Right from the hardware to the software, everything is deeply integrated into one robust and secure whole, giving you the privacy you deserve. KATIM® is built to preserve your data, your intellectual property, and your reputation from compromise.
Secure boot with protected bootloader and validation of device integrity during runtime
At each boot, KATIM® Phone checks the entire software stack via its bootloader to detect modifications. If this validation fails, boot up is aborted. KATIM® Phone continues to monitor the integrity of its environment. If an attacker finds a way to infect the phone, the integrity monitor detects it, resets and deactivates the phone.
DEVICE ACCESS MANAGEMENT
Two-factor user authentication with secure fingerprint verification
Increased security through a mechanism that double checks that your identity is legitimate. KATIM® Phone can be set to wipe all data in case someone tries to authenticate with wrong credentials.
ENCRYPTED DATA & SECURE STORAGE FOR KEYS
Data at rest and in transit encrypted, protecting against eavesdropping, authorized access and off-device decryption
KATIM® Phone applies strong cryptographic algorithms that are tested and vetted. The crypto keys as well as user credentials are stored in a secured environment which prevents extracting them from the device, and protects against eavesdropping and manipulation of sensitive information.
PKI-BASED KEY MANAGEMENT AT ALL LEVELS
Device boot-up, software capabilities and policies managed by certificate based authorization trust roots.
Keys present on the device validating all aspects of code and policy integrity all the way from early boot up to the launching of individual applications. MDM managed platform certificates and crypto card based PKI identity credentials available for securing communication reliability. All system keys and infrastructure keys can be generated, maintained and controlled by the customer.
DEVICE & USER SPECIFIC TRUST ROOTS ON CRYPTO CARD
A secure element that is cryptographically bound to the platform and its boot-up.
Trust roots used for device and user authentication, attestation and device-end decryption of provisioned data. The user can securely lock the device by removing the crypto card as the device and the secure element does not work in separation.
Management. Control. Security.
Integrated security goes a step further with KATIM® Command Centre, the mobile device management system tailored for KATIM®™ phones and integrated into its OS.
Scalable and customizable to your organization’s specific security needs, KATIM® Command Centre lets you remotely control and monitor, perform attestations, automate and enforce security policies on all KATIM® devices.
Monitor, provision, configure, audit, de-activate, wipe, lock, white/blacklist applications, apply functionality restrictions or enrollment, generate reports of device base, quick dashboard view of device status.
No external service providers or cloud services - all can be installed onsite and without backdoor connections to remote systems.
Service and support
Installation, integration, training, support.
As an optional additional service, DarkMatter can operate KATIM® Command Centre on the customer’s behalf.