hoox for business€¦ · hoox secured store (1/2) prevention from unsafe applications. 27 hoox...

38
© Atos - For internal use Hoox for business … bezpečná komunikace …

Upload: others

Post on 29-Jun-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Hoox for business€¦ · Hoox Secured Store (1/2) Prevention from unsafe applications. 27 Hoox Secured Store (2/2) A MAM included in the Hoox Security Platform With the Hoox MAM,

© Atos - For internal use

Hoox for business

… bezpečná komunikace …

Page 2: Hoox for business€¦ · Hoox Secured Store (1/2) Prevention from unsafe applications. 27 Hoox Secured Store (2/2) A MAM included in the Hoox Security Platform With the Hoox MAM,

Atos is a leader in digital services deliveringSystems Integration services, Consulting,Managed Services & BPO, Cloud operations,Big Data & Cyber-security solutions as well as e-payments and transactional services.Atos is focused on business technology that powers progress and helps organizations to create their firm of the future.

Atos operates under the brands Atos,Atos Consulting, Atos Worldgrid, Bull, Canopy, Unify and Worldline. business

technologistscirca

countries around the world

Atos is a Societas europaea (SE).

Atos is the Worldwide InformationTechnology Partner for the Olympic &Paralympic Games and is listed on theEuronext Paris market.

billionannual revenuecirca

2

Profile

Page 3: Hoox for business€¦ · Hoox Secured Store (1/2) Prevention from unsafe applications. 27 Hoox Secured Store (2/2) A MAM included in the Hoox Security Platform With the Hoox MAM,

A global approach to security

Page 4: Hoox for business€¦ · Hoox Secured Store (1/2) Prevention from unsafe applications. 27 Hoox Secured Store (2/2) A MAM included in the Hoox Security Platform With the Hoox MAM,

▶ Hoox: your trusted solution

– Secure smartphones dedicated to cover enterprise and government needs

– A range of terminals to cover all customer needs based on the expected security level

▶ Hoox: business security for professional use

– Secure smartphones to keep you efficient and productive in all circumstances

– Provides new usage such as conference call, instant messaging and recording

4

For a global approach to security

Page 5: Hoox for business€¦ · Hoox Secured Store (1/2) Prevention from unsafe applications. 27 Hoox Secured Store (2/2) A MAM included in the Hoox Security Platform With the Hoox MAM,

Communicate easily with all your contacts

▶ Secure calls and messages to Hoox users

▶ Secure and clear conference call

▶ Secure recording (2018)

▶ Standard non-secure calls to non-Hoox users

Maintain your productivity

▶ Exchange data via encrypted communications

▶ Secure file exchange

▶ Remote revocation

▶ Remote data wipe in case of loss or damage

Use your daily applications

▶ Secured app store with approved applications (Android apps audited and certified)

▶ Prevent the installation of unsecure applications

5

HooxYour data security without constraints

Page 6: Hoox for business€¦ · Hoox Secured Store (1/2) Prevention from unsafe applications. 27 Hoox Secured Store (2/2) A MAM included in the Hoox Security Platform With the Hoox MAM,

6

Your data is precious It needs to be protected throughout your workday

Consults mail and schedule. Reads news

Call boss to validate

contract and proposal figures

Send report and contract to management

Prepare meeting.

Download latest sales slides

Download the contract

The day ends. But apps keep

exchanging data

Page 7: Hoox for business€¦ · Hoox Secured Store (1/2) Prevention from unsafe applications. 27 Hoox Secured Store (2/2) A MAM included in the Hoox Security Platform With the Hoox MAM,

7

Companies are more and more open to the outside world

The new usages reaffirm the importance of having a secure smartphone

Page 8: Hoox for business€¦ · Hoox Secured Store (1/2) Prevention from unsafe applications. 27 Hoox Secured Store (2/2) A MAM included in the Hoox Security Platform With the Hoox MAM,

8

The security of smartphones A strategic challenge for your company

*Source: PwC study on corporate fraud published on March 7, 2016

3.36billion euros

68%

The smartphone is a real “mobile office”It is the extension of your company

of financial impact

of companies were affected by cyber crime in the last 24 months

Page 9: Hoox for business€¦ · Hoox Secured Store (1/2) Prevention from unsafe applications. 27 Hoox Secured Store (2/2) A MAM included in the Hoox Security Platform With the Hoox MAM,

9

Everyone has to be protected

Architect: preserve your plans Salesperson: protect your negotiations Lawyer: safeguard the confidential data of your clients

