DEC Secure Subscription for Generic Android - Secure Zones (1), Secure Call/SMS/MMS, Secure VPN (Limited), Enterprise App Library (Limited)
Do you have your own Android device?
Subscribe your device with DEC Secure and download the app now!
The average smartphone is not secure at all. DEC Secure offers complete peace of mind when it comes to the privacy and safety of the information on your mobile device.
DEC Secure delivers enhanced functionality and best-in-class security enhancements to your own Android device including Secure Calling, Always-On VPNs, Multi-Container Functionality, and securely contained approved apps from Google.
Complete application whitelisting to stop the downloading, sideloading, or deployment of inappropriate and spying apps.
Approved Applications Only
Our concierge team has independently vetted each app in the library to validate security and privacy criteria.
Your Data Security is Our Highest Priority.
Now how much of your data are you willing to be responsible for?
DEC Secure brings Bittium’s best-in-class mobile security to the application layer of all generic Android and Bittium Tough Mobile™ smartphone devices.
Hardens your Device
Locks down functions of the device that will otherwise leave you exposed and vulnerable to hacking or data theft.
Protects your Privacy
Chat with confidence as communication between devices will not be exposed outside our private network.
Secures your Connection
Data coming to and leaving your device is invisible to the outside world thanks to our always on IPSec VPN.
Segments your Data
Personal and private communications and data are securely segmented without the need for multiple devices.
Blocks Unapproved Applications
Only whitelisted applications can be installed, blocking spying and tracking apps from being downloaded or activated.
DEC Secure Call delivers everything you expect in a secure communications application including always-on AES-256 encryption; one-on-one and group voice calls, video calls, and messaging. These are the basics.
Your communications are 100% private, we cannot hear your calls or read your messages under any circumstances, and nothing is stored on our servers.
Secure Call will not function if a Secure VPN connection cannot be established, ensuring your communications will never be sent exposed.
Installation of Secure Call within a dedicated container is required, shielding data and app use from inappropriate spying.
Independent Contact List
Dedicated Secure Call contact list is inaccessible from outside the application, keeping your Secure Call contacts private and discrete.
Remote Privacy Protection
Message auto-deletion, burn-on-read, and the prevention of screen captures prevents risk of inappropriate sharing.
Secure Call Routing
Calls can be routed through Secure Call server for additional IP and location anonymity and privacy protections.
Superior Audio and Video
Using Opus codec, audio and video stream quality adapts to available bandwidth, providing a consistent premium experience.
Conference & Group Calls
Fully encrypted multi-voice and video calls of up to 10 participants, enables you to use a single platform for all your secure communications.
Send and receive picture, audio, video, and other files in line with messages to share your most private information securely and efficiently.
Zero Access to Data
No Information regarding communications history is stored on the DEC servers and there is no way to access or intercept the messages in transit.
DEC Secure Multicontainer Feature
Sensitive Data Secured
Multi-container functionality known as “Secure Zones” enables the use of a single device to manage personal and private data separately and securely.
Access workspaces from the home screen and switch between Secure Zones by swiping left or right.
Each Secure Zone has its own security policies for data isolation including independent PIN code protections.
Prevents Data Leakage
Application data and network traffic from the main space and each Secure Zone is securely isolated from each other.
Each Secure Zone has a dedicated and secure VPN connection that all applications within the Secure Zone use.
Multiple Secure Zones
Tough Mobile™ devices can add up to four Secure Zones while generic Androids are limited to a single Secure Zone.
Secure Zones running in parallel – enables applications from different Secure Zones to be active simultaneously.
Keeping you Securely and Privately Connected
We don’t just protect your data on your smartphone but ensure your web browsing, transactions, and communications are protected too.
Automatically connects with automated re-authentication, never allowing you to send or receive data unprotected.
Cannot be accidentally or intentionally bypassed, leaving you worry free about your online privacy and security.
Prevents all unauthenticated and unencrypted connections, eliminating the chance of inappropriate exposure.
Multi-Factor authentication, NSA Suite B – Level encryption, and certified Crypto VPN provides the most secure connection.
Connected to AT&T’s global fibre network, DEC customers have high-speed low latency network connectivity in over 240 countries.
A sophisticated Network Security and Threat Detection & Response program thwart the efforts of cyber-attackers.
Remote Management of your Mobile Device
DEC Secure provides centralized, remote management of your generic Android or Bittium Tough Mobile™ security features.
Device Security Policies
Admin management of over 100 different individualized Device Policy settings to mitigate attack vectors you didn’t know existed.
Remote Lock & Wipe
Remotely lock your device or send a command that deletes all data instantly, eliminating the risk of exposure due to a loss or theft.
Retrieve Device Audit Log
Access to device event log analytics to enable efficient incident response and proactive incident avoidance.
Continual affirmation that the device is exactly as it was when it left the factory, any modifications will automatically lock the device.
OTA Firmware Updates
Automatic fetching and installation of updates to firmware, keeping the device up-to-date and in compliance with security policies.