kaymera_secure_phoneIf you are one who cares about connectivity’s security, then this might pique your interest. Kaymera Technologies is a security services company based in Herzliya, Israel, and has recently created and launched an all-in-one, holistic mobile cyber defense solution.

According to Avi Rosen, Kaymera CEO and co-founder, its ‘designed to defend against all types of advanced mobile cyber-attacks, hostile takeovers and applications misuse, and served in a usable and seamless form factor to ensure the perfect balance between security and usability and enable end user’s standard smartphone experience with maximum functionality,”

Currently, Samsung Galaxy S5 or Nexus 5 are the two models of smartphones which could be ‘flashes’ by Kaymera to supersede its own version of Android. There are already plans in line that it would support the LG-G3 in the near future. The Kaymera 360, as the solution is named, comes with four layers of security: encryption, protection, prevention and detection.

“One part of our secret sauce is that we provide military-grade security, while providing an experience as simple as any commercial device,” COO, Oded Zehavi says.

It’s Kaymera intention to use existing branded phones rather than to commission a brand new device, knowing of course that the users usually want a brand they are more familiar with.

With voice encryption users of the solution can only talk securely to other Kaymera users. A program set in the solution also enables users to dial into a secure portal, which then carries an unencrypted voice call and can only be retrieved by the targeted receiver.

Voice calls work via 3G and require 5-10 KBs with a minimal bandwidth for the secure VoIP session. The software is adaptive with its CODEC which can also work in low bandwidth situation. The system will check the network bandwidth whenever you trigger a call, notifying the user if a secure call can be initiated. If not it will fall back to an unsecure mode over GSM. There is also integrated encrypted messaging: immediate messaging, secure attachment-sharing and time-limited, self-destructing messages. Unlike Blackphone, the VPN is always on.

The security uses a PKI cryptosystem stored in a hardware-protected keystore. The robust encryption framework leverages 2048-bit RSA and a cryptosystem with AES 256-bit symmetric session keys.

And if the bottom line is reach, like if the user is under physically threat, user can type in a distress PIN which will lock the phone and summon

If all else fails and the phone user is physically attacked, he or she can type in a distress PIN that will lock the phone and summon necessary help.

Filed in Concepts. Read more about , , and . Source: kaymera