Our client’s brief was to provide a secure voice and text messaging platform with a private, on-premises cloud infrastructure that could be deployed across 2.5G cellular networks. Tunneling was also required to offer full protection against phone spoofing while the relevant individuals were abroad.
The project was delivered 3 months after the contract was signed. The solution covered all aspects of communication with cellphone carriers, as well as our proprietary floating VPN tunnels and service.
The solution involved the use of secure Samsung cell phones with modified hardware and a secure operation and hardware platform. Our solution was tested by an NIST-accredited laboratory and complies with FIPS 140-2.
The system has end-to-end encryption, meaning no center point holds any key, thus ensuring communication is always encrypted. The key is rolling, forcing potential attackers to re-crack it multiple times per second, thus rendering spoofing almost impossible.
The solution incorporates a number of unique features, including a remote self-destruct option. This allows the user to remotely destroy their phone’s memory chips, preventing anyone from analyzing the phone in case of theft or espionage.
BSWi successfully reactivated and recommissioned a central satellite communications hub for a government agency ...
To meet the client’s requirements, BSWi created a tailored solution based on multiple factors including ...
The Rural Development Project was an incredibly ambitious initiative that combined multiple infrastructure ...
The project began with complete, wall-to-wall refurbishment of the building, and included the provision of all ...
BSWi was challenged by a small island nation to generate a solution to its increasing electrical energy ...
BSWi successfully delivered and integrated a comprehensive defense system designed to protect the client’s ...
The masterplan examined the country’s generation and distribution of electrical power to accurately assess ...
Our solution offered optimal value by providing full monitoring and operational capabilities, and covering ...
We use cookies to personalize content and to analyze our traffic. Your consent to our cookies if you continue to use this website.