). 

    Question:
    What is the difference between the two operating systems in Tough Mobile 2 C?

    Answer:

    Operating system in the Confidential mode is completely separated and hardened for secure use, and it’s intended for ultimate, government-level secure communications.

    Hardened Android operating system in the Personal mode is for personal use where e.g. Google services and other social media applications are freely available.

    This unique dual-boot functionality enables both personal and professional use with high-level information security on a single device, eliminating the need for carrying two separate devices. The user can switch between the two different modes with dual-boot functionality.

    Question:
    What does Tough Mobile 2 C sales box include?

    Answer:

    Bittium Tough Mobile 2 C sales box include: Embedded 3000mAh Li-Ion battery, Charger with EU or UK plug, USB-C cable, Stereo headset, SIM tray tool, User guide, Secure Suite and NFC Dongle.

    Security 

    Question:
    What does 'highest level for security' mean?

    Answer:

    Highest level of security means that the device has been designed to meet even the highest governmental grade security requirements.

    Tough Mobile 2 C has been designed for ultra secure use, starting from tamper-proofed mechanics to always-on security monitoring of electronics and hardened software solutions utilizing the Android 9 operating system.

    Security is always based on hardware originated tamper proof security solutions.

    Smartphone’s unique HW security solutions and multilayered security structure are reinforced with the dual-boot functionality, running two completely separate and hardened operating systems on a single platform: Confidential and Personal.

    Bittium highest security also means that the device has been designed and manufactured by a trusted vendor in Finland.

    Question:
    What does Tough Mobile 2 C’s “multilayered security” mean?

    Answer:

    Tough Mobile 2 C’s security is built in layers, both in hardware and software.

    The security built in the hardware protects data at rest. Security starts from the design and manufacturing of the device, including a hardware secure element that for example stores all authentication data and encryption keys. For software-based security Tough Mobile 2 C always comes with Bittium Secure Suite™ full set of services for securing the data in transit.

    Question:
    What does Tough Mobile 2 C’s dedicated hardware secure element do?

    Answer:

    The hardware secure element provides for example user authentication services for Android, stores device encryption keys and provides cryptographic operations. If the Android OS becomes compromised with malware with access to everything, it still would not be able to access the contents of the secure element.

    Secure element also controls the tamper detection feature of the device – even if the device’s main battery has run out. The secure element is powered by its own backup battery.

    Question:
    How is data in Tough Mobile 2 C encrypted?

    Answer:

    All data in Tough Mobile 2 C is encrypted with AES-256 encryption. Tough Mobile 2 C supports also encryption for data in SD cards. Data in transit is encrypted with Bittium SafeMove® Mobile VPN included in Bittium Secure Suite.

    Question:
    How is Tough Mobile 2 C tamper-proofed?

    Answer:

    Tough Mobile 2 C’s secure element detects if someone is trying to for example drill, open, disassemble, or precision cut the device. If tampering is detected, the secure element cryptographically erases all data from the device, even if the main battery has ran out of power. The secure element is powered by its own rechargeable backup battery.

    Question:
    How is Tough Mobile 2 C protected from unwanted hardware implants?

    Answer:

    Tough Mobile 2 C is tamper-proofed, which means that the phone detects if it is dismantled or the SIM slot is opened. For security reasons all data is cryptographically erased in case of dismantling. When the SIM slot is opened, device locks instantly and only the device’s original user can dismiss notification of SIM slot opening by authenticating to the device and continue using the device.

    Question:
    How is Tough Mobile 2 C protected from malicious firmware?

    Answer:

    Tough Mobile 2 C can be used only with Bittium signed firmware delivered by Bittium. Device utilizes secure/trusted boot, OS rollback prevention and the device is non-rootable. In each start up the device checks firmware and hardware integrity. For additional security layer, Bittium Secure Suite can be used to remotely attest the device firmware and hardware.

    Question:
    What does Bittium Secure Suite provide and how can I take it into use with Tough Mobile 2 C?

    Answer:

    Bittium Secure Suite is an advanced software product that complements Bittium Tough Mobile 2 C with a full set of services for secure communications, including MDM, VPN, remote attestation and application whitelisting. It is available for both private and public organizations, and requires installation of a back-end server, which is provided either as a dedicated IT service or hosted by the customer.

    Please contact us to start a trial.

