WannaStation security products enable organizations of all sizes to secure their network, systems, users and data with a deep level of protection that won't compromise network or system performance. WannaStation's wired and wireless solutions are deployed in small and medium organizations as well as distributed enterprise environments, government, retail point-of-sale, healthcare and service providers.
SYPHERSAFE - Secure Mobile Communication Suite (SMCS)
SYPHERSAFE SMCS is a revolutionary smartphone protection solution that uses state-of-the-art proprietary encryption technology to secure you communication within a group or an entire organization.
Featuring the proven Public Key Identity (PKID) architecture, SypherSafe provides peace-of-mind to security conscious individuals and corporations by encrypting their mobile Data-at-Rest and Data-in-Transit.
It is a true end-to-end mobile protection solution that each and every organization from corporations deploying BYOD to Government agencies wanting to create a secure communication environment should deploy as a mandatory platform.
It’s time your mobile infrastructure gets the premium protection it rightfully requires and deserves.
Powerful Functions
Secure SMS
High level encryption to protect against Man-in-the-Middle attacks
Secure Instant Messaging (IM)
Group communication security ensures that Hackers, Social Media and even Infra Providers do not have access to your chats
App Lock
Easily locks up personal apps – excellent BYOD deployment protection
Secure Files
Keeps sensitive files secured, even if the mobile device is lost or stolen
Secure Gallery
Encrypts all private pictures & videos
Password Protector
Bolts shut all your passwords, banking and accounts details
File Shredder
Military grade permanent shredding of data, videos, pictures and other digital content
Secure VOIP
Available early 2014
Key Benefits of SypherSafe:
- Runs on popular Android platform and soon iOS.
- Highly Secured with proprietary PKI cryptographic technology.
- Extremely Cost Effective to set up and use especially with our Software-as-a-Service model.
- Easily Scalable to meet all your business expansion needs.
- Fast Deployment through Server-based deployment.
- Proven Technology installed in various National Security Agencies which requires the highest level of security specifications.
The Ideal Mobile Security Architecture
SMCS provides two layers of communication security, 1st through GSM for Encrypted SMS and 2nd with Mobile Data Service (MDS) for Secure Instant Messaging (IM). At such, in areas where MDS is weak, users can still protect their communication through secure SMS services. A 3rd layer will be made available by early 2014, i.e. Secure VOIP. Once this is up, an organisation’s security infrastructure will be totally protected both inside and out. Coupled with military grade encryption of all sensitive files, pictures and videos inside the smartphones, the weakest link is all but plugged.
OUR TECHNOLOGY
Like a rare gemstone, our proprietary PKI-based technology called Public Key Identity (PKID) stands head and shoulder against the rest in terms of raw encryption power. These include:
- Elliptic Curve Cryptography (ECC) 256-bit, 320-bit key and above
- Ultra Efficient Deterministic Prime Number Generator
- Advanced Encryption Standard (AES) 256-bit key
- SHA256 and Mersenne Twister
- Diffie-Hellman Key Exchange
Our uniqueness in Key Generation and Authentication breaks the norm in the way traditional PKI encryption method works. If you are interested to know more, contact us at the details listed below.
IDA CODE (Secure QR Code Authentication Solution)
IDACODE is a revolutionary Multi-Platform Authentication Solution comprising Server, Desktop and Mobile based verification technology. Using a proven proprietary encrypted QR Code system, it can be deployed with or without internet access.
This is because IDACODE does not require connectivity to a Database Server to carry out its function. With this system, a Corporate User, University or Government Agency would be able to create encrypted codes speedily to be incorporated into the printing of protected materials that require validation upon use and eCopy of documents requiring online authentication and verification.
To read these ciphers, a user may use his smartphone or other devices with IDA installed or pre-configured to decode the secured codes.
Application Overview
Applications include authentication of:
IDA may also be incorporated into various equipment that are used for certification purposes. This will eventually be a crucial component for the effective deployment of Internet of Things (IOT), the forthcoming trillion dollar industry.
Key Benefits of IDACODE:
- Multi-Platform (Server, Desktop & Mobile) deployment with or without internet connectivity
- Highly Secured with proprietary PKI cryptographic technology
- Extremely Cost Effective to deploy
- Easily Scalable to meet all your business expansion needs
- Customizable to meet your Exact Needs
- Fast Deployment and Very Short Learning Cycle
- Proven Technology installed in various National Security Agencies which requires the highest level of security specifications
OUR TECHNOLOGY
Like a rare gemstone, our patent pending PKI-based technology called Public Key Identity (PKID) stands head and shoulder against the rest in terms of raw encryption power. These include:
- Elliptic Curve Cryptography (ECC) 256-bit, 320-bit key and above
- Ultra Efficient Deterministic Prime Number Generator
- Advanced Encryption Standard (AES) 256-bit key
- SHA256 and Mersenne Twister
- Diffie-Hellman Key Exchange
Our uniqueness in Key Generation and Authentication breaks the norm in the way traditional PKI encryption method works. If you are interested to know more, contact us at the details listed below.