Assistant: communicate with your boss in a complete security

Physician: preserve patients’ protected health information

Researcher: protect pharmaceutical intellectual property

Page 10: Hoox for business€¦ · Hoox Secured Store (1/2) Prevention from unsafe applications. 27 Hoox Secured Store (2/2) A MAM included in the Hoox Security Platform With the Hoox MAM,

10

BanksProtect clients’ sensitive data

▶ Description

– Private international bank specializing in wealth management

– More than 200,000 employees

– Very frequent travel abroad

▶ Needs

– Availability of secure smartphones

– Easy-to-use devices

– Reduction of the operational risk linked to the management of client portfolios

Absolute confidentiality in regards to banking secrets

Page 11: Hoox for business€¦ · Hoox Secured Store (1/2) Prevention from unsafe applications. 27 Hoox Secured Store (2/2) A MAM included in the Hoox Security Platform With the Hoox MAM,

11

Public institutionsProtect governmental exchanges

▶ Description

Multiple profiles :

– Chief of State

– Ministers

– Secretaries of State

▶ Needs

– Protect the confidentiality of strategic communications

– Ensure the security of trades linked to national sovereignty

Complete confidentiality in governmental exchanges

Page 12: Hoox for business€¦ · Hoox Secured Store (1/2) Prevention from unsafe applications. 27 Hoox Secured Store (2/2) A MAM included in the Hoox Security Platform With the Hoox MAM,

12

Mobile securityA strategic challenge for your daily activity

Questions regarding my devices and applications:

- Is my smartphone secure? What will happen to my data if my smartphone is lost or stolen?

- Can we trust the software vendors? Is there a risk of intrusion on my smartphone when downloading applications?

- Is access to my information system secure on my smartphone?

Have you measured the impact of mobile security on your business?

Page 13: Hoox for business€¦ · Hoox Secured Store (1/2) Prevention from unsafe applications. 27 Hoox Secured Store (2/2) A MAM included in the Hoox Security Platform With the Hoox MAM,

Hoox for businessYour real protection

Page 14: Hoox for business€¦ · Hoox Secured Store (1/2) Prevention from unsafe applications. 27 Hoox Secured Store (2/2) A MAM included in the Hoox Security Platform With the Hoox MAM,

Hoox secure smartphonesDon’t let risks drag down your productivity

Hoox: complete protection

▪ Call all your contacts ▪ Make conference calls▪ Exchange information via email▪ Access your information system▪ Download applications

▪ Secure communications prevent eavesdropping on phone calls

▪ Emails are protected from interception

▪ Secure access to IT

▪ Use of controlled applications, all applications are secured

▪ Protected device, prevents the extraction of sensitive information

Unhindered productivity

▪ Listening, interception▪ Loss or theft of the device▪ Intrusive applications▪ Intrusion on the telephone

Protected against security risks

14

Page 15: Hoox for business€¦ · Hoox Secured Store (1/2) Prevention from unsafe applications. 27 Hoox Secured Store (2/2) A MAM included in the Hoox Security Platform With the Hoox MAM,

15

... At all levels

User experience: security with complete transparency

Native and controlled security

Turnkey solutionsEasier fleet management

Share and communicate with full freedom

Page 16: Hoox for business€¦ · Hoox Secured Store (1/2) Prevention from unsafe applications. 27 Hoox Secured Store (2/2) A MAM included in the Hoox Security Platform With the Hoox MAM,

16

Hoox for business, a new dimension of security

Native security: enter a secure universe from the unlock screen!

Hoox is designed for business.Easy to use, intuitive and user-friendly

Security with complete transparency, a unique experience in the market

Page 17: Hoox for business€¦ · Hoox Secured Store (1/2) Prevention from unsafe applications. 27 Hoox Secured Store (2/2) A MAM included in the Hoox Security Platform With the Hoox MAM,

17

Hoox for businessCommunicate and share with complete peace of mind

Keep working as usual, Communicate simply

The hexagonal shape of the icons shows you that these applications are secured:

• Protection from listening• Protection from interception (text, email, etc.)

Benefits• Maintain confidentiality of exchanges • Preserve your financial and commercial

information

Page 18: Hoox for business€¦ · Hoox Secured Store (1/2) Prevention from unsafe applications. 27 Hoox Secured Store (2/2) A MAM included in the Hoox Security Platform With the Hoox MAM,

18

Hoox for businessCommunicate securely

See the security status on-screen

Benefits• Maintain the confidentiality of your

team’s sensitive interactions• Keep your peace of mind

Page 19: Hoox for business€¦ · Hoox Secured Store (1/2) Prevention from unsafe applications. 27 Hoox Secured Store (2/2) A MAM included in the Hoox Security Platform With the Hoox MAM,

