Without work, all life goes rotten. But, when work is soulless, life stifles and dies.
Menu

IntactPhone

Total Mobile Security and Productivity

IntactPhone

IntactPhone is the world’s most secure mobile phone for organizations. This high-end smartphone is built from the ground-up to provide you the ultimate defense against mobile cyber-crime. IntactPhone runs a purpose-built security-rich operating system, fused command-and-control application, built-in secure communications, and multiple security and performance assurance utilities. These components form the Intact Mobile Security platform. It protects you from eavesdropping, malware, data breaches and any attempts to hack or tamper with your mobile communications and data. It enables you to establish and enforce a best-of-all-worlds mobile device security and compliance framework to match your specific enterprise mobile security requirements.

Why choose IntactPhone?

Holistic, best of-all-worlds mobile security platform

Minimized cyber-attack surface to the extreme

Hardware of trust, secure bootloader, and official drivers

Highly certified architecture with no / hybrid Google services

Fused central intelligent and advanced defense controls across devices

Who is it good for?

Security-minded organizations that wish to deploy the highest-security over their mobile communications and data, and completely eliminate cyber-attack threats.

Intact Phone

Core Capabilities

IntactOS – Custom-built OS

The IntactPhone runs on IntactOS, a custom-built security-rich operating system, enhanced to address mobile security concerns facing enterprises today. The Android-like IntactOS is built from the source code to provide in-depth protection against cyber-attacks by blocking the security breaches found in commercial Android operating systems. IntactOS is free of bloatware, hooks to carriers, and leaky data.

IntactDialog - Secure Communications

The IntactPhone provides security and privacy by encrypting voice over IP calls through ZRTP. The communications can run on any network; including 2G GSM, 3G UMTS-CDMA and LTE. In addition, it delivers end-to-end messaging encryption, based on AES256 message encryption with 256-bit key length, and RSA 2048.

Internal Anonymous Phone book

Built-in phone book allows secret identity for IntactPhone users along with a flexible definition of user exposure policies across organizational groups.

Recorded Communications

Intact Mobile security provides mobile communications archiving for both voice calls and messages. Recorded communications are fully protected with complete encryption against potential interference from outside party who might steal valuable information. Decryption keys for the logged communications are only obtained by your organization.

IntactCC - Fused Command and Control

Fused governance and control application ensures the safe use of corporate devices via configurable security profiles. Group-based policies and restrictions define solid the use of device features, applications, web browsing and access to network, data and device resources, followed by easy recovery from lost and stolen device scenarios.

Apps Permission Enforcement

The IntactPhone enables granular apps permissions management. Central policies set the device functions that can be accessed by an application and provide the ability to block or spoof requests.

Encrypted Data-at-Rest

IntactPhone full-disk encryption ensures information stored on the device is only accessible to users who enter the password/PIN. The Encryption key is known only to the device owner.

Threat Detection

IntactPhone detects behavior-based anomaly across Wi-Fi connectivity, cell tower connectivity, and in applications to discover evasive attacks.

IntactCare

The IntactPhone assures device performance via a secure best-in-class self-troubleshooting app and remote control technology. Remote control technology ensures swift recovery from performance issues and security hazards via remote expert involvement. The on-device app provides the device holder with monitoring and repair capabilities for seamless device performance and connectivity.

Anti-malware

A fully-integrated anti-malware solution ensures that the IntactPhone devices remain safe from known cyber-attacks by providing immediate up-to-date defense and threats elimination.

BYOD Program

The IntactPhone offers BYOD programs application level mobile security. It consists of encrypted communications, command and control center, remote control technology and self-troubleshooting app. It provides enterprise class protection for BYODs against eavesdropping and most attack vectors.

Intact Phone

Technology

Holistic Device Protection

The IntactPhone is a monolithic contained device, protecting the user from known and unknown cyber-attacks. Unlike other high-security devices that quest to compromise between privacy and security, the game-changing IntactPhone is designed as a unified container to safeguard the entire mobile device regardless of the attack vector.

Multi-Tiered Security Built From the Ground Up

The IntactPhone is designed to provide unmatched protection against mobile cyber-crime. The API level integration across its components –narrows the attack surface for cybercriminals and delivers a one-of-a-kind, highly robust defense.

Best-In-Class Encryption

The IntactPhone delivers encrypted voice over IP utilizing ZRTP. ZRTP uses ephemeral Diffie-Hellman with hash commitment. The secure messaging is delivered via end-to-end encryption, including AES256 message encryption, and RSA 2048.

Complete Users Privacy

The IntactPhone device ensures that device owners have complete privacy: proprietary push notification mechanism assures that no communications data can be stored by a third party. The disk encryption key is known only to the device owner who actually sets it up, and it is not kept by any other party. The voice encryption keys are destroyed at the end of the call, which precludes retroactively compromising the call by future disclosures of key material.

A Secure Build

IntactPhone secure build provides a trusted environment by a secure boot process, integrity validation and detection, obfuscation layer across device resources, and the generation of security keys and device passwords.

Flexible Deployment Options

The IntactPhone can be delivered as a hosted-solution to reduce operating costs or as an on premise deployment to provide complete control by the customer.