    Question:
    Is VPN included with Tough Mobile 2 C?

    Answer:

    Tough Mobile 2 C is always complemented with Bittium Secure Suite software which has Bittium SafeMove® Mobile VPN client software pre-installed to secure data in transit. Please contact us for more information and for starting a Bittium Secure Suite trial.

    Tough Mobile 2 C device supports also any 3rd party VPN solutions supported by Android 9.

    Question:
    What does the Multicontainer solution do?

    Answer:

    Both operating systems support Multicontainer feature, enabling the use of several secure, isolated workspaces within one operating system, preventing data contamination between applications/services located in container workspaces. With Multicontainer, it is possible to use classified data and services from several separate organizations as each container workspace isolates applications, data and network traffic from all
    other workspace containers.

    User can switch between the different workspaces by swiping sideways from the home screen.

    Services within the workspaces are protected and managed with Bittium Secure Suite. Services in workspace containers can connect to isolated back-ends via container-specific VPN tunnels, providing unique data-in-transit protection for each workspace.

    Question:
    How can I enable the Multicontainer solution?

    Answer:

    Multicontainer solution is enabled with the Bittium Secure Suite back-end system as each container uses its own VPN tunnel and server environment for isolating and encrypting data in transit. Please contact us to get the complete solution for your organization.

    Question:
    How can I create a single container in Tough Mobile 2 C?

    Answer:

    Multicontainer solution is enabled and controlled with Bittium Secure Suite back-end system.

    Question:
    What does the hardware-based Privacy Mode mean and how does it work?

    Answer:

    With Privacy Mode the user can prevent eavesdropping and spying through device by disabling microphones, Bluetooth, cameras and reducing sensor accuracy on the device at the hardware-level. Privacy Mode can be activated/deactivated by pressing and holding the privacy button, which is the topmost button on the right-hand side of the phone. A green indicator light starts blinking on the front side of the phone when Privacy Mode is active.

    Question:
    How can I make encrypted calls with Tough Mobile 2 C?

    Answer:

    Making encrypted calls is possible with dedicated secure voice applications, which are available from Bittium and its solution partners. Please contact us for more information.

    Question:
    How is Tough Mobile 2 C’s operating system hardened?

    Answer:

    For example, Tough Mobile 2 C’s security/encryption key management, user authentication and true random number generation are moved from Android to Bittium hardware-based secure element. If you would like to discuss what additional hardenings have been made, please contact us.

    Question:
    How can I quickly erase all my data from the phone in emergency situations?

    Answer:

    Tough Mobile 2 C is provided with a Fast Wipe functionality to erase all data in emergency situations. User can trigger Fast Wipe from drop-down menu by pressing the red Fast Wipe icon and giving the device PIN.

    Question:
    How do I get security updates to Tough Mobile 2 C?

    Answer:

    All Tough Mobile 2 C updates are delivered Over-The-Air (OTA).

    Bittium Secure Suite allows full control over which devices are updated, when, and with which firmware. The OTA delivery can also be protected by VPN. Bittium can also provide its customers with professional service tools for local updates.

     

    Question:
    Can Tough Mobile 2 C be security certified for national security purposes?

    Answer:

    Yes, Tough Mobile 2 C has been designed to be certified for national security purposes. CONFIDENTIAL level approvals are in progress. Device and manufacturing audits are possible for certification purposes.

    Technical 

    Question:
    How can I activate the Emergency button?

    Answer:

    Use of the emergency button requires a separate application providing the functionality. When the suitable application supporting Bittium emergency button has been installed, go to Settings → Buttons → Emergency Button Function and select Emergency application from the list.

    Question:
    How can I activate the Push-To-Talk button?

    Answer:

    Use of the PTT/PTV button requires a separate application providing the functionality. When the suitable application supporting Bittium PTT button has been installed, go to Settings → Buttons → PTT Button Function and select PTT application from the list.

    Question:
    What does “MIL-STD-810G” mean?

    Answer:

    MIL-STD-810G is a US military standard that defines a broad set of environmental (such as shock, vibration, temperature, humidity) requirements for mobile devices that are designed for use in harsh environments. Tough Mobile 2 C has been tested against the MIL-STD-810G shock and drop standards.

    Question:
    What does “IP67 water and dust resistant” mean?

