Docstoc
EXCLUSIVE OFFER FOR DOCSTOC USERS
Try the all-new QuickBooks Online for FREE.  No credit card required.

About the company - PowerPoint

Document Sample
About the company - PowerPoint Powered By Docstoc
					I-TEL
          About the company

    I-Tel Holding (Pty) Ltd was founded in 2008. Its main area of focus being next
    generation smart phones and the security 0f data. Currently I-Tel through its partnerships
    has broadened its product offering to include the distribution and management of
    Military Grade Encryption Systems. I-Tel has the highest priority to extend the
    communication security to each company, nowadays more sensitive to the issue of
    security as a strategic plus.

     •   Security
     •   Platforms

•   Licensed by the Israeli Ministry of Defense
                    I-Tel - Secure calls

I-Tel Holdings (Pty) Ltd through its partnerships has encryption software solutions to make
free secure calls using one’s own mobile phone, within a corporate network, adopting the
Secure Software VoIP Security Suite.
•These solutions do not change the normal use of mobile phones: They can be activated and
hidden in the background, or even turned off and started when needed.
•One can continue to use their mobile phone for traditional phone calls without any change.

       •   A “Secure call” can only be made between two users that have licensed
                  secure call solution on there phones, mobiles and PCs
                             Secure calls

The very use of the secure call solution “Secure" calls, was designed:

•Not to change the experience of normal usage, in order to make easy to access an advanced
technology through a very user -friendly interface.

•The quality of   secure calls is equal to the normal calls one.

                                   it hides a highly sophisticated operating technology,
•Behind an interface so simple to use,
based on symmetric encryption AES, also used in military filed and that makes the software
impenetrable
How a secure call is made
            Secure your Business

      Nowadays, also telephone operators feel the need to provide an encrypted and inviolable
                                    communication channel.

I-Tel is now making this possible through the launch of a service for mobile voice & data encryption.

Encrypted voice and data has obvious potential for: Political Parties, Personnel, Businesses and the
following below

•Government agencies
•Law enforcement
•Financial institutions
•International business

I-Tel through Secure Software VoIP Security Suite offers personnel businesses the opportunity to secure
and encrypt there voice and data communications with in there environment without the risk of been
intercepted by others:
Secure users
Man in the middle Attack(MITM)


In cryptography, the man-in-the-middle attack (often abbreviated MITM), bucket-brigade attack, or
sometimes Janus attack, is a form of active eavesdropping in which the attacker makes independent
connections with the victims and relays messages between them, making them believe that they are talking
directly to each other over a private connection, when in fact the entire conversation is controlled by the
attacker.

The attacker must be able to:

•intercept all messages going between the two victims
•inject new ones, (insert himself as a man-in-the-middle).

A man-in-the-middle attack can succeed only when:

•the attacker can impersonate each endpoint to the satisfaction of   the other—it is an attack on mutual
authentication
                   Types of Encryption


This solution has Multi Layered Encryption

•Asymmetric Encryption    - Elliptic Curve 384 Bits (RSA 7680 Bits Equivalent)

•Symmetric Encryption    - AES 256 Bits

•Key Exchange -   Diffie Hellman 4096 Bit

•Man in the middle prevention
           Symmetric & Asymmetric
                Encryption
Symmetric encryption

•   The same key is used to encrypt data and to decrypt it.

Asymmetric encryption

Different keys are used to for encryption and for decryption.

•   A public key (can be known to everyone) is used to encrypt data.
•   A private key (known only to the intended recipient of the message) is used to decrypt
    it.
                      Secured Lines

Thanks to the encryption on each mobile device or fixed phone, there is no weak point

• Along   the communication chain across all IP networks crossed by every single conversation.

Secure Software VoIP Security Suite Allows the user to keep all value-added telephone services
such as:
• Voicemail
•Conference calls
•Virtual Private Network
And more with no compromise in a safe and protected way.
     The world's first fixed-mobile
    convergence encrypting solution

         Secure Software VoIP Security Suite and Virtual Private Networks

                                               the confidentiality of enterprise
• This is the most complete solution for managing
communications and protection from fraud and intrusion attempts in telephone
infrastructures.

