News Feed Item

CommuniTake Technologies Secures Enterprise Mobility with New Ruggedized IntactPhone

Added Handset Provides Increased Durability, Security and Reliability to the Most Complete, High-Security Mobility Management Solution

SAN FRANCISCO, April 17, 2018 /PRNewswire/ -- Today, CommuniTake Technologies, the leader in high-security mobility management, announced the introduction of its new ruggedized IntactPhone R2. This handset is designed to protect security-minded organizations, operating in both harsh and corporate environments, against mobile cyber-attacks.

The landscape of mobile cyber threats continues to evolve rapidly, in magnitude and complexity. Organizations face more challenges than ever preventing cyber breaches from compromising critical operations, and maintaining trust in a mobile-first, connected world. At the same time, the diversity of nomadic workers requires IT leaders to establish a unified, enterprise mobility strategy, fit for an assortment of work conditions.

The new ruggedized IntactPhone R2 delivers a one-of-a-kind blend of military-grade, cybersecurity capabilities and rugged hardware features, safely enabling organizations to operate in mixed environments. The users of IntactPhone R2 benefit from toughened hardware and software features, including:

IP68 standard built into a stylish form: IntactPhone R2 is waterproof, shockproof, scratchproof and dustproof. Its smart-build is adapted to both military and civil specifications. 

Puncture resistant 5" FHD touchscreen: A Corning Gorilla Glass screen supports operation with gloved hand / wet finger.

Up-to-date specs: 6GB RAM, 64GB ROM, high-performance Octa-core processor, and exceptionally loud and clear audio, along with a 4200mAh battery, for users on any connected lifestyle.

Fingerprint and facial recognition: Two different biometric authentication options allow users to choose the way they want to protect their device.

Security-rich OS: A custom-built OS that powers innovative security capabilities, to ensure user privacy. The operating system functions in an execution environment that is fully trusted.

Instant secured communications: Crisp communications with built-for-security features, including locked-down private network, end-to-end voice encryption, continuously secured user-side voice communications, encrypted burst-out messages operated via a dedicated button, conference calls, self-destruct messages, and secured attachments, to support however users wish to communicate.

OS-fused command center: Central defense-grade administration delivers comprehensive defense controls that address sensitive data loss, enable monitoring for risky device behavior, allow differentiated enforcement across user groups, ensure data-at-rest is encrypted and provide additional protection against careless use and malware propagation. The central protections cannot be shut-down by users of the device.

Security apps: Multi-method approach for prevention and performance assurance, including anti-malware app, network protection app, threat detection app, security posture verification app, complete remote control app and self-troubleshooting app. These apps deliver superior visibility, control and threat prevention across devices, applications, users and networks.

Built-in privacy: End-to-end encryption is continuously active, by default. CommuniTake Technologies cannot listen to users' communications, cannot sell their private conversations and does not hold any backdoor to user data.

"CommuniTake Technologies keeps pace with the new wave of cyberattacks targeting endpoints in a unique manner; by providing the best-of-all-worlds, mobile endpoint protection platform," said Ronen Sasson, CEO of CommuniTake Technologies. "With IntactPhone R2, we are pairing a best-of-breed, mobile endpoint security solution with the durability our customers demand. It allows us to service a wider spectrum of organizations with a reliable device, superior security, unified deployment and increased ease-of-use, at a lower overall cost".

For more information about the new IntactPhone R2 mobile device, please visit www.intactphone.com

Attendees of the 2018 RSA Conference USA are invited to stop by the Israeli Pavilion, booths 635 and 735, April 17-19th, to learn how CommuniTake Technologies enables superior enterprise mobile security.

About CommuniTake Technologies

CommuniTake is a software company that builds security, productivity, and management solutions to guarantee the highest level of mobile security for individuals and organizations.

CommuniTake Intact Mobile Security is a mobile Endpoint Protection Platform that dramatically improves the security of connected devices, provides powerful in-depth protection against mobile cyber-attacks, and ensures seamless device performance and remediation.

CommuniTake specializes in remote access and support technology, mobile operating systems, purpose-built devices and security architecture, ensuring best-of-all-worlds mobile security and productivity solutions. 

