Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


08:49 PM
Dark Reading
Dark Reading
Products and Releases

Cellcrypt Launches Secure Mobile Phone Conference Calling

New service delivers encrypted calls and authenticates participants

London, UK, 27th July 2010: Cellcrypt (www.cellcrypt.com), the leading provider of secure mobile voice calling, today announced that it has launched a secure conference service that provides both device authentication and voice call encryption to participants using popular mobile phones like BlackBerry' and Nokia smartphones. Organisations depend on conference calls to run their daily operations and often discuss confidential and highly sensitive information on calls such as sales, supplier and executive management meetings, intellectual property discussions, high value business deal talks, crisis management calls or even discussions concerning disaster scenarios and national security. But traditional conference calling services are open to abuse through unauthorised access. Where access security is in place for conference calls, it is often poorly managed with dial-in details and PINs seldom changing. A commonly reported scenario is for ex-employees to continue to access regular conference calls or pass details to unauthorised personnel. Furthermore, as participants have become more dispersed, they often access conference calls using mobile phones, which are increasingly at risk of interception. The Cellcrypt Secure Conference Service both authenticates the participant’s mobile phone and encrypts conversations end-to-end between each participant and the conference bridge, to ensure important conversations, from team briefings to board calls, remain confidential. “Conference calls by their very nature typically contain some of the most sensitive and confidential information an organisation has,” said Simon Bransfield-Garth, CEO at Cellcrypt. “These calls are highly desirable to attackers, who know just how valuable the information is. As the risk of cellular interception has increased so has the vulnerability of mobile executives accessing conference calls from the mobile phones. Organisations should urgently review their communications practices and act to protect their mission-critical conference calls.” The conference calling service is easy-to-use, with participants simply selecting a bridge number from their Cellcrypt Mobile enabled Blackberry or Nokia smartphone to enter the call. Office phones can also securely participate in conference calls when connected via Cellcrypt’s Enterprise Gateway solution. Organisations can manage conference calls using a simple web console to define all users that may access the conferencing service, create bridge numbers, define policies such as user white lists and additional access PINs. Optionally, a bridge may allow access from selected public telephones using Caller ID and PINs for authentication in geographies where the threat of interception is regarded as controlled (the call segments from public telephones are not encrypted). The service builds on Cellcrypt’s existing solutions that provide encrypted voice calls on mobile phones, such as BlackBerry and Nokia smartphones, delivering government-grade security in an easy-to-use application that makes highly secure calling as easy as making a normal phone call. Utilising the IP data channel it supports all major wireless networks, Wi-Fi' and satellite. Encryption is government-grade and certified to FIPS 140-2 standard by the US National Institute of Standards and Technology. # Ends # About Cellcrypt Cellcrypt is the leading provider of technology to secure mobile voice calls on everyday smartphones. Founded in 2005, Cellcrypt’s R&D innovation resulted in Encrypted Mobile Content Protocol (EMCP), an Internet Protocol (IP) based technology that optimises delivery of encrypted data between mobile devices over wireless networks. Cellcrypt’s products are validated to the FIPS 140-2 standard approved by the US National Institute of Standards and Technology (NIST), operate over data-enabled networks including 2G (GPRS/EDGE), 3G (HSPA, CDMA/EV-DO) and Wi-Fi', and are optimised to run on Nokia' Symbian and BlackBerry' smartphones. Cellcrypt is a BlackBerry' Alliance Partner and Inmarsat Connect Partner. Today, Cellcrypt solutions are used routinely by governments, enterprises and senior-level executives worldwide. Cellcrypt is a privately-held, venture-backed company with headquarters in London, UK and offices in USA and Middle East. For more information please visit: www.cellcrypt.com Cellcrypt’s NIST FIPS 140-2 certificate can be found here: http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/1401val2010.htm#1310 For media enquiries please contact: onechocolate communications (PR Agency) Tel: +44 (0)20 7437 0227 E-Mail: [email protected]

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-11-28
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is ...
PUBLISHED: 2020-11-27
blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when there is a lack of space to write compressed data.
PUBLISHED: 2020-11-27
npm package systeminformation before version 4.30.5 is vulnerable to Prototype Pollution leading to Command Injection. The issue was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems. The issue is fixed in version 4.30.5. If you cannot upgrade, be sure to check or sani...
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to inject malicious JavaScript code resulting in a stored/blind XSS in the admin panel.
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band.