    Answer:

    IP67 level water and dust resistant means that the device is built to be protected from dust and is operational after being submerged in 1 meter of water for 30 minutes. IP67 does not mean that device is designed to be used underwater.

    Question:
    Does the device support dual-SIM functionality?

    Answer:

    Yes, Tough Mobile 2 C supports Dual SIM Dual Standby and has dual nano-SIM slots.

    Question:
    Can the internal memory/storage be expanded?

    Answer:

    Yes, Tough Mobile 2 C has a combined nano-SIM/MicroSD expansion slot which can be used to provide up to 256GB of additional memory/storage.

    Question:
    Does the device support external keyboard and display?

    Answer:

    Yes, Tough Mobile 2 C supports external keyboards and displays via its USB-C connector in Personal mode only.

    Question:
    How can I take screenshots with Tough Mobile 2 C?

    Answer:

    You can take screenshots by pressing and holding the Power button until pop-up menu appears. From pop-up menu select “Screenshot”. If containers are enabled, taking screenshots is disabled by default.

    Question:
    What is the battery size/life for the device?

    Answer:

    Tough Mobile 2 C has a 3000mAh embedded battery. Due to the device’s highly optimized power management, it will provide up to 460h standby time and up to 20h talk times. Actual results may vary depending on usage and environmental factors.

    To make your battery last longer, you have multiple options.

    Turn off tethering and hotspots when you’re not using them, go to Settings -> Network & Internet -> Hotspot & tethering -> Wi-Fi hotspot.

    Turn off your Wi-Fi and Wi-Fi scanning when you are not using them, go to Settings -> Network & Internet -> Wi-Fi.

    Turn off your Bluetooth when you are not using it, go to Settings -> Connected devices -> Connection preferences -> Bluetooth.

    Turn off location when it is not necessary, go to Settings -> Security & location -> Location. Note that some applications and features don’t work without location services.

    Turn off Google apps automatic downloads and updates;

    go to Google Play -> Settings -> App download preference -> Ask me every time.
    go to Google Play -> Settings -> Auto-Update apps -> Don’t auto-update apps.

    Question:
    Which charger plugs are provided with the phone?

    Answer:

    Bittium can provide Tough Mobile 2 C with either EU, UK or US charger plugs.

    Question:
    How can I activate the Recovery mode?

    Answer:

    Make sure the device is powered off.

    Press ‘volume up’ button and keep it pressed -> press the ‘power’ button shortly and release it.

    You should now enter the screen where you see an Android robot icon and text ‘no command’.

    -> Release ‘volume up’ key -> press the ‘power’ key, keep it pressed and press shortly ‘volume up’ key -> release ‘power’ key.

    You should now enter the recovery menu where you can perform a factory reset. Use volume up and down keys for navigation, ‘power’ key for menu item selection.

    Note: If ‘power’ key is pressed over 10s, the phone will automatically restart.  Start over from the beginning if this happens.

     

    Support 

    Question:
    How long is the product warranty?

    Answer:

    Product warranty for Bittium Tough Mobile 2 C is one (1) year, including all accessories provided in the sales box, against defects in materials or workmanship. If the device is found to be defective within the one year warranty period, Bittium will repair or replace it with a new or refurbished device, at its option, at no charge to the customer, except as set forth below.

    This warranty does not cover cosmetic damage, or device failure caused by liquid damages, or damage due to misuse, abuse, negligence, accident, modification or disassembly of any part of the device. The warranty does not cover damage due to improper operation or maintenance, connection to improper voltage supply, or attempted repair by anyone other than a facility authorized by Bittium to service this Tough Mobile 2 C.

    Question:
    Can the product warranty be extended?

    Answer:

    Yes, private and public organizations can purchase Extended Warranty for additional 12-36 months. Please contact us for more information.

    Question:
    How do I update the software on my Tough Mobile 2 C?

    Answer:

    All Tough Mobile 2 C updates are delivered Over-The-Air (OTA).

    Bittium Secure Suite allows full control over which devices are updated, when and with which firmware. The OTA delivery can also be protected by VPN. Bittium can also provide its customers with professional service tools for local updates.

    Question:
    How can I change the battery?

    Answer:

    Bittium offers a replacement service if there is a need to replace the battery. Distributors and partners, please visit the Bittium Tough Mobile Support Portal for Partners to submit service requests. If you do not have an account for the Support Portal, please fill the Bittium Tough Mobile Support Request Form to make your service request.

