About the company
I-Tel Holding (Pty) Ltd was founded in 2008. Its main area of focus being next
generation smart phones and the security 0f data. Currently I-Tel through its partnerships
has broadened its product offering to include the distribution and management of
Military Grade Encryption Systems. I-Tel has the highest priority to extend the
communication security to each company, nowadays more sensitive to the issue of
security as a strategic plus.
• Licensed by the Israeli Ministry of Defense
I-Tel - Secure calls
I-Tel Holdings (Pty) Ltd through its partnerships has encryption software solutions to make
free secure calls using one’s own mobile phone, within a corporate network, adopting the
Secure Software VoIP Security Suite.
•These solutions do not change the normal use of mobile phones: They can be activated and
hidden in the background, or even turned off and started when needed.
•One can continue to use their mobile phone for traditional phone calls without any change.
• A “Secure call” can only be made between two users that have licensed
secure call solution on there phones, mobiles and PCs
The very use of the secure call solution “Secure" calls, was designed:
•Not to change the experience of normal usage, in order to make easy to access an advanced
technology through a very user -friendly interface.
•The quality of secure calls is equal to the normal calls one.
it hides a highly sophisticated operating technology,
•Behind an interface so simple to use,
based on symmetric encryption AES, also used in military filed and that makes the software
How a secure call is made
Secure your Business
Nowadays, also telephone operators feel the need to provide an encrypted and inviolable
I-Tel is now making this possible through the launch of a service for mobile voice & data encryption.
Encrypted voice and data has obvious potential for: Political Parties, Personnel, Businesses and the
I-Tel through Secure Software VoIP Security Suite offers personnel businesses the opportunity to secure
and encrypt there voice and data communications with in there environment without the risk of been
intercepted by others:
Man in the middle Attack(MITM)
In cryptography, the man-in-the-middle attack (often abbreviated MITM), bucket-brigade attack, or
sometimes Janus attack, is a form of active eavesdropping in which the attacker makes independent
connections with the victims and relays messages between them, making them believe that they are talking
directly to each other over a private connection, when in fact the entire conversation is controlled by the
The attacker must be able to:
•intercept all messages going between the two victims
•inject new ones, (insert himself as a man-in-the-middle).
A man-in-the-middle attack can succeed only when:
•the attacker can impersonate each endpoint to the satisfaction of the other—it is an attack on mutual
Types of Encryption
This solution has Multi Layered Encryption
•Asymmetric Encryption - Elliptic Curve 384 Bits (RSA 7680 Bits Equivalent)
•Symmetric Encryption - AES 256 Bits
•Key Exchange - Diffie Hellman 4096 Bit
•Man in the middle prevention
Symmetric & Asymmetric
• The same key is used to encrypt data and to decrypt it.
Different keys are used to for encryption and for decryption.
• A public key (can be known to everyone) is used to encrypt data.
• A private key (known only to the intended recipient of the message) is used to decrypt
Thanks to the encryption on each mobile device or fixed phone, there is no weak point
• Along the communication chain across all IP networks crossed by every single conversation.
Secure Software VoIP Security Suite Allows the user to keep all value-added telephone services
•Virtual Private Network
And more with no compromise in a safe and protected way.
The world's first fixed-mobile
convergence encrypting solution
Secure Software VoIP Security Suite and Virtual Private Networks
the confidentiality of enterprise
• This is the most complete solution for managing
communications and protection from fraud and intrusion attempts in telephone
•It is the union of Secure Software VoIP Security Suite.
and Private Server
security: Enterprise VoIP
Secure Software VoIP Security Suite is a business solution offered by I-Tel. It is the world's
first fixed-and-mobile phone solution that allows users to communicate with privacy and
confidentiality along the same network.
It’s easy to imagine the kind of damage that could result to a company from the
misappropriation of sensitive data such as:
•New products launches
•Private negotiation, Marketing strategies
From this perspective, protecting the enterprise communications via phones becomes a primary
need, a fundamental right the preservation of which is absolutely vital.
Company with VoIP PBX
If company already has a VoIP PBX, there is no need to replace it. Simply adopt
• Secure Software VoIP Security Suite
•And use Private Server
To allow everyone to make secure, encrypted calls directly from their desktop to any landline
and mobile phone around the world.
The system strengthens communications security by furnishing confidentiality beyond the
Company with VoIP PBX
Company without VoIP
If a company does not have a VoIP PBX, they can still use:
It is possible to make secure calls to all landline phones and to external cell phones that have:
Optionally, it can be connected with an other PBX or with the PSTN Landline.
Company without VoIP PBX
• The Secure Call System does not use any known VOIP protocol, but a
proprietary protocol which is encrypted, many networks will not be
able to identify and block it or throttle it therefore, a standard Internet
connection is all that is required, and there aren’t extra charges for VOIP data
from the mobile network Operator.
•When using skype , one pays 4 times the amount of a normal call because of the tariffs on
bandwidth currently introduced by mobile network providers to mitigate against the use of
VoiP. The bandwidth rate is now R25 per megabyte tariff from R 2 per megabyte. With our
product one can make a VoiP call at a normal data bundle rate therefore.
•There are no hidden extra costs with Secure call Solutions, just the
normal cost of data, and we recommend to our clients to buy data bundles.
•Your phone will need internet connection.
Internet connections for mobile phone are as follows:
•Wifi, GPRS, Edge, HSDPA 2.5G 3G 3.5G and Satellite
•Nokia 5230,Nokia 5700, Nokia 5800, Nokia 6110, Nokia 6210, Nokia 6220, Nokia
6290, Nokia 6120c, Nokia E51, Nokia E52, Nokia E63, Nokia E66, Nokia E71, Nokia
E75, Nokia E90, Nokia N76, Nokia N78, Nokia N79, Nokia N81, Nokia N82, Nokia
N85, Nokia N95, Nokia N95-8GB, Nokia N97
• PC/ Laptops running Windows XP/Windows Vista/Windows 7
I-Tel is very familiar with the business environment, and therefore aware of the
great value of security and confidentiality when it comes to the subject of information.
Speaking of Enterprise Security, the first things that comes to one’s mind are words such as:
Firewall" and "antivirus",
•The typical belief is that the IT department will be able to effectively deal with all the aspects
concerning safety in the information exchange.
• Mobile phone calls are subject to the same risk of wiretapping of e-mails, and therefore
require appropriate protection through specific, professional devices.
This facilitated a need for an Encryption Solution that will protect both voice and data on a
Jack Kardolus, firstname.lastname@example.org 0711718204
Bongani Letshabo email@example.com 0832129196
I-Tel Holdings (Pty) Ltd. Tel +27 (0) 11 2349449 Fax +27 (0) 86 6696766
325 Rivonia Boulevard, Rivonia, Sandton, South Africa