image001.1.jpg

About Digital Defence

Digital Defence is an Independent Software Vendor (ISV) that develops security software to protect the physical assets of a mobile computer.

 

Digital Defence has developed (over the past 9 years) various encryption solutions purely focused on the windows operating system. Our solutions are built to protect stored data on mobile devices such as hand held devices, PC’s and removable media.

  • Secure Mobile. An End-point data protection solution for the mobile device environment. Encrypt persistent data, Authentication device access, and control access to the features of the mobile device. Available for all Windows Mobile touch-screen Operating Systems.
  • Secure PC. An End-point encryption solution for the Desktop/Laptop environment. Available for Operating Systems Windows XP and below.
  • nCode. An End-point encryption solution for removable media such as USB drives and CD/DVD. Software runs on the Desktop/Laptop environment in Windows XP or below.

   

Digital Defence encryption solutions have been architected to operate invisible to the user, hence providing an encryption capability that can be applied to any industry. All solutions are developed at driver and application levels to ensure the fastest possible data access and hence no loss to workforce productivity.

 

Digital Defence solutions are compliant with all legal requirements for the security of data including:

  • EU Data Protection Directive 1995 (EC)
  • Data Protection Act 1998 (UK)
  • Health Insurance Portability & Accountability Act 1996 (USA)
  • Gramm-Leach-Bliley Act (Financial Services Modernization Act) 1999 (USA)
  • Sarbanes-Oxley Act 2002 (USA)

 

About Secure Mobile

Digital Defence’s Secure Mobile is an enforceable data security and encryption solution for the mobile Enterprise.

 

Configured to suit your needs:

This centrally-managed software integrates within your existing security policies to protect information wherever it is held using a combination of encryption and password authentication.

 

Simple to configure, deploy, support and use:

Created with the core requirements of the enterprise IT function in mind, the software is easy to install, use and maintain – requiring no training or input from the end user. Secure Mobile is centrally-defined and managed by IT. Deploy remotely via a number of installation options and supported remotely with or without network connectivity. The interface has been designed for simplicity, minimising the need for help desk support.

 

Dual authentication for extra security:

Using a dual approach of device authentication and encryption, Secure Mobile protects your sensitive data when it’s at its most vulnerable.

 

Access Control for device features:

Protect the data on the device by restricting the user to only have access to specific applications. Specify which applications will have access to encrypted data. Restrict the types of communications ports that user can connect with, such as Bluetooth, USB, Wi-Fi, and Cellular Data (GPRS). Specific approved Wi-Fi connections, approved GPRS connections, and approved USB device types.

 

Centrally manage feature control:

Configure your security policies centrally – change authentication policy, login settings or update access control policies.

 

Synchronise securely with the PC:

Enables seamless data transfer between the protected mobile device and the user’s protected PC.

 

Effective remote recovery of password and data:

Passwords can be recovered remotely and rapidly without being connected electronically.

 

Encrypt removable media:

Safeguard data on Compact Flash and Secure Digital memory cards through encryption of all data contained in the storage.

 

Demonstration Download

 

The Demonstration download is a single executable image that is to be installed on a mobile device. This installs the client-side Secure Mobile Enterprise product with a built-in Product Encryption Key (PEK) of: “DEMO-DEMO-DEMO-DEMO”

 

The Demonstration download is set to expire 30 days after installation.

 

MC70 (WM6), MC75, MC55

DigitalDefence_barcode.jpg

MSP Installation Barcodes

Manual Installation

Demonstration Instructions 

 

Industries

Government, Medical, Financial, Field Mobility, Retail

 

Application Type

Security: Encryption, Access Control

 

Main User Interface

   

 

image006.png image008.png

User Login Screen                                    Encrypting an inserted SD Card 

User Settings (via System Settings)             Manager Settings (via Settings icon) 

image010.pngimage012.png

                 Encryption Settings                                   Access Control Settings

image014.pngimage016.png

Mobile Devices

MC70, MC75, MC55

 

Contact Information

Zebra Solution Center

Email: solutioncenter@zebra.com

 

Motorola Channel Account Manager

James Pemberton

james.pemberton@motorolasolutions.com

Office Phone: +44 7887 782 141

 

Digital Defence Ltd.

Heinrich Van Der Westhuizen

heinrich@digital-defence.com

Office Phone: +44 (0)1694 521108