Welcome!

News Feed Item

GO-Trust SDencrypter MicroSD and Sycret Voice App Puts Mobile Calls, Texts and Emails on Lockdown

MWC2014 and RSA2014 -Today GOTrust Technology Inc. (GO-Trust®) announced that National Institute of Standards Technology (NIST) has awarded the company Federal Information Processing Standards (FIPS) 140-2 level 3 certification for their SDencrypter microSD working on Android and many other Operating Systems including Windows and Linux. FIPS 140-certified products are mandatory for US military and US Civil government users protecting sensitive data by encryption. This level of encryption is now available to protect files, voice calls and text messages for most Android users – from government to corporate environments.

“GO-Trust is the only company providing FIPS 140 certified peer to peer communication on smartphones, tablets and other SD card enabled devices,” said Darren Lee, CEO of Go-Trust. “This means companies can have complete control over the mobile environment of their employees with the confidence of military-level security, even with BYOD users.”

Sycret Voice App coupled with the SDencrypter provides military-level security for small groups of individuals and major corporations alike. By inserting the GO-Trust SDencrypter in the microSD slot of a smartphone and downloading the Sycret Voice App from the Google Play store, a user can set up an encryption tunnel that scrambles voice, text and emails with any other Android user who has the same SDencrypter /Sycret Voice configuration. Alternatively, Voice can be tailored to meet the needs of each unique corporate environment.

All encryption operations are computed inside the FIPS-certified SDencrypter microSD with a proprietary chip. A random, unique (for each conversation) encryption key is generated and all the encryption/decryption processing (AES 256) takes place in the SDencrypter chip. Nothing in the encryption cycle is computed in the open on the phone, thereby creating a peer to peer encryption chain. There are no secret keys generated, exchanged or stored on a central server; so there is no information that can be hacked or subpoenaed. Even if the encrypted message was recorded as it was being transmitted and afterwards both phones were stolen or confiscated it would be impossible to reconstruct the conversation (backward security).

Encrypted mobile phones have historically either been purpose-built and expensive or software only solutions with significant security limitations. Sycret Voice is unique; when combined with the SDencrypter it is a robust hardware-based solution that can be retrofitted to most of the popular Android smartphones, including Samsung Galaxy and Note series, HTC , LG and Motorola phones, while still using the existing telecom operator service. If the phone is updated or the operator service changed the SDencrypter can easily be moved to the new phone and the latest Sycret Voice APP downloaded from the Google Play store.

The encrypted conversations use the phone’s data connection service instead of the voice call service. So there are no conventional phone numbers that can be recorded to log the origin, destination or duration of the call. The cost of an encrypted call to anywhere in the world is included in the user’s data plan. Unlimited data means unlimited encrypted calls worldwide.

Sycret Voice and SDencrypter have been adopted by many government and enterprise projects. GO-Trust is now actively looking for distribution partners in the US and Canada.

NIST FIPS 140-2 LEVEL 3

FIPS are U.S. government standards for information technology and computer security. The FIPS program is run by the National Institute of Standards of the USA (NIST) under the US Department of Commerce. NIST FIPS 140 is the cryptography standard program required by the US federal government for protection of sensitive data. The current FIPS version is 140-2.

Obtaining FIPS 140 validation requires a rigorous testing process by an accredited laboratory to ensure the security integrity of the unit requesting certification. The results are then reviewed by the National Institute of Standards and Technology (NIST), which issues a FIPS 140 validation certificate. GO-Trust FIPS validation number is 2084 and can be viewed here on the NIST website: http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/1401val2014.htm.

About GO-Trust

GOTrust Technology Inc. (GO-Trust®) is the innovator of the secure microSDs and the first company to deliver mobile credit card, mobile banking authentication, voice & text encryption and FIDO login using the microSD form factor. GO-Trust® continues its world-leading secure microSD innovation with the most powerful, fastest and smartest microSD embedded chips and the most sophisticated supporting applications. The company’s latest products include the SYCRET VOICE, using military strength hardware encryption for voice, SMS, cloud storage and file sharing. GO-Trust® has fourteen international patents for secure microSD products and serves as an active member of the FIDO (Fast IDentity Online) Alliance. Visit GO-Trust at www.go-trust.com.

