Secure Communication Hoox: native mobile security
The Hoox range phones are designed to provide a very high level of security. Controlled communication ports, strong authentication and hardware encryption: the whole smartphone is designed to protect your privacy.
Security experts know it: your protection is as strong as its weakest link. It does no good to lock your front door if your windows stay open …
This is why Hoox phones empowered with highly efficient encryption technologies and anti-intrusion protection. This protects not only each link, but also the entire security chain. Hardware, operating system and the various software layers are designed to deliver a high level of security.
- Controlled applications
- Hardened operating system
- Secure access and boot
- Certified components
- Encrypted communications
- Encrypted data on the phone
Phone calls, SMS, emails and all other data travel encrypted, which ensures the safety of information exchange. On your phone, stored data, applications and operating system are systematically protected in terms of confidentiality and integrity.
A Hoox phone verifies the identity of its user via strong authentication: mutual cryptographic authentication, security code - or biometrics for the Hoox m2. To protect your phone against malwares, all accesses to the terminal are verified and the communication ports are strictly controlled.
The result: a very high degree of privacy for data exchange and for the information residing on the phone.
Hoox: sovereign security
The Hoox range offers flawless conception and governance. The Hoox secure phones are designed by Bull/Atos and its ecosystem of French partners. Once in your hands, Hoox allows you to fully control your security. Thus, no information leaves your organization without your consent.
Control your information flow
The Hoox range is ‘all inclusive’. It is delivered with fully equipped administrative and communication features, along with services for training, installation and implementation. Everything can be up-and-running very quickly.
The Hoox phones easily integrates into your existing information system: email, directory and telephone exchange. You are free to keep your existing telecom operator. With the Hoox range, you control the information assets of your business.
Hoox phones encrypt voice calls and SMS communications from end-to-end. A secure communication channel allows the exchange of emails and data in a secured manner, respecting your security policy for Internet access.
Turnkey central administration
Daily monitoring is easy, secure and centralized. You can manage the phones remotely using an MDM (mobile device management) function delivered with the solution.
The administration of your Hoox phones is based on a strict management of rights, permissions and applications. All data flows are controlled via your own organization.
Hoox : security for professionals
Hoox range was specifically created for businesses and government organizations. Users benefit from phones that are powerful, functional and have a long battery life. Organizations can easily manage their Hoox fleet with a ready-to-use trusted environment
Two phones for 2 types of use
The Hoox range includes two mutually compatible phones. The Hoox m2 smartphone is a tool for professionals that share sensitive data on a daily basis. With the Hoox m1 mobile, you can manage a fleet of phones and temporarily assign them for sensitive trips or for the duration of a critical project.
Hoox m1 and Hoox m2 can exchange calls and text messages between them. You manage both models with the same administration and security environment. Data transits through the same security gateway. Thus, you can start by deploying one Hoox model and expand your fleet with the other model later on.
Hoox m2: Smartphone features
- Based on Android
- 1.2GHz, quadri core Cortex A5 processor
- 4.68' QHD screen
- 8 GB Flash memory / 1 GB RAM
- 2000 mAh battery
- Dimensions: 140x69x10 mm
- Fingerprint reader
- GPS and accelerometer
- Two cameras (5.0 Mp auto-focus, 0.3 Mp)
- 3-band 3G/3G+ (2100-1900-900 MHz)
- 4-band 2G/2G+ (850-900-1800-1 900 MHz)
- Wi-Fi b/g/n and Bluetooth 3.0
- G&D smartcard - EAL5+ certified (ISO 15408)
- Cryptosmart™ applet - EAL4+ certified (ISO 15408)
- Integration with existing PKI (X.509 standard)
- Authentication with remote card (2048-bit RSA)
- 2048-bit Diffie-Hellman key exchange
- Protection against "man in the middle" attacks
- Single-use session key for voice and SMS
- 256-bit AES encryption for voice, SMS and data
For more information about Bull/Atos Hoox solutions ...click here