19

Product specifications

Year of phone design 2017 2017

Android version basis 6.0 6.0

Display AMOLED 5.5’’ IPS LTPS 5,2’’

Display resolution 1440x2560 1080x1920

Capacity 32 16

External SD card Yes Yes

Back camera 16Mpx 13Mpx

Front camera 8Mpx 8Mpx

Wireless networks supports 2G/3G/4G 2G/3G/4G

Wi-Fi Wi-Fi 802.11 b/g/n/a Wi-Fi 802.11 b/g/n/a

Bluetooth V4.2 V4.2

SIM format Nano-SIM double Nano-SIM double

Audio output Jack 3.5 Jack 3.5

USB Micro-USB Micro-USB

NFC No No

GPS GPS, A-GPS GPS, A-GPS

Battery Non-removable Li-Po

3000mAh

Non-removable Li-Po

2610mAh

Fast charging Quick charge 2 Standard

Basemark X 23718 23718

Dimensions 153.9x75.4x6,99 mm 147x72.5x7,1 mm

Weight 149g 135g

CPU Qualcomm

Snapdragon 652

Qualcomm

Snapdragon 617

GPU Adreno 410 Adreno 405

Hoox K31 Hoox K3.1

Hoox K31 Hoox K3.1

Page 20: Hoox for business€¦ · Hoox Secured Store (1/2) Prevention from unsafe applications. 27 Hoox Secured Store (2/2) A MAM included in the Hoox Security Platform With the Hoox MAM,

20

Main security features

Legal listening compliance Yes (2018)

MDM: users/groups management,

contacts synchronization

Yes

MDM: remote wipe and erase data in

case of stolen devices

Yes

MDM: remote modification of

administration and secure parameters

Yes

MAM Private store

Hoox setup Easy (QR code)

Trusted boot Yes

Rugged and hardened OS Yes

Over-the-air software update Yes

Possible integration of custom AES

algorithm (dedicated project)

Yes

Central system redundancy Yes

Capacity (number of users) >15 000

Snatching protection Yes

Cryptography key generation Central EAL4+ Atos HSM

Secure voice and SMS between Hoox Yes

Standard voice and SMS Yes

End-to-end secure VoIP calls between two

Hoox

Yes

Secure voicemails Yes

Encrypted-to-clear call from Hoox to a

corporate fixed phone

Yes (On Premise)

Encrypted-to-clear call from Hoox to

national network

Yes (On Premise)

Secure Group Instant Messaging Yes

Secure SMS Yes (2018)

Secure access to data services (email,

web…)

Yes

Secure conference call

[3 users, live mode through Hoox devices]

Yes

Secure conference room

[4+ users with invitation]

Yes

Secure recording Yes (2018)

Hoox devices Hoox devices

Page 21: Hoox for business€¦ · Hoox Secured Store (1/2) Prevention from unsafe applications. 27 Hoox Secured Store (2/2) A MAM included in the Hoox Security Platform With the Hoox MAM,

21

Keep working as usualAccess main services from standard Android applications

Synchronized email, calendar and contacts

Calls and messages

On-screensecurity status

Internet and camera

Page 22: Hoox for business€¦ · Hoox Secured Store (1/2) Prevention from unsafe applications. 27 Hoox Secured Store (2/2) A MAM included in the Hoox Security Platform With the Hoox MAM,

22

Fully integrated security featuresNo dedicated application for secure communication

Standard call SMS

Secured instant message

Secure call with Hoox user

Email

Page 23: Hoox for business€¦ · Hoox Secured Store (1/2) Prevention from unsafe applications. 27 Hoox Secured Store (2/2) A MAM included in the Hoox Security Platform With the Hoox MAM,

▶ Two ways to communicate with Hoox:

– Secure communication with other Hoox users

– Standard communication (standard calls, standard SMS): same risks as with a standard smartphone

▶ Hoox secured channel of communication:

– Secure calls or conference calls: voice calls are encrypted. Signaling uses SIP/TLS and voice data transfer uses SRTP Passthrough protocol (end-to-end encrypted call), 256-bit AES

– Instant messaging: SIP/TLS, 256-bit AES

– Data: all data exchanges (e.g. web browsing and mails) are going exclusively through a VPN. There is an IP tunneling which forces all connections from the mobile phone to the central system through the VPN; TLS.

