SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
Travel Solution:
1. High-Quality Mobile Internet at home and
in 100+ countries at local rates ($10 / GB)
2. Int’l calls and text messages from $0.02
3. Free Mobile Internet after booking a hotel
or a ticket at popular travel booking
companies
4. External battery (2400 – 12000 mAh) to
charge mobile devices during a trip.
5
Security-based device for corporates:
Security Platform:
1. Open-source Linux-based firmware
2. Built-in VPN to provide secure access to
corporate network
3. Built-in hardware authorization
4. Local encrypted data storage
5. Device management system for remote
control, configuration and blocking
6. Restricted access to prohibited websites.

Weitere ähnliche Inhalte

Was ist angesagt?

NewsByte Mumbai October 2017
NewsByte Mumbai October 2017NewsByte Mumbai October 2017
NewsByte Mumbai October 2017chauhananand17
 
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...OWASP Delhi
 
News Byte Session By Mukesh Pathak
News Byte Session By Mukesh PathakNews Byte Session By Mukesh Pathak
News Byte Session By Mukesh PathakMukesh Pathak
 
Tor Project and The Darknet
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The DarknetAhmed Mater
 
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020Vikalp Sharma
 
Newsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_DecNewsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_DecRaghunath G
 
Security News Bytes Null Dec Meet Bangalore
Security News Bytes Null Dec Meet BangaloreSecurity News Bytes Null Dec Meet Bangalore
Security News Bytes Null Dec Meet BangaloreInMobi Technology
 
Security News Bytes (Aug Sept 2017)
Security News Bytes (Aug Sept 2017)Security News Bytes (Aug Sept 2017)
Security News Bytes (Aug Sept 2017)Apurv Singh Gautam
 
TOR Packet Analysis - Locating Identifying Markers
TOR Packet Analysis - Locating Identifying MarkersTOR Packet Analysis - Locating Identifying Markers
TOR Packet Analysis - Locating Identifying MarkersBrent Muir
 
Cellcrypt - An Introduction to Secure Mobile Communications
Cellcrypt - An Introduction to Secure Mobile CommunicationsCellcrypt - An Introduction to Secure Mobile Communications
Cellcrypt - An Introduction to Secure Mobile CommunicationsPaul Parke
 
Hipaa violations-infographic-one-page (2)
Hipaa violations-infographic-one-page (2)Hipaa violations-infographic-one-page (2)
Hipaa violations-infographic-one-page (2)Diagnotes, Inc.
 
Developing secure mobile apps by Alexandru Catariov Endava
Developing secure mobile apps by Alexandru Catariov EndavaDeveloping secure mobile apps by Alexandru Catariov Endava
Developing secure mobile apps by Alexandru Catariov EndavaMoldova ICT Summit
 
Why hackers love public Wi-fi
Why hackers love public Wi-fiWhy hackers love public Wi-fi
Why hackers love public Wi-fitechexpert2345
 
Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterMohammed Bharmal
 
Cyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeCyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeAdeel Rasheed
 
Phox mobile texting service
Phox mobile texting servicePhox mobile texting service
Phox mobile texting servicegetphox
 
Phone Hacking: A lucrative, but largely hidden history
Phone Hacking: A lucrative, but largely hidden historyPhone Hacking: A lucrative, but largely hidden history
Phone Hacking: A lucrative, but largely hidden historyDavid Rogers
 

Was ist angesagt? (19)

NewsByte Mumbai October 2017
NewsByte Mumbai October 2017NewsByte Mumbai October 2017
NewsByte Mumbai October 2017
 
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
 
News Byte Session By Mukesh Pathak
News Byte Session By Mukesh PathakNews Byte Session By Mukesh Pathak
News Byte Session By Mukesh Pathak
 
Spoofing
SpoofingSpoofing
Spoofing
 
Tor Project and The Darknet
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The Darknet
 
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
 
Newsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_DecNewsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_Dec
 
Security News Bytes Null Dec Meet Bangalore
Security News Bytes Null Dec Meet BangaloreSecurity News Bytes Null Dec Meet Bangalore
Security News Bytes Null Dec Meet Bangalore
 
Security News Bytes (Aug Sept 2017)
Security News Bytes (Aug Sept 2017)Security News Bytes (Aug Sept 2017)
Security News Bytes (Aug Sept 2017)
 
TOR Packet Analysis - Locating Identifying Markers
TOR Packet Analysis - Locating Identifying MarkersTOR Packet Analysis - Locating Identifying Markers
TOR Packet Analysis - Locating Identifying Markers
 
