Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

Cellcrypt Launches Secure Conference Calling for Mobile Devices

Secure Conference Calling for Mobile Devices – New service delivers encrypted calls and authenticates participants

Secure Conference Calling for Mobile Devices – New service delivers encrypted calls and authenticates participants

Cellcrypt, a provider of secure mobile voice calling solutions, today announced a conference calling service that provides both device authentication and voice call encryption to participants using popular mobile devices including BlackBerry and Nokia.Secure Conference Calling Solution

Companies often discuss confidential and highly sensitive information on calls such as sales, supplier and executive management meetings, intellectual property discussions, high value business deal talks, crisis management calls or even discussions concerning disaster scenarios and national security.

Traditional conference calling services are open to abuse through unauthorized access. Conference calls security is often poorly managed with dial-in details and PINs rarely changing. A commonly reported scenario is for ex-employees to continue to access conference from their former employer and passing details to competitors.

With many employees travelling or working remotely, they often access conference calls using cell phones, which are increasingly at risk of interception. The Cellcrypt Secure Conference Service both authenticates the participant’s cell phone and encrypts conversations end-to-end between each participant and the conference bridge.

“Conference calls by their very nature typically contain some of the most sensitive and confidential information an organization has,” said Simon Bransfield-Garth, CEO at Cellcrypt. “These calls are highly desirable to attackers, who know just how valuable the information is. As the risk of cellular interception has increased so has the vulnerability of mobile executives accessing conference calls from the mobile phones. Organizations should urgently review their communications practices and act to protect their mission-critical conference calls.”

To utilize the secure conference calling solution participants select a bridge number from their Cellcrypt Mobile enabled Blackberry or Nokia device to enter the call. Office phones can also securely participate in conference calls when connected via Cellcrypt’s Enterprise Gateway solution.

Organizations can manage conference calls using a web console to define all users that may access the conferencing service, create bridge numbers, define policies such as user white lists and additional access PINs. Optionally, a bridge may allow access from selected public payphone using Caller ID and PINs for authentication in geographies where the threat of interception is regarded as controlled, though the calls from public telephones are not encrypted.

The service builds on Cellcrypt’s existing solutions that provide encrypted voice calls on cell phones, such as BlackBerry and Nokia smartphones, delivering government-grade security. Utilizing the IP data channel it supports all major wireless networks, Wi-Fi and satellite.

Advertisement. Scroll to continue reading.
Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Artificial Intelligence

ChatGPT is increasingly integrated into cybersecurity products and services as the industry is testing its capabilities and limitations.

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Mobile & Wireless

Samsung smartphone users warned about CVE-2023-21492, an ASLR bypass vulnerability exploited in the wild, likely by a spyware vendor.