Shield

Secure End-to-End Encription

FEATURES

ENCRYPTION FOR VOICE AND WI-FI CONNECTIVITY

Gryphon Shield constructs a secure tunnel to protect all data communications from any end point.

CUSTOMER CONTROLLED AND VERIFIABLE SECURITY

Gryphon Assure network architecture delivers end-to-end encryption for all data transmission over a private network and server infrastructure is located on customer premises.

  • Allows users that are in an unsafe network to join a safe and secure environment

  • Secure calls using VoIP desk or conference phones inside the closed Assure Communications network. 

  • Platform for custom use cases where secure communications is required

Wi-Fi ACCESS POINT

Designed for laptops, smartphones, and other IoT devices

SECURE VOICE CALLS

Between office locations and

people on the move

EASY

To get a secure and fast

connection

Our communications suite secures your mobile communications by extending your corporate network to you, at home, the airport, or a hotel. Through a complete end-to-end solution that combines secure hardware, state-of-the art encryption, and hardened software, Protactics protects your Voice, Messaging, and File Sharing, and provides protection for your mobile devices.

Veil Smartphone

SECURE HARDWARE & CUSTOM MANUFACTURED

Hardened Android operating system, secure HW features together with Full-HD display, in a rugged & sleek design. Tamperproof, waterproof & shockproof.

ADVANCED CRYPTOGRAPHY WITH HW ACCELERATED DUAL ENCRYPTION.

Enables ultra-secure communication capability. Gryphon crypto is agile & customizable to provide seamless integration into clients’ custom or local ciphers.

  • Military Grade Hardware with Hardened Operating System manufactured in Europe

  • End-to-end & real-time encryption of all voice, chat, data file attachments.

  • Active Tamper Detection, Trusted Platform module (TPM) & a controled ecosystem

Assure App

APPLICATION FEATURES

Secure Chat • Recall Message/Self- Destructing Messages • Audio Message • Picture/ Video Sharing • Files/Document Sharing • Secure Call  • Secure Conference Call • Secure Group Chat • Secure Broadcast

SPECIFICATIONS

HARDWARE

Dual ARM Cortex A9 MPCore with TrustZone
512MB RAM
4GB Mass Storage
Hardware Secure Module, 8G memory

CONNECTIVITY

Dual-Band Wi-Fi 802.11a/b/g/n
Bluetooth 4.1 and Bluetooth LE 

INTERFACES

Local Ethernet Port (100Base-T, RJ-45)
Wide Area Network Port (1000Base-T, RJ-45)
USB 2.0 for Service and Maintenance
12V input power supply, DC-Connector 

MECHANICS

Size 100 mm x 100 mm x 26 mm 

Weight 218 g 

Making unreachable destinations, reachable.

  • LinkedIn

2019© Protactics.com - All rights reserved.