Cellcrypt - An Introduction to Secure Mobile Communications
Cellcrypt - An Introduction to Secure Mobile CommunicationsCellcrypt - An Introduction to Secure Mobile Communications
Cellcrypt - An Introduction to Secure Mobile Communications
 
TOR NETWORK
TOR NETWORKTOR NETWORK
TOR NETWORK
 
Hipaa violations-infographic-one-page (2)
Hipaa violations-infographic-one-page (2)Hipaa violations-infographic-one-page (2)
Hipaa violations-infographic-one-page (2)
 
Developing secure mobile apps by Alexandru Catariov Endava
Developing secure mobile apps by Alexandru Catariov EndavaDeveloping secure mobile apps by Alexandru Catariov Endava
Developing secure mobile apps by Alexandru Catariov Endava
 
Why hackers love public Wi-fi
Why hackers love public Wi-fiWhy hackers love public Wi-fi
Why hackers love public Wi-fi
 
Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion Router
 
Cyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeCyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber Crime
 
Phox mobile texting service
Phox mobile texting servicePhox mobile texting service
Phox mobile texting service
 
Phone Hacking: A lucrative, but largely hidden history
Phone Hacking: A lucrative, but largely hidden historyPhone Hacking: A lucrative, but largely hidden history
Phone Hacking: A lucrative, but largely hidden history
 

Andere mochten auch

En invest cw_platform_11_extend
En invest cw_platform_11_extendEn invest cw_platform_11_extend
En invest cw_platform_11_extendOleg Pravdin
 
ComfortWay_Presentation
ComfortWay_PresentationComfortWay_Presentation
ComfortWay_PresentationOleg Pravdin
 
ComfortWay Pitchdeck
ComfortWay PitchdeckComfortWay Pitchdeck
ComfortWay PitchdeckOleg Pravdin
 
Remote SIM Provisioning - MVNOs World Congress – April 2016
Remote SIM Provisioning - MVNOs World Congress – April 2016Remote SIM Provisioning - MVNOs World Congress – April 2016
Remote SIM Provisioning - MVNOs World Congress – April 2016The GSMA
 
ComfortWay partners - resellers
ComfortWay partners - resellersComfortWay partners - resellers
ComfortWay partners - resellersAlexey Kalachnikov
 
Programmable SIM cards, SoftSIMs and eSIMs
Programmable SIM cards, SoftSIMs and eSIMsProgrammable SIM cards, SoftSIMs and eSIMs
Programmable SIM cards, SoftSIMs and eSIMsGerry O'Prey
 

Andere mochten auch (9)

En invest cw_platform_11_extend
En invest cw_platform_11_extendEn invest cw_platform_11_extend
En invest cw_platform_11_extend
 
ComfortWay_Presentation
ComfortWay_PresentationComfortWay_Presentation
ComfortWay_Presentation
 
ComfortWay Pitchdeck
ComfortWay PitchdeckComfortWay Pitchdeck
ComfortWay Pitchdeck
 
Remote SIM Provisioning - MVNOs World Congress – April 2016
Remote SIM Provisioning - MVNOs World Congress – April 2016Remote SIM Provisioning - MVNOs World Congress – April 2016
Remote SIM Provisioning - MVNOs World Congress – April 2016
 
ComfortWay partners - resellers
ComfortWay partners - resellersComfortWay partners - resellers
ComfortWay partners - resellers
 
Programmable SIM cards, SoftSIMs and eSIMs
Programmable SIM cards, SoftSIMs and eSIMsProgrammable SIM cards, SoftSIMs and eSIMs
Programmable SIM cards, SoftSIMs and eSIMs
 
Cloud sim report
Cloud sim reportCloud sim report
Cloud sim report
 
eSIM - "simlos" in die Zukunft?
eSIM - "simlos" in die Zukunft?eSIM - "simlos" in die Zukunft?
eSIM - "simlos" in die Zukunft?
 
Cellnetrix Products
Cellnetrix ProductsCellnetrix Products
Cellnetrix Products
 

EN_Corporates_Security

  • 1. Travel Solution: 1. High-Quality Mobile Internet at home and in 100+ countries at local rates ($10 / GB) 2. Int’l calls and text messages from $0.02 3. Free Mobile Internet after booking a hotel or a ticket at popular travel booking companies 4. External battery (2400 – 12000 mAh) to charge mobile devices during a trip. 5 Security-based device for corporates: Security Platform: 1. Open-source Linux-based firmware 2. Built-in VPN to provide secure access to corporate network 3. Built-in hardware authorization 4. Local encrypted data storage 5. Device management system for remote control, configuration and blocking 6. Restricted access to prohibited websites.