Sign up for our newsletter - Navigating the horizon of business technology​
Technology / Data Centre

Cellcrypt secures mobile to office calls

Mobile voice encryption firm Cellcrypt has unveiled a new product that it claims enables executives to make secure calls to their office from mobile phones while out and about.

In addition to secure mobile to office calls, Cellcrypt Enterprise Gateway can also enable users to safely access other PBX features such as voicemail or conference calls. It’s aimed at users who regularly travel to countries where phone interception can be a problem.

The application works on BlackBerry and Nokia devices that are running the Cellcrypt Mobile software. The London-based company’s encryption technology is compliant to FIPS 140-2 security standard and works across all major wireless networks.

“As business is increasingly conducted over mobile phones and on a global scale, it is a corporate responsibility to both the individual and the organisation to protect private information,” said Simon Bransfield-Garth, CEO at Cellcrypt.

White papers from our partners

“With the threat growing at an alarming rate, organisations need to adequately protect all types of calls ranging from board of director conference calls through to itinerary discussions with personal assistants. Cellcrypt Enterprise Gateway allows important office communications to continue normally even when key executives are out of the office or travelling abroad,” Bransfield-Garth said.

Although some may think that there is little need for mobile voice encryption in the enterprise, Dr Larry Ponemon, chairman and founder of the Ponemon Institute said that it is an increasing problem.

“The issue of phone interception is often thought to be restricted to government agencies but it has recently become clear that the equipment and software required is now available to the general public,” he said. “The widespread availability of both the GSM encryption codebook and a complete base station software stack has brought mobile interception within reach of any graduate IT student with $2,000 of readily available equipment, substantially increasing the scale of the threat to the enterprise.”

 


This article is from the CBROnline archive: some formatting and images may not be present.