INTACTPHONE
search
  • INTACTPHONE

Intactphone

Intactphone - The Ultimate Mobile Security
- Built from the ground up to provide the ultimate defense against mobile cybercrime,
- Supports a purpose-built operating system, integrated command and control application, military-grade encrypted communications, and a host of security and performance tools,
- Intact Mobile Security platform protects against eavesdropping, malware, data breaches, and any hacking or manipulation attempts,

Quantity

Intactphone - The Ultimate Mobile Security

- Built from the ground up to provide the ultimate defense against mobile cybercrime,
- Supports a purpose-built operating system, integrated command and control application, military-grade encrypted communications, and a host of security and performance tools,
- Intact Mobile Security platform protects against eavesdropping, malware, data breaches, and any hacking or manipulation attempts,

Mobile Security
- Ultimate Mobile Security Platform
- Minimized Cyber ​​Attack Surface
- Trusted Hardware, Secure Bootloader, and Official Drivers
- Certified Architecture Without Google or Hybrid Services
- Connected Central Intelligent and Advanced Defense Controls Across All Devices

CommuniTake manufactures the IntactPhone device and therefore owns all device code, including drivers and bootloader.

CommuniTake Secure Boot is designed to prevent tampered boot code, interrupted boot process, and the substitution of rogue commands or security backdoors in device configuration. CommuniTake provides full audit access to the IntactPhone source code, including its drivers and bootloader.

IntactPhone runs on IntactOS, a custom-built operating system.
The IntactOS operating system, similar to Android, is built on top of the source code and provides comprehensive protection against cyberattacks by blocking security holes found in commercial Android operating systems. IntactOS is free from bloatware, carrier tie-ins, and data leaks.

IntactPhone provides security and privacy by encrypting voice over IP calls via ZRTP. Communication can occur over any network, including 2G GSM, 3G UMTS-CDMA, and LTE. It also provides end-to-end message encryption, based on AES256 256-bit message encryption and RSA 2048.

Fused defense and control application ensures secure use of corporate devices via configurable security profiles.
Group-based policies and restrictions define robust usage of device features, applications, web browsing, and access to network resources, data, and devices, then easily recover data from lost and stolen device scenarios.

Threat Detection
IntactPhone detects behavior-based anomalies in Wi-Fi connectivity, cell tower connectivity, and applications to detect evasive attacks.

Antimalware
A fully integrated antimalware solution ensures IntactPhone devices remain safe from known cyberattacks, providing immediate up-to-date defense and threat elimination.

URL Classification
IntactPhone protects against known malicious URLs to help you identify malware, spam, and phishing sites. Detects malicious URLs and sites/IP addresses with poor reputations. This action allows you to prevent communication with compromised domains, block spam and malware, and prevent potential data loss and theft.

Application Permission Enforcement
IntactPhone enables granular application permission management. Centralized policies allow you to block or spoof data access requests by applications during installation and ongoing operation.

Encrypted Data at Rest
IntactPhone’s robust disk encryption ensures that access to data on a device is only permitted to users who enter a dedicated password/PIN. The encryption key is known only to the device owner.


INTACTPHONE ARCANE 

Octa-core 2.0 GHz CPU
5.7" HD, 720*1440px, 18:9
3GB RAM
32GB ROM
2950mAh battery 
Wi-Fi, BT, USB, SDcard, GPS
Compass+G, Light, Proximity, Fingerprint 
Dual SIM
Europe / USA / LATAM / Asia

INTACTPHONE OPAQUE  

Octa-core 2.2GHz CPU
6.36", FHD+ 1080 * 2300, 19:9
8GB RAM
128GB ROM
4980mAh battery 
Wi-Fi, BT 5.2, USB, SDcard, GPS, NFC
Fingerprint + Compass + Proximity 
IP68/IP69K dust/water resistant
5G, Global coverage

 

cyber telefon, cyber smartfon, bezpieczny telefon, wielowarstwowe zabezpieczenia, rządowe wymagania bezpieczeństwa, certyfikacja poziomu poufne, zdalne czyszczenie urządzenia, zaostrzona polityka haseł, szyfrowane połączenia głosowe, szyfrowane połączenia wideo, smartfon dla wojska, smartfon dla organizacji rządowych, smartfon dla dziennikarzy, smartfon dla aktywistów, smartfon dla biznesu, smartfon z technologią wojskową, szyfrowanie danych, egzekwowanie uprawnień aplikacji, klasyfikacja adresów URL, antimalware, wykrywanie zagrożeń, cyber phone, cyber smartphone, secure phone, multi-layered security, government security requirements, confidential level certification, remote device wipe, strict password policy, encrypted voice calls, encrypted video calls, smartphone for military, smartphone for government organizations, smartphone for journalists, smartphone for activists, smartphone for business, smartphone with military technology, data encryption, application permission enforcement, URL classification, antimalware, threat detection, 
Cyber-Telefon, Cyber-Smartphone, sicheres Telefon, mehrschichtige Sicherheit, Sicherheitsanforderungen der Regierung, Zertifizierung der Vertraulichkeitsstufe, Remote-Löschung von Geräten, strenge Kennwortrichtlinie, verschlüsselte Sprachanrufe, verschlüsselte Videoanrufe, Smartphone für das Militär, Smartphone für Regierungsorganisationen, Smartphone für Journalisten, Smartphone für Aktivisten, Smartphone für Unternehmen, Smartphone mit Militärtechnologie, Datenverschlüsselung, Durchsetzung von Anwendungsberechtigungen, URL-Klassifizierung, Anti-Malware, Bedrohungserkennung,

Arcane/Opaque
Comments (0)
No customer reviews for the moment.