•It is the union of Secure Software VoIP Security Suite.
and Private Server
            Enterprise communication
            security: Enterprise VoIP
                  Security Suite
Secure Software VoIP Security Suite is a business solution offered by I-Tel. It is the world's
first fixed-and-mobile phone solution that allows users to communicate with privacy and
confidentiality along the same network.

It’s easy to imagine the kind of damage that could result to a company from the
misappropriation of sensitive data such as:
•Corporate patents
•New products launches
•Private negotiation, Marketing strategies
•Confidential information
From this perspective, protecting the enterprise communications via phones becomes a primary
need, a fundamental right the preservation of which is absolutely vital.
     Company with VoIP PBX

If company already has a VoIP PBX, there is no need to replace it. Simply adopt
• Secure Software VoIP Security Suite
•And use Private Server

To allow everyone to make secure, encrypted calls directly from their desktop to any landline
and mobile phone around the world.

The system strengthens communications security by furnishing confidentiality beyond the
company network.
Company with VoIP PBX
        Company without VoIP
                PBX
If a company does not have a VoIP PBX, they can still use:
•Private Server.

It is possible to make secure calls to all landline phones and to external cell phones that have:
•PrivateGSM installed.

Optionally, it can be connected with an other PBX or with the PSTN Landline.
Company without VoIP PBX
                Cost implications
• The Secure Call System does not use any known VOIP protocol,          but a
proprietary protocol which is encrypted, many networks will not be
able to identify and block it or throttle it therefore, a standard Internet
connection is all that is required, and there aren’t extra charges for VOIP data
from the mobile network Operator.

•When using skype , one pays 4 times the amount of a normal call because of the tariffs on
bandwidth currently introduced by mobile network providers to mitigate against the use of
VoiP. The bandwidth rate is now R25 per megabyte tariff from R 2 per megabyte. With our
product one can make a VoiP call at a normal data bundle rate therefore.
                         Hidden Costs

•There are no hidden extra costs with Secure call Solutions, just the
normal cost of data, and we recommend to our clients to buy data bundles.

•Your    phone will need internet connection.

Internet connections for mobile phone are as follows:

•Wifi,   GPRS, Edge, HSDPA 2.5G 3G 3.5G and Satellite
         Supported Devices

•Nokia 5230,Nokia 5700, Nokia 5800, Nokia 6110, Nokia 6210, Nokia 6220, Nokia
6290, Nokia 6120c, Nokia E51, Nokia E52, Nokia E63, Nokia E66, Nokia E71, Nokia
E75, Nokia E90, Nokia N76, Nokia N78, Nokia N79, Nokia N81, Nokia N82, Nokia
N85, Nokia N95, Nokia N95-8GB, Nokia N97

•   PC/ Laptops running Windows XP/Windows Vista/Windows 7

•iPhone

•Android
                              Summary

I-Tel is very familiar with the business environment, and therefore aware of the
great value of security and confidentiality when it comes to the subject of information.

Speaking of Enterprise Security, the first things that comes to one’s mind are words such as:
 Firewall" and "antivirus",
•The typical belief is that the IT department will be able to effectively deal with all the aspects
concerning safety in the information exchange.
• Mobile phone calls are subject to the same risk of wiretapping of e-mails, and therefore
require appropriate protection through specific, professional devices.

This facilitated a need for an Encryption Solution that will protect both voice and data on a
telecommunications platform.
           Contact Details

           Jack Kardolus, jack@itelhome.com 0711718204
       Bongani Letshabo bongani@itelhome.com 0832129196
                   Technical tech@itelhome.com

                        www.itelhome.com
I-Tel Holdings (Pty) Ltd. Tel +27 (0) 11 2349449 Fax +27 (0) 86 6696766
       325 Rivonia Boulevard, Rivonia, Sandton, South Africa

				
DOCUMENT INFO
Shared By:
Categories:
Tags:
Stats:
views:6
posted:9/13/2011
language:English
pages:22