Contact Info
Noam Potter
CommuniTake Technologies
+972 4 6968900
[email protected]

Cision View original content with multimedia:http://www.prnewswire.com/news-releases/communitake-technologies-secures-enterprise-mobility-with-new-ruggedized-intactphone-300631262.html

SOURCE CommuniTake Technologies Ltd

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Leading companies, from the Global Fortune 500 to the smallest companies, are adopting hybrid cloud as the path to business advantage. Hybrid cloud depends on cloud services and on-premises infrastructure working in unison. Successful implementations require new levels of data mobility, enabled by an automated and seamless flow across on-premises and cloud resources. In his general session at 21st Cloud Expo, Greg Tevis, an IBM Storage Software Technical Strategist and Customer Solution Architec...
"We work around really protecting the confidentiality of information, and by doing so we've developed implementations of encryption through a patented process that is known as superencipherment," explained Richard Blech, CEO of Secure Channels Inc., in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Major trends and emerging technologies – from virtual reality and IoT, to Big Data and algorithms – are helping organizations innovate in the digital era. However, to create real business value, IT must think beyond the ‘what’ of digital transformation to the ‘how’ to harness emerging trends, innovation and disruption. Architecture is the key that underpins and ties all these efforts together. In the digital age, it’s important to invest in architecture, extend the enterprise footprint to the cl...
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, discussed the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
"We were founded in 2003 and the way we were founded was about good backup and good disaster recovery for our clients, and for the last 20 years we've been pretty consistent with that," noted Marc Malafronte, Territory Manager at StorageCraft, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Effectively SMBs and government programs must address compounded regulatory compliance requirements. The most recent are Controlled Unclassified Information and the EU's GDPR have Board Level implications. Managing sensitive data protection will likely result in acquisition criteria, demonstration requests and new requirements. Developers, as part of the pre-planning process and the associated supply chain, could benefit from updating their code libraries and design by incorporating changes. In...
Two weeks ago (November 3-5), I attended the Cloud Expo Silicon Valley as a speaker, where I presented on the security and privacy due diligence requirements for cloud solutions. Cloud security is a topical issue for every CIO, CISO, and technology buyer. Decision-makers are always looking for insights on how to mitigate the security risks of implementing and using cloud solutions. Based on the presentation topics covered at the conference, as well as the general discussions heard between sessio...
IoT is rapidly becoming mainstream as more and more investments are made into the platforms and technology. As this movement continues to expand and gain momentum it creates a massive wall of noise that can be difficult to sift through. Unfortunately, this inevitably makes IoT less approachable for people to get started with and can hamper efforts to integrate this key technology into your own portfolio. There are so many connected products already in place today with many hundreds more on the h...
Andi Mann, Chief Technology Advocate at Splunk, is an accomplished digital business executive with extensive global expertise as a strategist, technologist, innovator, marketer, and communicator. For over 30 years across five continents, he has built success with Fortune 500 corporations, vendors, governments, and as a leading research analyst and consultant.
No hype cycles or predictions of zillions of things here. IoT is big. You get it. You know your business and have great ideas for a business transformation strategy. What comes next? Time to make it happen. In his session at @ThingsExpo, Jay Mason, Associate Partner at M&S Consulting, presented a step-by-step plan to develop your technology implementation strategy. He discussed the evaluation of communication standards and IoT messaging protocols, data analytics considerations, edge-to-cloud tec...
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...
Announcing Poland #DigitalTransformation Pavilion
Digital Transformation is much more than a buzzword. The radical shift to digital mechanisms for almost every process is evident across all industries and verticals. This is often especially true in financial services, where the legacy environment is many times unable to keep up with the rapidly shifting demands of the consumer. The constant pressure to provide complete, omnichannel delivery of customer-facing solutions to meet both regulatory and customer demands is putting enormous pressure on...
CloudEXPO | DXWorldEXPO are the world's most influential, independent events where Cloud Computing was coined and where technology buyers and vendors meet to experience and discuss the big picture of Digital Transformation and all of the strategies, tactics, and tools they need to realize their goals. Sponsors of DXWorldEXPO | CloudEXPO benefit from unmatched branding, profile building and lead generation opportunities.
DXWorldEXPO LLC announced today that All in Mobile, a mobile app development company from Poland, will exhibit at the 22nd International CloudEXPO | DXWorldEXPO. All In Mobile is a mobile app development company from Poland. Since 2014, they maintain passion for developing mobile applications for enterprises and startups worldwide.