Hoox – ultra secure smartphone
Hoox, the first integrally secured European smartphone.
The recent examples of listenings of the NSA still showed it: to protect your digital capital, prevention is better than cure. This general awakening clarifies the responsibility for the companies for the protection of their significant data. However it is often the use and the experiment user which are privileged.
Atos, by its Bull technologies, proposes a doubly secure smartphone (Software and Hardware) based on OS Android completely reconfigured.
Orange Cyberdefense through its strategic partnership will be selling hoox to address jointly the secure mobile terminal communications market.
Easy to use and ergonomic, it guarantees the confidentiality of the calls, SMS and e-mails which are encrypted by default.
Its inviolability rests on a from beginning to end recognized security.
French product, hoox with Atos and its 3000 experts security can give again you confidence in the digital one.
Hoox : native mobile security
The hoox range phones are designed to provide a very high level of security. Controlled communication ports, strong authentication, hardware encryption: the whole smartphone was created to protect your privacy.
Security experts know it : it is useless to lock your front door if your windows stay open…
This is why Bull has empowered its hoox phones with highly efficient encryption technologies and anti-intrusion protection. This protects not only each link, but also the entire security chain.
Hardware, operating system and the various software layers are designed to deliver a high level of security.
- Controlled applications
- Hardened operating system
- Secure access and boot
- Certified components
- Encrypted communications
- Encrypted data on the phone
Phone calls, SMS, emails and all other data travel encrypted, which ensures the safety of information exchange.
On your phone, stored data, applications and operating system are systematically protected in terms of confidentiality and integrity.
A hoox secure phone verifies the identity of its user via strong authentication: mutual cryptographic authentication, security code – or biometrics for the hoox m2.
To protect your phone against malwares, all accesses to the terminal are verified and the communication ports are strictly controlled.
The result: a very high degree of privacy for data exchange and for the information stored on the phone.
The hoox range offers flawless conception and governance. The hoox secure phones are designed by Bull and its ecosystem of French partners. Once in your hands, hoox allows you to fully control your security. Thus, no information leaves your organization without your consent.
Control your information flow
The hoox range is ‘all inclusive’. It is delivered with fully equipped administrative and communication features, along with services for training, installation and implementation. Everything can be up-and-running very quickly.
The hoox secure phones are non-intrusive. They easily integrate into your existing information system: email, directory and telephone exchange. You are free to keep your existing telecom operator. With the hoox range, you control the information assets of your business.
Hoox phones encrypt voice calls and SMS communications from end-to-end.
A secure communication channel allows the exchange of emails and data in a secured manner, respecting your security policy for Internet access.
Turnkey central administration
Daily monitoring is easy, secured and centralized. You can manage the phones remotely using an MDM (mobile device management) function delivered with the solution.
The administration of your hoox phones is based on a strict management of rights, permissions and applications. All data flows are controlled via your own organization.
To pass to hoox, two options:
- Hoox as a service: the solution lodged in Atos datacenters, operator of confidence
- Hoox on-premises: the solution installed in your SI and completely controlled by your security services.
Hoox your trusted smartphone. Work and exchange anywhere, in complete safety:
- Your sensitive information exchanges are preserved
- Your Data remains confidential
- A turnkey solution
- A quick return on investment, renewed confidence in mobility.