Description
Bittium Tough Mobile™ 2
The new standard for ultra-secure mobile communications.
Protect your data with multi-layered security integrated into the hardware and source code of the Bittium Tough Mobile 2 smartphone.
Designed and built for professionals with the highest security requirements, it comes in three different versions and with or without Google mobile apps.
For comprehensive, secure mobile communications, complement the device with Bittium Secure Suite device management and encryption software and the Bittium Secure Call app.
Advantages:
- Meets the highest government security requirements
- Trusted by organizations in over 50 countries.
- Designed and manufactured in Finland, production supervised by Bittium.
- Certified to CONFIDENTIAL with Bittium Secure Suite™
Security:
- Protects your data with multi-layered security integrated into the hardware and software of your Bittium Tough Mobile 2 smartphone.
- Tamper-proof protection to prevent data theft and hardware manipulation.
- Unrootable device firmware.
- User credentials and encryption, keys stored in the hardware security element.
- Disk encryption protected by authentication and the security design of the secure element.
- Secure boot by verifying the integrity of hardware and software.
- Dedicated, tamper-proof security element.
Privacy:
A unique hardware privacy mode allows you to use your device and protect yourself from:
- Listening to your surroundings by disconnecting the microphones from your phone
- Bluetooth eavesdropping by disabling Bluetooth
- Camera spying by disabling the device cameras
- Sensor-based espionage by reducing sensor accuracy
For professional and personal tasks
- Multi-container functionality enables the use of several isolated workspaces on the same Tough Mobile 2 device,
- Prevents data contamination between containerized apps/services,
- Leverages the sensitive data and services of several separate organizations, as each container isolates apps, data, and network traffic from all other containers,
- Isolates personal apps, data, and network traffic from work data,
- Containerized services can connect to isolated backends via container-specific VPN tunnels,
- Containerized services are protected and managed by Bittium Secure Suite.
Tough Mobile 2 and Bittium Secure Suite™ Combination
For comprehensive mobile security, complement your device with Bittium Secure Suite device management and encryption software. Secure Suite requires the installation of server software, which is either provided as a dedicated IT service or hosted by the customer.
Benefits of Bittium Secure Suite™
- Security event audit logs
- Remote device wipe
- Remote attestation
- App whitelisting support
- Bittium SafeMove® MDM support
- Bittium SafeMove® Mobile VPN for encrypted data in transit
- Strict password policy
- Multi-container functionality
Bittium Secure Call™ – an end-to-end encrypted communications app
- Designed for enterprises, governments and other professional users
- Available for Android™ and Windows platforms
- Supports deployment on commercial and private networks, independent of the public internet or cloud services
- Can be deployed and fully managed by the user’s organization
- Add Bittium Secure Suite™ to provide device security management and an additional VPN layer for double encryption for secure communications
- Includes end-to-end encrypted voice and video calls, group calls, messages with attachments (photos, voice notes, videos, contacts, voice messages), group messages and a function that destroys messages after a specified period of time - Centralized contact directory.
Hardened Android™ 11 Qualcomm® Snapdragon™ 670 chipset Global connectivity Dual SIM Embedded 3000mAh battery High-quality speakers Multi-microphone active noise cancellation 12MP autofocus rear-facing and 5MP front-facing cameras MIL-STD-810G shock and drop resistant IP67 water and dust resistant 5.2” sunlight readable full HD display Glove & wet usable capacitive touchscreen Privacy mode, emergency and push-to- talk buttons Latest commercial feature.
Mobile communications for soldiers with Bittium Tough Mobile™ 2 Tactical
The ultra-secure and rugged Bittium Tough Mobile™ 2 smartphone and its secure software solutions, together with the Bittium Tough SDR Handheld™ tactical radio and dedicated accessories, make the Bittium Tough Mobile 2 Tactical a complete solution for mobile communications for soldiers.
