Digital Watchdog x39 Guia do Utilizador Página 57

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 79
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 56

GOLANTECH T: + 9 7 2 -3 -6969690 |F: +972-3 -6969680
Encrypted Phones
Golan encryption products consist of reliable plug-and-play components.
We make it easy for network administrators and users to achieve device
and network security in any enterprise or industrial data network.
Military grade encryption for voice, text & file transfer.
Unsecured communications can put your business and your life at risk.
Government agencies, organizations, and even private individuals have all the tools
and technology needed to intercept voice and data communications traffic.
If you are concerned about your business secrets, or the health and safety of yourself
and your loved ones, you must definitely take the steps necessary to protect your
sensitive communication.
Golan encryption is the preferred solution for thousands of users around the world.
The reason for that is:
Licensed by the Israeli Ministry of Defense, Golan encryption 3G is a world-class
software-based solution providing military-grade encryption for voice and data
communications.
Golan encryption's triple layered security scheme turns your PC/laptop, Nokia phone
or Windows mobile device into a military grade encrypted communicator, protected
against any interception attempt by private, governmental or military entities.
You can depend on Golan encryption to instantly encrypt your calls, file transfers and
text messages even when making International calls. No VOIP provider is necessary.
Protection is provided across all methods of Internet access including 3G, EDGE,
GPRS, WI-FI and more. Moreover, Golan encryption is easy to use and the keys are
auto- managed with no user intervention required.
If you're not protecting your vital communications, you're transmitting financial,
business and personal information in the clear. This opens you and your organization
up to infiltration by criminals including industrial spies, kidnappers, terror organizations
and other entities that do not have your best interests at heart.
The encryption takes place when there is a conversation between two phones (at list)
that has the program installed on.
Before the conversation there is keys and codes recognition
And then it is possible to talk in an encrypted way in 256 bit
During the call it is possible to send an encrypted SMS
Compatible networks: WIFI, 3G,GPRS,EDGE,UMTS,CDMA
Algorithms: 16 Kbit authentication, Elliptic curve 384 bits, AES 256 bits , Diffie
Hellman 4 Kbit
Bandwidth usage : standby mode 1kb per minute, secure call 250 kb per
minute
Compatible Networks: WI-FI, 3G, GSM, GPRS, EDGE, UMTS, CDMA
Encryption Algorithms: 16,384 Bit Authentication, Elliptic Curve 384 Bits (RSA 7680 Bits
Equivalent) AES 256 Bits, Diffie Hellman 4096 Bits
International Calls: Full support for international calls and worldwide roaming
Bandwidth Usage: Standby mode - 1 KB per Minute, Secure Call - 250 KB per Minute
ENCRYPTED CELL PHONES
Vista de página 56
1 2 ... 52 53 54 55 56 57 58 59 60 61 62 ... 78 79

Comentários a estes Manuais

Sem comentários