March 12, 2013
Bethesda, MD -- February 25, 2013 -- KoolSpan Inc., developer of the TrustChip® family of plug-in mobile security solutions, today announced availability of TrustChip for iPhone. This product offers the first ever hardware-based encryption for voice on iPhone.
KoolSpan's TrustChip is a fully hardened, self-contained security engine. The TrustChip fits into a slim, custom-designed TrustSleeve for the iPhone 4 and 4S. The TrustSleeve acts as an adaptor between the TrustChip and iPhone. It contains a separate 1200 mAh battery pack. This provides users with extended battery life of up to 12 hours of talk or 13.5 hours of Internet use.
With the TrustSleeve attached, users can place mutually authenticated and fully encrypted phone calls with KoolSpan's TrustCall application. TrustCall is a discreet, affordable, easy-to-install secure voice application based on commercial, off-the-shelf (COTS) technology.
"With no other hardware-based voice encryption for iPhone on the market, TrustChip and TrustCall provide a critical security solution," said Bill Supernor, Chief Technology Officer of KoolSpan. "A recent National Institute of Standards and Technology (NIST) report stated federal users should implement hardware-based encryption because it's more secure. iPhone users can now access and discuss sensitive information in a mobile environment without compromising security."
The TrustChip is deployed in its own optimized hardware environment and remains insulated from threats that can reside in mobile devices and other platforms. This self-contained structure ensures that the phone is protected against attacks made on the host device, as well as across network connections. The TrustChip provides on-chip key management, authentication, and encryption key generation to provide a hardware-anchor to TrustChip-aware applications.
The TrustChip can be removed from one device and placed in another – transferring mobile security from phone to phone. Alternatively, TrustChip can be bound to a single device, rendering it unusable on any other.
Once in place, the TrustCall application runs without user interaction. It automatically accesses the TrustChip's security services and provides a security status when calling another secure smartphone. The application remains idle when calls are placed to non-secure phones.
TrustCall features its own cross platform IP push-based call notification system for secure calls. For iOS, Android, and Blackberry, the IP push system uses each platform's own methods through a central push server to support cross-platform calls.
KoolSpan's secure voice solution for iPhone is vendor and carrier neutral so it can be deployed internationally across all networks.
KoolSpan is currently developing an iPhone 5 solution that will be available spring of 2013.
For more information about TrustChip and TrustCall for iPhone, please visit http://www.koolspan.com/iphonesecurity.
KoolSpan is the leading global provider of encrypted solutions for connected devices. The foundation for all KoolSpan solutions is the TrustChip®, a microSD‐based hardware token for mobile devices, laptops, tablets, and servers. Supported by a strong patent portfolio, KoolSpan offers a robust API for application developers and system integrators, as well as encrypted voice and text applications for wireless carriers, enterprise, and government deployments. The FIPS 140‐2 validated solution has been tested and deployed in 50 countries worldwide. For more information, visit www.koolspan.com.
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
How to Deploy Zero Trust for Remote Workforce Security
What Ransomware Groups Look for in Enterprise Victims
How to Use Threat Intelligence to Mitigate Third-Party Risk
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks