View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Data Centre
April 27, 2010

Cellcrypt secures mobile to office calls

Encryption tech can protect sensitive data

By Steve Evans

Mobile voice encryption firm Cellcrypt has unveiled a new product that it claims enables executives to make secure calls to their office from mobile phones while out and about.

In addition to secure mobile to office calls, Cellcrypt Enterprise Gateway can also enable users to safely access other PBX features such as voicemail or conference calls. It’s aimed at users who regularly travel to countries where phone interception can be a problem.

The application works on BlackBerry and Nokia devices that are running the Cellcrypt Mobile software. The London-based company’s encryption technology is compliant to FIPS 140-2 security standard and works across all major wireless networks.

“As business is increasingly conducted over mobile phones and on a global scale, it is a corporate responsibility to both the individual and the organisation to protect private information,” said Simon Bransfield-Garth, CEO at Cellcrypt.

“With the threat growing at an alarming rate, organisations need to adequately protect all types of calls ranging from board of director conference calls through to itinerary discussions with personal assistants. Cellcrypt Enterprise Gateway allows important office communications to continue normally even when key executives are out of the office or travelling abroad,” Bransfield-Garth said.

Although some may think that there is little need for mobile voice encryption in the enterprise, Dr Larry Ponemon, chairman and founder of the Ponemon Institute said that it is an increasing problem.

“The issue of phone interception is often thought to be restricted to government agencies but it has recently become clear that the equipment and software required is now available to the general public,” he said. “The widespread availability of both the GSM encryption codebook and a complete base station software stack has brought mobile interception within reach of any graduate IT student with $2,000 of readily available equipment, substantially increasing the scale of the threat to the enterprise.”

Content from our partners
How businesses can safeguard themselves on the cyber frontline
How hackers’ tactics are evolving in an increasingly complex landscape
Green for go: Transforming trade in the UK

 

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU