IntactPhone is the world’s most secure mobile phone for organizations. This high-end smartphone is built from the ground up to provide you with the ultimate defense against mobile cyber-crime. IntactPhone runs a purpose-built security-rich operating system, fused command-and-control application, military-grade encrypted communications, and multiple security and performance assurance utilities. These components form the Intact Mobile Security platform. It protects you from eavesdropping, malware, data breaches and any attempts to hack or tamper with your mobile communications and data. It enables you to establish and enforce a best-of-all-worlds mobile device security and compliance framework to match your specific enterprise mobile security requirements.
PROTECTION & POISE
INTACTPHONE
The best-secured mobile phone
now available to everyone
MAKE MOBILE SECURITY RIGHT
-
Holistic, best of-all-worlds mobile security platform
-
Minimized cyber-attack surface to the extreme
-
Hardware of trust, secure boot-loader, and official drivers
-
Highly certified architecture with no / hybrid Google services
-
Fused central intelligent and advanced defense controls across devices
FOR EVERY NEED & BUDGET
IntactPhone Opaque
IntactPhone Arcane
SECURITY-FIRST EVERYTHING
BUILT FOR SUPERIOR MOBILE SECURITY
TRUSTED HARDWARE
CommuniTake is manufacturing the IntactPhone device and thus owns the entire device code, including drivers and bootloader. CommuniTake secure boot is aimed at preventing the substitution of altered boot code, interruption to the boot process and substitution of false commands or security backdoors into the device setup. CommuniTake grants complete auditing access to the IntactPhone source code, including its drivers and bootloader.
INTACTOS – SECURITY-RICH OS
The IntactPhone runs on IntactOS, a custom-built security-rich operating system, enhanced to address mobile security concerns facing enterprises today. The Android-like IntactOS is built from the source code to provide in-depth protection against cyber-attacks by blocking the security breaches found in commercial Android operating systems. IntactOS is free of bloatware, hooks to carriers, and leaky data.
INTACTDIALOG - ENCRYPTED COMMUNICATIONS
The IntactPhone provides security and privacy by encrypting voice over IP calls through ZRTP. Communications can run on any network, including 2G GSM, 3G UMTS-CDMA and LTE. In addition, it delivers end-to-end messaging encryption, based on AES256 message encryption with 256-bit key length, and RSA 2048.
OS-FUSED CONTROLS & INTELLIGENCE
INTACTCC: COMMAND & CONTROL
Fused defense and control application ensures safe use of corporate devices via configurable security profiles. Group-based policies and restrictions define solid use of device features, applications, web browsing, and access to network, data and device resources, followed by easy recovery from lost and stolen device scenarios.
THREAT DETECTION
IntactPhone detects behavior-based anomaly across Wi-Fi connectivity, cell tower connectivity, and applications to discover evasive attacks.
ANTIMALWARE
A fully-integrated anti-malware solution ensures that IntactPhone devices remain safe from known cyber-attacks by providing immediate up-to-date defense and threats elimination.
URL CLASSIFICATION
IntactPhone protects against known malicious URLs to help you identify malware, spam and phishing sites. It detects malicious URLs and Websites / IP addresses having poor reputation. This operation enables you to prevent communication with compromised domains, to block spam and malware, and prevent potential data loss and data theft.
APPS PERMISSIONS ENFORCEMENT
IntactPhone enables granular apps permissions management. Central policies provide the ability to block or spoof data access requests by applications during installation and ongoing operation.
ENCRYPTED DATA-AT-REST
IntactPhone robust disk encryption ensures that the access to on-device data is only permitted to users who enter a dedicated password/PIN. The Encryption key is known only to the device owner.
EMPOWERING REMEDIATION
MEETING THE CHALLENGES OF YOUR INDUSTRY
IntactPhone offers application level BYOD programs. It consists of encrypted communications, command and control center, remote control technology and self-troubleshooting app. The program provides enterprise class protection for BYODs against eavesdropping and most attack vectors.
BYOD PROGRAMS
IntactPhone offers application level BYOD programs. It consists of encrypted communications, command and control center, remote control technology and self-troubleshooting app. The program provides enterprise class protection for BYODs against eavesdropping and most attack vectors.
LOCKED-DOWN NETWORK
Intact Mobile Security provides mobile communications archiving for both voice calls and messages. Recorded communications are fully encrypted and protected against potential interference from outside parties which might steal valuable information. Decryption keys are only obtained by your organization.
RECORDED DIALOGS
INTACTPHONE ARCANE
Octa-core 2.0 GHz CPU
5.7" HD, 720*1440px, 18:9
3GB RAM
32GB ROM
2950mAh battery
Wi-Fi, BT, USB, SDcard, GPS
Compass+G, Light, Proximity, Fingerprint
Dual SIM
Europe / USA / LATAM / Asia
INTACTPHONE OPAQUE
Octa-core 2.2GHz CPU
6.36", FHD+ 1080 * 2300, 19:9
8GB RAM
128GB ROM
4980mAh battery
Wi-Fi, BT 5.2, USB, SDcard, GPS, NFC
Fingerprint + Compass + Proximity
IP68/IP69K dust/water resistant
5G, Global coverage