COM001 END TO END ENCRYPTED MOBILE DEVICE
Secures Communication and Data
The T2 is a complete turn-key mobile security solution engineered for organizations performing critical functions. It secures communication and data at rest. T2 provides peace of mind, granular control over fleets of devices, and self-hosted options.
T2 is a custom-built encrypted mobile device. As part of our complete solution, it provides six security layers.
CUSTOM OPERATING SYSTEM
Exploitable entry points such as Google services are entirely removed. Others, such as GSM and SMS services, Bluetooth, and more, can also be blocked on OS level.
During first enrolment, the device creates a unique fingerprint. When booting, the system validates the fingerprint against a server-side copy.
MULTIPLE LEVELS OF ENCRYPTION
All data stored on the device is secured and encrypted. Incoming and outgoing communication is end-to-end encrypted and transmitted over an encrypted network.
MULTIPLE WIPE OPTIONS
T2 COMMUNICATOR provides several ways to wipe all data, including in case of physical tampering attempts, lost access, or the device is continuously disconnected or turned off.
All encryption keys are generated and stored on a FIPS 140-2 certified cryptographic module. No private keys are ever shared or stored outside the device.
Updates are issued and digitally signed exclusively through the Secure Administration System (SAS). Devices apply updates only after verifying the authenticity.
PLEASE CONTACT DSE FOR FURTHER INFORMATION. NOT FOR PRIVATE SALE. GOVERNMENT AND CORPORATE CLIENTS ONLY.
- Security Forces / PPE Equipment