+
  • The ultimate solution to secure mobile communications and devices


    WATCH THE VIDEO

White Papers

White Book

Audit Teams Next Generation Collaboration: Data Segregation and Forensic Chain of Custody

Throughout the corporate world, auditors, and especially internal auditors, play a key role in making sure that the whole company both respects rules and is efficient in its day to day operations. In order to perform these tasks, the auditor is required to:

• Gather and analyze evidence, produce reports
• Share these highly confidential documents with executives, other internal teams, and people external to their organization such as regulators
• Meet urgent time constraints

Having a simple and highly efficient collaboration platform that can enable audit teams to share both internally and externally is therefore key to productivity…

Read more

GDPR: Executing data privacy, confidentiality and traceability

The European Union’s General Data Protection Regulation (GDPR) which comes into force in May 2018 has been the topic of many debates over the last year (and is now a source of various concerns) as companies have quickly realized that it could have a major impact on their business processes and solutions in place, as well as a significant business risk if they are not compliant (the much-quoted 4% of worldwide turnover or 20 M€, whichever is the greatest). Had their customers been European citizens, the recent Equifax data breach would have directly impacted their P&L by tens of millions of US Dollars…

Read more

Secure your mobile devices and communications

Cryptosmart is the only solution providing governmental level security on consumer devices, facilitating its adoption by all users

Cryptosmart is deployed within governments and large enterprises to protect their sensitive data on the move, against loss, theft and spying.

Threats / Solutions

Mobile devices containing sensitive business information can be lost or stolen

Cryptosmart provides:

  • Local encryption on mobile devices
  • Lock screen, strong authentication
  • Remote data wiping

Communications can be intercepted and
monitored

Cryptosmart features:

  • End-to-end encryption of voice and SMS communications
  • Data encryption (emails, internet, intranet, etc.)
  • Smartcards for key management

Remote attacks and remote intrusions on devices

Cryptosmart offers:

  • Network Firewall
  • Port control
  • Anti-rooting and anti-trapping

Intrusion into corporate networks

Cryptosmart allows:

  • Strong authentication of mobile devices
  • Exchange integrity

Cryptosmart provides:

  • Local encryption on mobile devices
  • Lock screen, strong authentication
  • Remote data wiping

Benefits of Cryptosmart

CRYPTOSMART is the only “Restricted” French & NATO certified solution, jointly developed with Samsung, to secure end-to-end mobile communications on consumer devices.

Cryptobox

Security

Your communications and devices
are highly secured

Cryptobox

Ease of use

You access a user friendly solution

Cryptobox

Trust

You use a solution vetted and deployed
by major organizations

Cryptobox

Accessibility

You get the latest Samsung Galaxy devices

Request documentation

Do you want to know more about Cryptosmart ?

Download the booklet

Features of Cryptosmart

Strong authentication
Local encryption
End-to-end encrypted calls between mobile devices
Encrypted-to-clear calls to fixed-line telephones within the organization
Encrypted-to-clear calls to the national network
Secured SMS
Data encryption to the organization
Encrypted communications between organizations

NEWS

Blog

Article from Security Intelligence : How Encryption Makes Your Sensitive Cloud-Based Data an Asset, Not a Liability

February 28, 2017  |  By Rick Robinson from Security Intelligence Organizations are adopting encryption at a rapid and increasingly urgent pace. Why? Because encryption helps organizations support dynamic industry regulations while also protecting sensitive data that’s placed in the cloud. The trend of adopting public cloud solutions continues to grow, but protecting critical data in … Continue reading Article from Security Intelligence : How Encryption Makes Your Sensitive Cloud-Based Data an Asset, Not a Liability

Continue reading

Cryptobox: the new secure data sharing solution for professionals

Cryptobox is a new secure collaborative solution enabling employees to securely share information internally and externally. Provided by Ercom, a company specializing in secure communications for nearly 30 years, Cryptobox ensures businesses can exchange information confidentially using end to end encryption. Easy to use and easy to deploy, Cryptobox is available on all types of hosting … Continue reading Cryptobox: the new secure data sharing solution for professionals

Continue reading

Cryptobox: secure Cloud for professionals

Data management is now at the heart of corporate strategies. Even if the cloud fulfills its promises in terms of access flexibility and cost of storage, not all software solutions are suitable for professional use. Due to tighter EU data legislation and increasing exposure to data loss, Ercom is now launching Cryptobox, the first secure … Continue reading Cryptobox: secure Cloud for professionals

Continue reading