23

Secure communicationsPrevention from eavesdropping and interception

Page 24: Hoox for business€¦ · Hoox Secured Store (1/2) Prevention from unsafe applications. 27 Hoox Secured Store (2/2) A MAM included in the Hoox Security Platform With the Hoox MAM,

24

Secure connectionsPrevention from over-the-air intrusion

▶ All wireless features are strictly controlled

▶ Only fundamental features are kept

▶ All other functions are removed from the Hoox (not just deactivated)

Totally removed

Audio profile only (for car connection)

Hotspot connection only

No Wi-Fi tethering

Other profiles removed

4G/3G: IP tunneling and no MMS

Page 25: Hoox for business€¦ · Hoox Secured Store (1/2) Prevention from unsafe applications. 27 Hoox Secured Store (2/2) A MAM included in the Hoox Security Platform With the Hoox MAM,

25

Protected device Prevention from extraction of information

USB

▶ USB is strictly controlled

▶ Only fundamental features are kept

– File transfer (with security code)

– 4G connection sharing

▶ All other functions are removed from the Hoox (not just deactivated)

Security code

▶ After five tries, the Hoox is reset

A secure boot

▶ Data is encrypted

▶ Prevents from penetrating or changing something in the system

Page 26: Hoox for business€¦ · Hoox Secured Store (1/2) Prevention from unsafe applications. 27 Hoox Secured Store (2/2) A MAM included in the Hoox Security Platform With the Hoox MAM,

▶ Hoox smartphones include a private store : Hoox Secured Store

– No public store installed on the Hoox

– Only “signed by Atos” applications up for installation: no other possibility to install an application (i.e. downloading by a file transfer)

– In-depht management of Apps authorizations

▶ Atos audits all applications for download in your private store

– Security policy compliance

– Rights and permissions

– Most inappropriate behaviors are detected (malware, virus, rootkit, unwanted connection to servers etc.)

▶ You can download your own applications in your private store

– Possibility to add your own applications after an Atos audit and test.

– Available for your employees only

26

Hoox Secured Store (1/2)Prevention from unsafe applications

Page 27: Hoox for business€¦ · Hoox Secured Store (1/2) Prevention from unsafe applications. 27 Hoox Secured Store (2/2) A MAM included in the Hoox Security Platform With the Hoox MAM,

27

Hoox Secured Store (2/2)A MAM included in the Hoox Security Platform

With the Hoox MAM, deploy easily mainstream Apps and your own apps.

Apps can be deployed for groups or users.

*MAM = Mobile Application Management

Page 28: Hoox for business€¦ · Hoox Secured Store (1/2) Prevention from unsafe applications. 27 Hoox Secured Store (2/2) A MAM included in the Hoox Security Platform With the Hoox MAM,

▶ Two ways to communicate with Hoox:

– Secure communication with other Hoox users

– Standard communication (standard calls, standard SMS): same risks as with a standard smartphone

▶ Hoox secured channel of communication:

– Secure calls or conference calls: voice calls are encrypted. Signaling uses SIP/TLS and voice data transfer uses SRTP Passthrough protocol (end-to-end encrypted call), 256-bit AES

– Instant messaging: SIP/TLS, 256-bit AES

– Data: all data exchanges (e.g. web browsing and mails) are going exclusively through a VPN. There is an IP tunneling which forces all connections from the mobile phone to the central system through the VPN; TLS.

28

Secure communicationsPrevention from eavesdropping and interception

Page 29: Hoox for business€¦ · Hoox Secured Store (1/2) Prevention from unsafe applications. 27 Hoox Secured Store (2/2) A MAM included in the Hoox Security Platform With the Hoox MAM,

29

Secure connectionsPrevention from over-the-air intrusion

▶ All wireless features are strictly controlled

▶ Only fundamental features are kept

▶ All other functions are removed from the Hoox (not just deactivated)

Totally removed

Audio profile only (for car connection)

Hotspot connection only

No Wi-Fi tethering

Other profiles removed

4G/3G: IP tunneling and no MMS

Page 30: Hoox for business€¦ · Hoox Secured Store (1/2) Prevention from unsafe applications. 27 Hoox Secured Store (2/2) A MAM included in the Hoox Security Platform With the Hoox MAM,

30

Protected device Prevention from extraction of information

USB

▶ USB is strictly controlled

▶ Only fundamental features are kept

– File transfer (with security code)

– 4G connection sharing

▶ All other functions are removed from the Hoox (not just deactivated)

Security code

▶ After five tries, the Hoox is reset

A secure boot

▶ Data is encrypted

▶ Prevents from penetrating or changing something in the system

Page 31: Hoox for business€¦ · Hoox Secured Store (1/2) Prevention from unsafe applications. 27 Hoox Secured Store (2/2) A MAM included in the Hoox Security Platform With the Hoox MAM,

▶ Hoox smartphones include a private store : Hoox Secured Store

– No public store installed on the Hoox

– Only “signed by Atos” applications up for installation: no other possibility to install an application (i.e. downloading by a file transfer)

– In-depht management of Apps authorizations

▶ Atos audits all applications for download in your private store

– Security policy compliance

– Rights and permissions

– Most inappropriate behaviors are detected (malware, virus, rootkit, unwanted connection to servers etc.)