    Question:
    Who can I contact for product support and maintenance?

    Answer:

    Please first read through all the FAQ and Support information on the Tough Mobile 2 C webpage.

    If your problem is not solved, distributors and partners please visit the Bittium Tough Mobile Support Portal for Partners to submit error reports, support requests, service requests, and feature requests. If you don’t have an account for the Support Portal, please fill the Bittium Tough Mobile Support Request Form to make your support request.

    Top performance and innovation strength, everything in service of a common goal, delivering a high-quality product to professionals who depend on these products under all circumstances. Abiom contributes its innovative products and services to a better service of the public security and associated to a higher quality of safety for the citizen. The knowledge and expertise in the area of radio communication, mobile data and light and sound systems makes Abiom your central point of contact for communication and mobility issues. Our company is fully qualified to advise, build-in and service all products/solutions. If the right solution is not available in your situation, we will develop it for you.

    For further information, visit: www.abiom.nl

    For twenty years Ardaco has been at the forefront of developing information and communication technology to help organizations communicate securely and efficiently. A leader in the field, and dedicated to innovation, Ardaco has created communication platforms and secure document handling which place the customer in complete control.

    Silentel is comprehensive mobile communication security solution based around a secure server located with you or with Ardaco. Silentel is fast to implement by all of your selected users and then the ability to talk, message, chat and group chat, send images, documents and any other files securely.

    For further information, visit: www.ardaco.com

    Armour Communications Limited provides market leading technology for secure communications solutions for voice, video, messaging and data on everyday smartphones and tablets.

    Supplying Government, Enterprise and Finance markets with an easy to use, intuitive app, downloadable from the app stores and compatible across Android and iPhone, with optional PBX integration for landline connection. Delivering advanced security techniques and functionality for a highly scalable cloud-based service or an on-premises solution providing customers complete control and privacy of their communications.

    Armour´s product offerings include FIPS, NATO and CPA approved solutions to OFFICIAL-SENSITIVE, with additional security layers to mitigate threats up to SECRET.

    For further information, visit: www.armourcomms.com

    Beatrice Technologies, Inc. is dedicated to bringing you quality and reliability in technology, with advanced products that help leverage your business critical communications. Beatrice is committed to providing quality and reliability to all our customers.

    For further information, visit: www.beatriceco.com/bti_bittium/

    With over 15 years’ experience of helping governments and businesses secure their valuable data, Becrypt has a long heritage of providing enterprise data protection solutions to the most security conscious organisations. Innovating to provide the highest levels of product assurance, our data protection solutions allow diverse platforms to be adopted within the enterprise with confidence. Working with device manufacturers, we deliver comprehensive mobile security as a seamless user experience that supports productivity without compromising protection.

    For further information, visit: www.becrypt.com

    Danoffice IT provides professional and efficient IT & IS turnkey solutions to international organizations and businesses operating worldwide with its one-stop-shopping platform including a large number of high quality brands, skilled certified personnel and added value services.

    Danoffice IT elaborates on 22 years of experience exclusively supplying and servicing hardware to international organizations, governmental and non-governmental organizations and business-to-business partners HQ, operating globally.

    Your business, our passion – are the keywords which define Danoffice IT worldwide.

    Danoffice IT strive for excellence and appreciate the importance of being a flexible and reliable partner, offering tailor-made IT & IS solutions.

    For further information, visit: www.danofficeit.com

    Dencrypt A/S is a danish company specialising in dynamic encryption of data communication with focus on combining a user-friendly operation with state-of-the-art encryption technology. Dencrypt´s solutions provide an effective protection against eavesdropping and industrial espionage and targets companies and organisations for whom protection of confidential information, critical technology or customer relations is important. Dencrypt is on the market with the DC1000 SecureTalk solution for encrypted voice and chat and delivers to the Danish Armed Forces, government offices and private companies.

    For further information, visit: www.dencrypt.dk

    Etherstack is a mission-critical communications technology company specialising in TETRA, DMR, P25 and PTT over LTE.

    Etherstack engineers apply state-of-the art innovation to public safety radio while keeping it secure and reliable. Achievements include the world´s first all-IP PTT core switching infrastructure, protocol stack licensing to over 70% of public safety radio manufacturers and a range of niche products from USB crypto modules to portable repeaters.