The Tough Mobile 2 Tactical is compatible with various battle management systems, enabling effective creation and sharing of situational awareness in tactical networks in real time. The Tough Mobile 2 smartphone offers the soldier a wider range of applications for use in tactical networks, and the smartphone’s large display provides an improved user interface compared to traditional soldier radios.
With Google Mobile Services
For full, comprehensive mobile security, complement the device with Bittium Secure Suite™ device management and encryption software and the Bittium Secure Call™ app.
Two separate operating systems
Requires Bittium Secure Suite™ device management and encryption software. Certificate at the CONFIDENTIAL level (NCSA-FI, TL III). Available for government and authorities.
source: Bittium
06.06.2024
bezpieczny telefon, wielowarstwowe zabezpieczenia, rządowe wymagania bezpieczeństwa, certyfikacja poziomu poufne, zdalne czyszczenie urządzenia, zaostrzona polityka haseł, szyfrowane połączenia głosowe, szyfrowane połączenia wideo,secure phone, multi-layered security, government security requirements, confidential level certification, remote device wipe, strict password policy, encrypted voice calls, encrypted video calls, sicheres Telefon, mehrschichtige Sicherheit, behördliche Sicherheitsanforderungen, Zertifizierung der Vertraulichkeitsebene, Remote-Löschung von Geräten, strenge Passwortrichtlinie, verschlüsselte Sprachanrufe, verschlüsselte Videoanrufe
Technical Data
Operating system | |
---|---|
Android™ 11 | |
Available with or without Google Mobile Services | |
Chipset | |
Qualcomm® Snapdragon™ 670 | |
Memory | |
4GB RAM / 64GB eMMC. MicroSD expansion slot up to 256GB | |
Display | |
5.2” Full HD sunlight readable | |
Glove & wet usable capacitive touchscreen | |
Imaging & video | |
12MP autofocus rear-facing and 5MP front-facing cameras | |
4K and Full HD video | |
Audio | |
High-quality front-facing dual speakers (109dB@5cm SPL) | |
Multi-microphone active noise cancellation | |
Physical buttons | |
Privacy mode activation | |
Emergency button (programmable, use as emergency button requires a separate application providing the functionality) | |
PTT/PTV (programmable, use as PTT/PTV button requires a separate application providing the functionality) | |
Power/wake-up | |
Volume up and down | |
LTE and bands | |
3GPP Rel 12 | |
Dual SIM dual VOLTE (DSDV) | |
IMS, VoLTE, CA | |
FDD bands | 1, 2, 3, 4, 5, 7, 8, 12, 13, 14, 17, 20, 25, 26, 28, 29, 30, 66 |
TDD bands | 38, 39, 40 (34, 41 optional) |
UMTS/HSPA bands | |
B1, B2, B4, B5, B8 | |
GSM/GPRS/EDGE bands | |
850/900/1800/1900 MHz | |
Complementary radios | |
Wi-Fi 802.11 a/b/g/n/ac (2.4 and 5Ghz) | |
BT5.0, NFC | |
*U-NII-3 Wi-Fi channels are not supported | |
For all Bittium Tough Mobile™ 2 users | |
- All data in the device is encrypted with AES-256 encryption (including the memory card, when used in adoptable storage mode) | |
- Dedicated secure element (chipset) for storing security keys and providing functionality for encryption and user authentication | |
- Backup battery allowing monitoring of the device security and tamper detection at all times, even when the main battery has ran out | |
- Android™ 11 operating system with hardened security | |
- Hardware-based Privacy Mode preventing ambient listening and spying of user/user environment | |
- Hardware tamper detection preventing data theft and device implanting attempts | |
- Secure boot, device HW and SW integrity check during boot | |
- Disabled debug interfaces preventing attacks against device security | |
- Device OS rollback prevention – not possible to use older device firmware for attacking the device | |
- Die shield sensor in secure element to protect from physical intrusion and electromagnetic signal sniffing | |
- Environmental attack protection in secure element preventing e.g. cryo/cold attacks and power glitch attacks | |
- Application permission control – users can allow only trusted applications to access device data and functionality | |
- User originated fast wipe of device data |