Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

6/21/2010
03:15 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Cellcrypt Smart Phone Encryption Solution Gets AT&T Certification For BlackBerry

Cellcrypt provides encrypted voice calls on mobile phones

London, UK, 21st June 2010: Cellcrypt (www.cellcrypt.com), the leading provider of secure mobile voice calling, today announced that AT&T has approved Cellcrypt Mobile for BlackBerry under the AT&T Solution Certification Program.

AT&T certification validates that Cellcrypt Mobile is fully supported on the AT&T network on BlackBerry' smartphones. This certification ensures customers can enjoy the best possible experience when using Cellcrypt Mobile across AT&T's wireless network on the following devices: Blackberry' Bold 9000/9700, Blackberry' Curve 8300/8520/8900, Blackberry' Pearl 81xx series and Blackberry' 87xx/88xx series.

This certificate provides additional assurance that Cellcrypt’s secure mobile phone voice calling is of the highest performance standard, and follows on from two other recent achievements in which Cellcrypt’s cryptographic module (Ccore) was validated to Federal Information Processing Standard 140-2 by National Institute of Standards and Technology, and Cellcrypt Mobile was nominated as a Finalist in the category of “Best Encryption Product’ in the SC Magazine Awards competition.

“We are delighted to achieve AT&T solution certification, which gives further assurance to governments and enterprises seeking to protect confidential conversations that key executives and employees make on their mobile phones,” said Kathleen Peters, General Manager (US) at Cellcrypt, “We are honoured that Cellcrypt has been selected in this way for use on the largest GSM network in the United States, offering customers the benefit of an additional layer of voice call security for those all important confidential calls.”

Cellcrypt provides encrypted voice calls on mobile phones such as BlackBerry' and Nokia smartphones delivering government-grade security in an easy-to-use application that makes highly secure calling as easy as a normal phone call. Utilising the IP data channel it supports all major wireless networks including 2G (GPRS/ EDGE), 3G (HSPA, CDMA/EV-DO), Wi-Fi' and satellite. It also enables secure mobile phone calls to office phone systems to call landlines as well as access PBX features such as voicemail, conference calling and calling out to the public phone network. Cellcrypt’s products are validated to the FIPS 140-2 standard approved by the US National Institute of Standards and Technology (NIST).

# Ends #

About Cellcrypt

Cellcrypt is the leading provider of technology to secure mobile voice calls on everyday smartphones. Founded in 2005, Cellcrypt’s R&D innovation resulted in Encrypted Mobile Content Protocol (EMCP), an Internet Protocol (IP) based technology that optimises delivery of encrypted data between mobile devices over wireless networks.

Cellcrypt’s products are validated to the FIPS 140-2 standard approved by the US National Institute of Standards and Technology (NIST), operate over data-enabled networks including 2G (GPRS/EDGE), 3G (HSPA, CDMA/EV-DO) and Wi-Fi', and are optimised to run on Nokia' Symbian and BlackBerry' smartphones. Cellcrypt is a BlackBerry' Alliance Partner and Inmarsat Connect Partner.

Today, Cellcrypt solutions are used routinely by governments, enterprises and senior-level executives worldwide. Cellcrypt is a privately held, venture-backed company with headquarters in London, UK and offices in USA and Middle East.

For more information please visit: www.cellcrypt.com

For media enquiries please contact:

Billy Burnett/ Oliver Levene

onechocolate communications

Tel: +44 207 437 0227

E-Mail: [email protected]

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
US Capitol Attack a Wake-up Call for the Integration of Physical & IT Security
Seth Rosenblatt, Contributing Writer,  1/11/2021
More SolarWinds Attack Details Emerge
Kelly Jackson Higgins, Executive Editor at Dark Reading,  1/12/2021
Vulnerability Management Has a Data Problem
Tal Morgenstern, Co-Founder & Chief Product Officer, Vulcan Cyber,  1/14/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7343
PUBLISHED: 2021-01-18
Missing Authorization vulnerability in McAfee Agent (MA) for Windows prior to 5.7.1 allows local users to block McAfee product updates by manipulating a directory used by MA for temporary files. The product would continue to function with out-of-date detection files.
CVE-2020-28476
PUBLISHED: 2021-01-18
All versions of package tornado are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configura...
CVE-2020-28473
PUBLISHED: 2021-01-18
The package bottle from 0 and before 0.12.19 are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with defa...
CVE-2021-25173
PUBLISHED: 2021-01-18
An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory allocation with excessive size vulnerability exists when reading malformed DGN files, which allows attackers to cause a crash, potentially enabling denial of service (crash, exit, or restart).
CVE-2021-25174
PUBLISHED: 2021-01-18
An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory corruption vulnerability exists when reading malformed DGN files. It can allow attackers to cause a crash, potentially enabling denial of service (Crash, Exit, or Restart).