Mobile devices aren’t like the other systems on your network, so shouldn’t be treated like they are.
Smartphones, tablets, wearable computers, laptops and other mobile devices are great tools, but they’re not the same as desktops and servers. They connect to networks beyond your perimeter security, they run unknown applications, they move through your facilities with ease. And frequently, you have no idea who is using them or for what purpose.
That’s why KeyOptions’ Mobile Device Security Platforms provides full-scope detection, locationing and monitoring of mobile devices so you can confidently manage and mitigate the risks presented by rogue applications and careless or potentially malicious users.
Solution Features include:
- Full-scope detection for all mobile devices — WiFi, Cellular and Bluetooth
- High precision device locationing — accurate to within 3 meters
- Mobile device monitoring console and real-time notifications and alerts
- Integration with most major 3rd party mobile device & application management, network security and policy enforcement systems
- Specialised Phone IMIE/IMSI capture (requires special license )
We are the only organisation to offer far broader device detection — 2g/3g and 4g cellular as well as Wi-Fi and Bluetooth — but also provide device identification so security managers can quickly separate known “good” devices from unknown “rogue” devices within a monitored area.
In selected environments with specialised equipment we can “capture” a device and monitor and control its activity.
Enter a new generation of mobile security tools, the KeyOptions provides a location-based mobile security platform. Rather than replacing existing systems, these platforms fill in the gaps by adding a mobile detection and precision locationing layer to mobile management, policy enforcement and network security.
Mobile locationing security platforms have two components: hardware, in the form of a sensor network, and software that does the heavy lifting of identifying devices, mapping their location, and communicating with other security systems based on where and who those devices are assigned.
More importantly, these systems offer two key features not found in less advanced ones: 1) device locationing and tracking accurate to within 2m-3m, and 2) the ability to dynamically trigger policy changes in MDM/MAM and other mobile security systems based on the device’s entry or exit from a monitored zone.
Because location-based mobile security platforms add a “where” and “who” component to BYOD, Cybersecurity staffers not only get a complete and accurate picture of what’s going on under their roof, but also have the ability to apply the right policies in the right place at the right time. This not only offers better security in depth, but also delivers better overall satisfaction from BYOD users.
Police and Criminal Justice
Working with Law Enforcement agencies and government police forces, we provide technology to assist with a whole host of policing scenarios from the detection of missing persons through to the monitoring of a dwelling or property where the activities of those occupants require discrete and passive monitoring. With the ability to ‘rewind’ to any time within the deployed area, investigators are able to forensically examine an extensive audit trail of data.
We also provide the technology for new generation TSCM for phone identification and interception, taking Law Enforcement capabilities to a new level.
Please contact us for a confidential discussion.
KeyOptions works with a number of military agencies worldwide, solving challenging and unique challenges in high risk, high threat areas. From IED detection to mobile locationing, control and blocking services, please contact us for a confidential discussion.