▶ You can download your own applications in your private store

– Possibility to add your own applications after an Atos audit and test.

– Available for your employees only

31

Hoox Secured Store (1/2)Prevention from unsafe applications

Page 32: Hoox for business€¦ · Hoox Secured Store (1/2) Prevention from unsafe applications. 27 Hoox Secured Store (2/2) A MAM included in the Hoox Security Platform With the Hoox MAM,

32

Hoox Secured Store (2/2)A MAM included in the Hoox Security Platform

With the Hoox MAM, deploy easily mainstream Apps and your own apps.

Apps can be deployed for groups or users.

*MAM = Mobile Application Management

Page 33: Hoox for business€¦ · Hoox Secured Store (1/2) Prevention from unsafe applications. 27 Hoox Secured Store (2/2) A MAM included in the Hoox Security Platform With the Hoox MAM,

Implementation and daily life

33

Page 34: Hoox for business€¦ · Hoox Secured Store (1/2) Prevention from unsafe applications. 27 Hoox Secured Store (2/2) A MAM included in the Hoox Security Platform With the Hoox MAM,

Hoox “as a service”An all-in-one solution

Operator network2G,3G,4GWi-Fi

Customer infrastructure

Hoox security platform

-SIP/PBX-VPN-MDM-MAM-HSM

Hoox HooxNon-Hoox

Customer IT

VPN

Atos infrastructure

Secured communicationsEncrypted voice SRTPInstant Messaging based on TLSData based on VPN

Standard communications

Voice and SMS based on operator

34

The hosted solution

Which benefits?

• Easy and quick deployment• No IT concerns• Guaranteed service level (SLA)• Atos: your trusted partner

• Hosted system in a Tier III data center

• OPEX model• Volume <1000

Page 35: Hoox for business€¦ · Hoox Secured Store (1/2) Prevention from unsafe applications. 27 Hoox Secured Store (2/2) A MAM included in the Hoox Security Platform With the Hoox MAM,

Customer infrastructure

Operator network2G,3G,4GWi-Fi

Hoox HooxNon-Hoox

Secured communicationsEncrypted voice SRTPInstant Messaging based on TLSData based on VPN

Standard communications

Voice and SMS based on operator

Hoox “on premises”Full integration with your IT

Hoox security platform

-SIP/PBX-VPN-MDM-MAM-HSM

Customer IT

LAN

35

The on-site solution

Which benefits?

• Full integration with your information system

• Total sovereignty on your organization’s data

• Control over of all network flows

• Scalability• CAPEX model• Volume >1000

Page 36: Hoox for business€¦ · Hoox Secured Store (1/2) Prevention from unsafe applications. 27 Hoox Secured Store (2/2) A MAM included in the Hoox Security Platform With the Hoox MAM,

36

Provisioning mechanism Distribution to your employees

Non-personalized Hoox

PersonalQR code

AtosYour customer

support/ITEnd user

SIM insertion

Shipment

List of users

Transmission

Distribution 1st step: Choice of the security code

2nd step: Scan the QR code with the Hoox

Hoox is ready to use

Page 37: Hoox for business€¦ · Hoox Secured Store (1/2) Prevention from unsafe applications. 27 Hoox Secured Store (2/2) A MAM included in the Hoox Security Platform With the Hoox MAM,

▶ Management by Atos teams

– Atos manages the solution from implementation to operation

▶ Predictable budget

– All fees are known in advance for greater cost control

▶ Freedom of use

– Your applications are verified and available from a secure store

▶ Homogeneous fleet

– A flexible solution adapted to all your employees

Also available on premises

37

Hoox as a serviceYour solution to turnkey security

Page 38: Hoox for business€¦ · Hoox Secured Store (1/2) Prevention from unsafe applications. 27 Hoox Secured Store (2/2) A MAM included in the Hoox Security Platform With the Hoox MAM,

Atos, the Atos logo, Atos Codex, Atos Consulting, Atos Worldgrid, Bull, Canopy, equensWorldline, Unify, Worldline and Zero Email are registered trademarks of the Atos group. January 2018. © 2018 Atos. Confidential information owned by Atos, to be used by the recipient only. This document, or any part of it, may not be reproduced, copied, circulated and/or distributed nor quoted without prior written approval from Atos.

Thanks

For more information please contact:[email protected]+420 604 290 196