At each boot, KATIM™ Phone checks the entire software stack via its bootloader to detect modifications. If this validation fails, boot up is aborted. KATIM™ Phone continues to monitor the integrity of its environment. If an attacker finds a way to infect the phone, the integrity monitor detects it, resets and deactivates the phone.
Device Access Management
Increased security through a mechanism that double checks that your identity is legitimate. KATIM™ Phone can be set to wipe all data in case someone tries to authenticate with wrong credentials.
Encrypted data & secure storage for keys
KATIM™ Phone applies strong cryptographic algorithms that are tested and vetted. The crypto keys as well as user credentials are stored in in a secured environment which prevents extracting them from the device, and protects against eavesdropping and manipulation of sensitive information
PKI-based key management at all levels
Keys present on the device validating all aspects of code and policy integrity all the way from early boot up to the launching of individual applications. MDM managed platform certificates and crypto card based PKI identity credentials available for securing communication reliability. All system keys and infrastructure keys can be generated, maintained and controlled by the customer.