!DOCTYPE html>
B2B: business to business
E2E encryption: End-to-end encryption
GSM: Global System for Mobile Communications
Haas: Hardware As A Service
Hardening computing: Making devices more safe & locked down
HW: Hardware
ICT: Information and Communications Technology
IDS: Intrusion detection system
IPS: Intrusion prevension system
MMS: Multimedia Messaging Service
PGP: Pretty Good Privacy
RTC: Real-Time Communication (multimedia and audio via VoIP)
Saas: Software As A Service
SMS: Short Message Service
SW: Software
VoIP: Voice Over IP
VPN: Virtual Private network
THE PROBLEM
|
OUR SOLUTION
|
|
---|---|---|
Server location |
Third party server site
|
Your / Our secure server site
|
Cloud |
Rented Cloud X + Provider Y + Rented HW
|
Your / Our secure Cloud + Your / Our HW
|
OS |
Apple. Windows. Android. HP-UX. Red hat...
|
Hardened Linux / Open Source Android
|
SW / Apps |
Google/Apple/MS: mail, cal, cloud-drive...
|
Open source alternatives
|
Clear-text / Encryption |
Normal voice calls, e-mail, messaging app-X
|
Normal & Encrypted Communication Suite
|
Network privacy |
Direct network connection + closed source tools
|
Zen-mode VPN and/or Tor + open source tools
|
Search engines |
Google. Bing. Yahoo... (Text & Voice)
|
Privacy friendly search engines
|
Social Frameworks |
Facebook. Google+. Twitter. Whatsapp. Snapchat...
|
Open source & privacy respecting alternatives
|
For more high-level overview material see Secure Real-Time Communication and our Secure Infra Overview
For a in-depth White-Paper on the problem, visit the The problem - Part II page.
Want to get off the grid? Give us a call or use our Secure Web Contact and we will call you back.
To learn more about the problem area and our solutions to it, visit our Solutions page.
To watch our solutions come alive, checkout our Products page.
Still not convinced why you need us? Visit our Links page.