    The company has R&D facilities in London, Sydney, New York and Yokohama.

    For further information, visit: www.etherstack.com

    ENENSYS Technologies is a global designer and manufacturer of innovative professional equipment for the Digital Video Delivery and Broadcast industry. For 15 years, ENENSYS enables Efficient Video Delivery over Terrestrial (ATSC 3.0, DVB-T/T2, ISDB-T/Tb, HbbTV…), Satellite (DVB-S/S2/S2X) & Telecom Networks (4G/5G, IPTV, OTT), and provides Test & Monitoring equipment with the TestTree brand.

    With the acquisition of Expway, ENENSYS covers the entire Media Delivery Chain, from the head-end all the way to the receiver. ENENSYS provides operators a unique end-to-end solution for broadcast over 4G/5G network: the most advanced eMBMS solution on the market, with the largest eMBMS commercial deployments.

    For further information, visit: www.enensys.com

    EO SECURITY is an independent Czech company with a transparent ownership structure.

    Since 2016, EO SECURITY has been operating in the fields of cyber security, data security and eavesdropping protection.

    Thanks to the team of experts in these areas, company provides clients with comprehensive services.

    From analysis and testing of existing security to design and implementation of a new solution.

    For further information, visit: www.eo-security.com 

    Grivas S.A. is a Greek company based in Athens and has been established in the market for 26 years.  Company is an IT Integrator and specializes in providing Intelligence Forensics, Software and Hardware as well as Security and IT equipment to the Greek and Cypriot Law Enforcement Authorities, Governmental and Private sector Organizations.

    Grivas S.A. provides whole solutions including maintenance, training, consultancy and support services.

    For further information, visit: www.grivas.com.gr

    Established in 2015, Gryphon is a Canadian company that has built a complete, end to end communications solution, combining secure hardware, state of the art encryption and hardened software. Company provides a turn-key secure communications platform that protects customer confidentiality, secures the customers’ digital assets and ensures privacy of their data and communications when outside a trusted environment or while at home.

    Gryphon protects your Voice, Messaging, and File Sharing, and provides protection for your mobile devices. Over the past 5 years Gryphon has established a prominent customer base including International Governments and Small/Medium Enterprises globally.

    For further information, visit: www.gryphonsecure.com

    GSMK CryptoPhone® secure mobile devices offer trustworthy 360-degree protection: voice & message encryption plus device security in an easy-to-use package. They are the only secure mobile telephony products on the market that come with source code available for independent security assessments. Featuring the strongest and most secure encryption algorithms available today as well as extraordinarily robust communication links that have been carefully optimized to reliably deliver secure end-to-end encrypted communications even under adverse network conditions, GSMK CryptoPhone technology offers true strategic security for encryption of voice and messages with latest-generation voice codecs and full interoperability across network borders. A hardened operating system reliably protects the device against outside attacks, thus offering true 360-degree protection when it counts most.

    For further information, visit: www.cryptophone.de

    Communication connects everything that we do. G6 Global exists to create the best communications system for your operational needs.

    G6 Global is based in Bristol, England. G6 Global team has worked in almost every corner of the globe; Iraq, Afghanistan, Sierra Leone, Rwanda, Libya, Albania, Azerbaijan, Kosovo, USA, Netherlands, Germany, France, UK, and many other locations.

    G6 Global staff has experience of working in hostile environments; often with military personnel. Client base is made up from Security Companies, Close Protection Teams, Surveillance Companies, HNW & UHNW clients both in the UK and across the world, whose communications needs are complex and mission critical.

    For further information, visit: www.g6-global.com

    INSTAVOX provides in France an integrated PTT over cellular solution that takes advantage of the long experience of its mother company NOVELAD in PMR critical solutions. INSTAVOX combines a POC application edited by TASSTA with the most secure, ruggedized and reliable devices and state of the art configuration support to provide critical communication services to police forces, security organizations and strategic sites.

