> SECURITY > Cybersecurity > Secured phoning

Discover Hoox m2

The Hoox range of secure mobiles and smartphones ensures confidentiality of voice, SMS, e-mail and data communication
Hoox - native security

What is native security?

Security experts know it : your protection is as strong as its weakest link. It does no good to lock your front door if your windows stay open…

 

This is why Bull has empowered its Hoox phones with highly efficient encryption technologies and anti-intrusion protection. This protects not only each link, but also the entire security chain. Hardware, operating system and the various software layers are designed to deliver a high level of security.

  • Controlled applications
  • Hardened operating system
  • Secure access and boot
  • Certified components
  • Encrypted communications
  • Encrypted data on the phone 

Phone calls, SMS, emails and all other data travel encrypted, which ensures the safety of  information exchange. On your phone, stored data, applications and operating system are systematically protected in terms of confidentiality and integrity.

A Hoox phone verifies the identity of its user via strong authentication: mutual cryptographic authentication, security code - or biometrics  for the Hoox m2. To protect your phone against malwares, all accesses to the terminal are verified and the communication ports are strictly controlled.

The result: a very high degree of privacy for data exchange and for the information residing on the phone.


Retour haut de page
Print page.Send page.Share on Facebook.Share on Linkedin.Share on Viadeo.Share on Technorati.Share on Digg.Share on Delicious.Bookmark this page on Google.Share on Windows Live.Share on Twitter.

July 9, 2014 . Stronger data security

Contact us
WHITE PAPER

Security of Mobile Device Communications
Protect voice, SMS and data.
Download the white paper >>

Threats in cyber-space
Philippe Duluc

Danger in cyber-space : Transformations in cyber-space >
By Philippe Duluc, Director of Bull's Security business