top of page
Secure End-to-End Encription
ENCRYPTION FOR VOICE AND WI-FI CONNECTIVITY
Gryphon Shield constructs a secure tunnel to protect all data communications from any end point.
CUSTOMER CONTROLLED AND VERIFIABLE SECURITY
Gryphon Assure network architecture delivers end-to-end encryption for all data transmission over a private network and server infrastructure is located on customer premises.
Wi-Fi ACCESS POINT
Designed for laptops, smartphones, and other IoT devices
SECURE VOICE CALLS
Between office locations and
people on the move
To get a secure and fast
Our communications suite secures your mobile communications by extending your corporate network to you, at home, the airport, or a hotel. Through a complete end-to-end solution that combines secure hardware, state-of-the art encryption, and hardened software, Protactics protects your Voice, Messaging, and File Sharing, and provides protection for your mobile devices.
SECURE HARDWARE & CUSTOM MANUFACTURED
Hardened Android operating system, secure HW features together with Full-HD display, in a rugged & sleek design. Tamperproof, waterproof & shockproof.
ADVANCED CRYPTOGRAPHY WITH HW ACCELERATED DUAL ENCRYPTION.
Enables ultra-secure communication capability. Gryphon crypto is agile & customizable to provide seamless integration into clients’ custom or local ciphers.
Secure Chat • Recall Message/Self- Destructing Messages • Audio Message • Picture/ Video Sharing • Files/Document Sharing • Secure Call • Secure Conference Call • Secure Group Chat • Secure Broadcast
Dual ARM Cortex A9 MPCore with TrustZone
4GB Mass Storage
Hardware Secure Module, 8G memory
Dual-Band Wi-Fi 802.11a/b/g/n
Bluetooth 4.1 and Bluetooth LE
Local Ethernet Port (100Base-T, RJ-45)
Wide Area Network Port (1000Base-T, RJ-45)
USB 2.0 for Service and Maintenance
12V input power supply, DC-Connector
Size 100 mm x 100 mm x 26 mm
Weight 218 g
bottom of page