Note to Editors:

GO-Trust executives are at RSA in San Francisco at the FIDO Alliance Showcase, to set up a meeting or demo contact Kim Stowe at 408.839.8750. Sycret Voice and SDencrypter brochures are available on line at www.go-trust.com.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
SYS-CON Events announced today that iDevices®, the preeminent brand in the connected home industry, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. iDevices, the preeminent brand in the connected home industry, has a growing line of HomeKit-enabled products available at the largest retailers worldwide. Through the “Designed with iDevices” co-development program and its custom-built IoT Cloud Infrastruc...
Companies can harness IoT and predictive analytics to sustain business continuity; predict and manage site performance during emergencies; minimize expensive reactive maintenance; and forecast equipment and maintenance budgets and expenditures. Providing cost-effective, uninterrupted service is challenging, particularly for organizations with geographically dispersed operations.
There will be new vendors providing applications, middleware, and connected devices to support the thriving IoT ecosystem. This essentially means that electronic device manufacturers will also be in the software business. Many will be new to building embedded software or robust software. This creates an increased importance on software quality, particularly within the Industrial Internet of Things where business-critical applications are becoming dependent on products controlled by software. Qua...
The cloud competition for database hosts is fierce. How do you evaluate a cloud provider for your database platform? In his session at 18th Cloud Expo, Chris Presley, a Solutions Architect at Pythian, will give users a checklist of considerations when choosing a provider. Chris Presley is a Solutions Architect at Pythian. He loves order – making him a premier Microsoft SQL Server expert. Not only has he programmed and administered SQL Server, but he has also shared his expertise and passion w...
Join us at Cloud Expo | @ThingsExpo 2016 – June 7-9 at the Javits Center in New York City and November 1-3 at the Santa Clara Convention Center in Santa Clara, CA – and deliver your unique message in a way that is striking and unforgettable by taking advantage of SYS-CON's unmatched high-impact, result-driven event / media packages.
As enterprises work to take advantage of Big Data technologies, they frequently become distracted by product-level decisions. In most new Big Data builds this approach is completely counter-productive: it presupposes tools that may not be a fit for development teams, forces IT to take on the burden of evaluating and maintaining unfamiliar technology, and represents a major up-front expense. In his session at @BigDataExpo at @ThingsExpo, Andrew Warfield, CTO and Co-Founder of Coho Data, will dis...
SYS-CON Events announced today that (ISC)²® (“ISC-squared”) will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Two leading non-profits focused on cloud and information security, (ISC)² and Cloud Security Alliance (CSA), developed the Certified Cloud Security Professional (CCSP) certification to address the increased demand for cloud security expertise due to rapid growth in cloud. Recently named “The Next...
The Art of DevOps provides a fun overview to help teams understand DevOps. Written in the style of the famous 6th century Chinese manuscript “The Art of War,” this eBook describes DevOps in the form of a mission to continuously deliver assets to the operational battlegrounds safely, securely, and quickly. It’s a fun read with valuable insights.
Advances in technology and ubiquitous connectivity have made the utilization of a dispersed workforce more common. Whether that remote team is located across the street or country, management styles/ approaches will have to be adjusted to accommodate this new dynamic. In his session at 17th Cloud Expo, Sagi Brody, Chief Technology Officer at Webair Internet Development Inc., focused on the challenges of managing remote teams, providing real-world examples that demonstrate what works and what do...
As someone who has been dedicated to automation and Application Release Automation (ARA) technology for almost six years now, one of the most common questions I get asked regards Platform-as-a-Service (PaaS). Specifically, people want to know whether release automation is still needed when a PaaS is in place, and why. Isn't that what a PaaS provides? A solution to the deployment and runtime challenges of an application? Why would anyone using a PaaS then need an automation engine with workflow ...
Recognizing the need to identify and validate information security professionals’ competency in securing cloud services, the two leading membership organizations focused on cloud and information security, the Cloud Security Alliance (CSA) and (ISC)^2, joined together to develop an international cloud security credential that reflects the most current and comprehensive best practices for securing and optimizing cloud computing environments.
DevOps is not just last year’s buzzword. Companies with DevOps practices are 2.5x more likely to exceed profitability, market share, and productivity goals. But how do you enable high performance? What can you do right now to start? Find out from DevOps experts including Gene Kim, co-author of "The Phoenix Project," and the Dynatrace Center of Excellence.
Predictive analytics tools monitor, report, and troubleshoot in order to make proactive decisions about the health, performance, and utilization of storage. Most enterprises combine cloud and on-premise storage, resulting in blended environments of physical, virtual, cloud, and other platforms, which justifies more sophisticated storage analytics. In his session at 18th Cloud Expo, Peter McCallum, Vice President of Datacenter Solutions at FalconStor, will discuss using predictive analytics to ...
Silver Spring Networks, Inc. (NYSE: SSNI) extended its Internet of Things technology platform with performance enhancements to Gen5 – its fifth generation critical infrastructure networking platform. Already delivering nearly 23 million devices on five continents as one of the leading networking providers in the market, Silver Spring announced it is doubling the maximum speed of its Gen5 network to up to 2.4 Mbps, increasing computational performance by 10x, supporting simultaneous mesh communic...
Eighty percent of a data scientist’s time is spent gathering and cleaning up data, and 80% of all data is unstructured and almost never analyzed. Cognitive computing, in combination with Big Data, is changing the equation by creating data reservoirs and using natural language processing to enable analysis of unstructured data sources. This is impacting every aspect of the analytics profession from how data is mined (and by whom) to how it is delivered. This is not some futuristic vision: it's ha...