The secure Smartphone.

TM2 - Das ultra sichere Smartphone

 

 

 

The world's most secure solution for mobile communication

TM2 - The new standard for ultra-secure mobile communication, whether telephony, video conferencing, text messaging, general data exchange or access to corporate networks.

Whether in the government environment, in administration, for personal and property protection, in the free economy or for private individuals: Our TM2 mobile phones set previously unattainable standards in the area of data protection and security.

Unauthorized use and unauthorized access to confidential data and information belonging to you or your organization are reliably prevented, and every "break-in attempt" is logged.

The TM2 devices are designed to defend against all types of attacks, both "physical", "wireless" and "from the Internet".

A "hardened" operating system in combination with detailed device and security management leaves no chance of entry for malware and spyware.

Lost or even stolen devices, manipulation and burglary attempts lose their terror - the combination of our self-developed security hardware that cannot be breached non-destructively with specially tailored, multi-layered software enables extreme system security.

Our extensive "Secure Suite" software offers a complete set of applications and services for tap-proof communication, secure information exchange and device management.

The TM2 also offers the usual user-friendliness and the extensive software range of a current Android smartphone, which makes it the first choice among the other offers of - often only supposedly - secure telephony devices.

 

TM2 - Das ultra sichere Smartphone

FUNCTIONS, PERFORMANCE- AND SPECIAL FEATURES

The TM2 offers high voice and video quality without noticeable delays - regardless of whether you use the device in a wireless network or via WLAN in the intranet or internet.

Thanks to the "multi-container function", business and private data are securely isolated from one another, switching between the different work areas is quick and easy - you don't have to constantly restart the device - as with other solutions on the market - or even have to carry another "private" phone around with you.

With the "private mode" button, you "physically de-energize" all microphones and cameras in the device as well as the Bluetooth module in fractions of a second, and the accuracy of the other sensors is reduced. It is technically impossible to eavesdrop on the device in this state, even trying to eavesdrop on a conversation using structure-borne noise via the acceleration sensors will fail.

The unobtrusive "emergency" button launches various apps installed on the device, e.g. B. to make an emergency call, to "lock" the smartphone or to delete security-critical data immediately. Of course, you can also assign your own application to this button.

With the "PTT/pust-to-talk" button, you can use the device like a handheld radio: Press the button and speak directly to your control center or another conversation partner. Or assign any other function to the key.

The intrusion protection detects unauthorized opening or even dismantling of the device and optionally destroys any data and information on the device. This even happens when the accumulator is removed - the monitoring electronics have their own power supply.

All information stored on the device and the inserted data carriers is encrypted and decrypted in real time using our proprietary cryptography hardware. Even if an attacker - with extreme technical effort - should succeed in overcoming all protective measures and accessing the memory chips, the data stored there on the device cannot be decrypted - and are therefore useless.

In the TM2/R and TM2/C variants, our devices are also available with a modified operating system and approval for the secrecy levels "for official use only" and "confidential". (Please note the "Restrictions on sale to private individuals" applicable to the TM2/C variant)

And: Waterproof and dust-proof according to IP67 and certified according to MIL-STD 810 G, our TM2 smartphones work even under extreme environmental conditions.

 

„MULTICONTAINER“

With the "multicontainer" functionality, our TM2 devices offer a plus in flexibility and user-friendliness.

The data of the "containers" are each managed in their own secure, encrypted file system - in contrast to standard smartphones, where only a single, simple file system is available to manage data on an inherently insecure system platform.

Up to four workspaces can be used. The user can access the data of different organizational units - for example "Private", "Business", "Banking", "Crypto-Wallet", ...

The work areas are safely isolated from each other. Services and applications explicitly allowed by the user can each access individual workspaces.

Each "container" has its own customizable look - so you can instantly see which workspace is being used.

To switch from one workspace to another, all you have to do is "swipe" the home screen once. You do not need any additional PIN or passwords.

You simply activate new TM2 devices in your organization using a QR code, which you send to the user in printed form or quickly and easily by email.

 

TM2 - Das ultra sichere Smartphone

„MOBILE DEVICE MANAGEMENT “

With the MDM software - available as a customer-owned server solution - you always have an overview of your fleet of devices and can manage them easily.

Your individual company library enables you to determine which functions should be available on which devices and which software may be installed by the end user. From here you can also initiate automatic updates - e.g. of your individual company software - on the devices.

It can be used in both commercial and private network environments and is independent of public internet or 'cloud' services.

The required server infrastructure can be operated entirely by your organization - This ensures that your data does not leave your company and only trusted people have access.

 

Secure Telephony, Videophony and Conferencing

With our software suite, we offer a modern and extremely secure communication solution: "Endpoint-to-endpoint" encrypted, tap-proof voice and video telephony, conference calls, messages and short messages as well as the transfer and sharing of files and attachments.

A function that automatically destroys messages after a certain period of time is also available, as are messages that are only "visible" for certain users. Thanks to the integration of biometric face recognition, the software can recognize whether an unknown face is in front of the device. Messages and information that are only intended for a specific recipient are then hidden on the screen in real time.

The application takes into account the special requirements for use in the environment of governments and authorities, but is - of course - also suitable for companies and professional private users, for whom the confidentiality of the spoken word and the protection of personal data are essential: lawyers, doctors, journalists, law enforcement as also rescue workers, security services, business leaders.

 

INTEROPERABILITY

All the usual Android functions and services for telephoning and for network and data access are available to you on the TM2.

"Unencrypted" smartphones and landline telephones can be dialed without any problems and can also be reached from them - but then without the special protection against eavesdropping.

Of course, you can also use other messenger services and connect to the Internet or your organization's network as usual.

Our software is also available in versions for other Android smartphones without special security features - but please remember that a chain is only as strong as its weakest link - you can achieve maximum security and data protection in combination with the various TM2 smartphones and own server.

 

Important Notice

When using the "tap-proof telephony and video functions", the data connections of your telephone network operator are used. Please make sure that you have a tariff with sufficient data volume and bandwidth.

When traveling abroad, please note that in some countries import restrictions may apply to our devices equipped with "heavy encryption".