    For further information, visit: www.instavox.fr

    KICKmobiles® Ltd was incorporated in 2008 to cater to global customers with factory unlocked mobile phone devices. In particular, we supply specialized products such as world´s most Private and Secure, Rugged, Tough, Luxury, Classic, Vintage, Gold Customized, Special/Limited Editions and VIP cell phones. We cater to global customers via our online store and physical luxury store in Kensington-London, United Kingdom. We are also specialised in secure and private communication solutions to Individual, Enterprise and Government customers. Bittium Tough Mobile prospective customers can now directly order and checkout / enquire via online at www.kickmobiles.com/bittium or In-Store, Kensington-London with Tax Free Shopping for eligible customers.
    Nemergent Solutions SL is an SME located at Bilbao, Spain, founded in January 2017 by experienced researchers from the University of the Basque Country. It is positioned as a technology provider with significant expertise in designing novel multi-sector mission critical solutions over mobile broadband technologies. The innovation-driven nature of the company promotes the establishment of research links with different UE, Control Room and 4G/5G core leading companies.

    Nemergent has a vast portfolio that includes a complete and fully 3GPP standard compliant Mission Critical Services (MCPTT, MCData & MCVideo) ecosystem. The server-side components are designed as NFV components, fostering agile and flexible deployments towards 5G.

    For further information, visit: www.nemergent-solutions.com

    Oceus Networks Inc., a solutions company, provides agile and innovative mobile technologies that enable secure, high-speed communications to customers leveraging the latest in standards-based commercial off-the-shelf (COTS) technology. We provide products and solutions at best value to enable success for our customers’ unique missions. Privately U.S.-owned and operated, Oceus Networks’ headquarters are located in Reston, Virginia.

    For further information, visit: www.oceusnetworks.com

    Since 1989, Orbitica team, from the aeronautics and space sectors, ensures the development of their activity with the same desire to provide professionals with their technical and commercial experience on high-tech products and services.

    Companys’ competence is widely recognized in 4 areas of activity for demanding environments: GPS – GNSS, Satellite Communication and Data Transmissions, Radio communication and IT Extreme.

    Orbitica distributes their products and services directly to their customers, but also through an international network of resellers.

    For further information, visit: www.orbitica.com

    Qnective is a leading provider of sophisticated communication solutions and services, with deep expertise in wireless technologies, networking and highly-secure encryption mechanisms. Qnective combines mobile experienced professionals with advanced cryptography and security experts in order to develop state of the art secure communication platforms for private enterprises and public organizations. Founded in 2007, Qnective is privately held and headquartered in Zurich, Switzerland.

    For further information, visit: www.qnective.com

    Saab serves the global market of governments, authorities and corporations with products, services and solutions ranging from military defence to civil security. Saab TactiCall ICS interconnects various communication technologies regardless of radioband, frequency and hardware, reduces effort, reduces risk and increase tempo. The system is scalable from one to several operator positions or communication interfaces and makes up the centerpiece in remote controlled setups from single radio to complete operations. TactiCall Mobile solutions take ICS one step further and brings TactiCall to your smartphones, tablets and laptops. TactiCall Mobile users will be able to communicate with individuals or groups on other mobile devices, user terminals, portable radios and TETRA terminals as well as with users in their remote office environment.

    For further information, visit: www.saabgroup.com

    TASSTA offers voice communications, messaging and data solutions to be connected to every corner around the globe. TASSTA’s mission-critical push-to-talk solution prevents the limits of all communication. The solution is equipped with the safest and most reliable networks to offer the most extensive area coverage and the highest voice quality.

    TASSTA offers the most efficient way to communicate due to a certified Lone Worker Protection solution within teams, with broadband, WiFi, and the best carrier, device, and application options. TASSTA brings changes in the world of communication with an application for smartphones and computers that become an alternative affordable solution for classical radio with numerous additional functions.

    For further information, visit: www.tassta.com

    TC Connect is a leading system integrator delivering voice and data communications solutions for professional users. TC Connect is specialized in developing customer-specific system solutions that are tailored to suit their customers’ business needs with high demands on functionality and reliability.

    Being able to communicate safely and without unwanted interruptions is crucial for TC Connect’s customers, operating in the segments of Public Sector, Healthcare, Security, Infra Structure, Energy and Industry. TC Connect has been working for designing, building, delivering, integrating and adapting products and services for decades and it’s a part of TCECUR group with its roots in the telecom industry. TC Connect has experience, knowledge, processes and the internal resources required to create and maintain customized solutions. TC Connect areas of expertise are Mobile coverage and indoor solutions, Mobile measurement and control, Operation and monitoring, Security and safety, Terminals and accessories as well as Services.

    For further information, visit: www.tcconnect.se

    Download brochure
    Contact us