SYPHERGATE
SypherGate is a Layer 3 network security appliance designed for securing Gateway-to-Gateway meshed network architectures. It addresses the security of WAN by automatically encrypting and decrypting all or selected communications.
SypherGate provides the ideal platform for enterprise secure network deployments, enabling encrypted communications and guaranteeing data privacy, integrity and authenticity.
It is very easy to deploy with its Plug-and-Play convenience and integrates seamlessly into any networked environment. Equipped with Fail-Over redundancy, it is the perfect security appliance for serious CISOs to plug the ever expanding global security threats to WAN infrastructures.
Application Overview
The SypherGate-560 high-performance network security appliance supports 3rd Generation and 2nd Generation Intel® Core™ processors in LGA1155 socket with Intel® H61/B65/Q67 Express chipset. The 1U-height rack-mountable NA-560 offers up to eight high-speed Gigabit network connections with two-group LAN bypass generation II function. The slim type industrial grade network appliance platform can hold four none-ECC DDR3 DIMM sockets with up to 8 GB memory. Additionally, it features two 2.5" SATA HDDs (or one 3.5" SATA HDD) and a CFast™ slot for storing event log.
- LGA1155 socket 3rd/2nd Generation Intel® Core™ i7/ i5/ i3 processors
- Intel® H61/ B65/ Q67 (optional)
- Supports up to 32 GB non-buffer non-ECC memory (DDR3-1333, single & dual channel)
- Supports 8 10/100/1000Mbps Ethernet ports (Intel® 82574L)
- Supports BIOS redirected to COM port
- Supports two 2.5" SATA HDD
- Supports BIOS Quick Boot
- Smart Fan for better thermal and acoustic performance
Key Benefits of SYPHERGATE:
- Flexibility for Government agencies and Corporations to Customise the Encryption Algorithms to ensure complete internal control over potential threats of pre-installed backdoor settings in the firmware
- Multiple sites connection over public infrastructure with totally protected communication
- Scalable Functionalities i.e. IPS and Firewall
- “Port Rules” base that work in any server applications and protocols
- SypherGate Console Manager for easy network administration
- Highly Secured with proprietary PKI cryptographic technology
- Fast Deployment with plug-and-play functionality
- Proven Technology installed in National Security Agencies which requires the highest level of security specifications
OUR TECHNOLOGY
Like a rare gemstone, our proprietary PKI-based technology called Public Key Identity (PKID) stands head and shoulder against the rest in terms of raw encryption power. These include:
- Elliptic Curve Cryptography (ECC) 256-bit, 320-bit key and above
- Ultra Efficient Deterministic Prime Number Generator
- Advanced Encryption Standard (AES) 256-bit key
- SHA256 and Mersenne Twister
- Diffie-Hellman Key Exchange
Our uniqueness in Key Generation and Authentication breaks the norm in the way traditional PKI encryption method works. If you are interested to know more, contact us at the details listed below.
SYPHERNETICS
Syphernetics is a comprehensive encryption utility based on the best PKI technologies using Elliptic Curve Cryptography (ECC) and Advance Encryption Standard (AES). Syphernetics provides easy-to-use encryption functions to prevent your confidential files from being viewed by unauthorized person(s).
Digital Signature
The purpose of a digital signature is to guarantee that the individual sending the message is really who he or she claims to be. You can use this function to either sign or sign and encrypt your files. You must install the certificate, which can be obtained from any CA (Certificate Authority) before you are able to use the Digital Signature and Authentication functions.
File Encryption and Decryption
Encrypts and decrypts any type of file format(s) in your computer. You can encrypt files for your own viewing or to be viewed by person(s) that you have authorized.
Secure Deletion
Normal files deletion does not execute permanently file deletion like deleting file via windows recycle bin. Those files can be retrieved by using forensic software or data recovery applications.
Syphernetics secures deletion by permanently deletes the files.
Virtual drive
A Virtual Drive is virtually created on the physical drive to store the files/folders securely. This drive is created on Syphernetics login and disappeared from Syphernetics logged out. The Virtual Drive will be hidden in the hard disk.
Syphernetics employs encryption technology based on approved algorithms by world cryptography community and FIPS (Federal Information Processing Standard) of the US, which are ECC (Elliptic Curve Cryptography) for key agreement and AES (Advance Encryption Standard) for encryption. Besides that, we also use our own PKID technology (patent pending PI20031745) for greater security.
SYPHERMAIL
SypherMail is an email encryption software that easily encrypts and secures your emails.
The need for email encryption arises because ordinary Email messages can be read by anyone who is involved in the processing of your electronic message. If you're looking for a little personal privacy in your communications with friends and loved ones, or you just want to trust that the documents you email to your accountant or client aren't being intercepted and read, you'll need to encrypt those messages.
SypherMail is a safer option to secure your email communications by encrypting it through public key encryption algorithm. It runs on 32-bit and 64-bit editions of Win 2000, XP, Vista and Win 7 and it doesn’t take too much of your RAM.
All you do is to send unencrypted or encrypted emails to your recipients and SypherMail will take care of the rest. If you send an encrypted mail, then the receiver can download SypherMail to view the message.