Deutsche Telekom is making mobile life carefree
“Nobody can prevent cyberattacks, but we can give our customers the best protection possible – whether they are private customers or business customers from small, medium-size or large-scale enterprises,” says Dr. Ferri Abolhassan, Director of T-Systems and Head of the IT Division and Telekom Security. “Our new solution offers an innovative approach,” he adds.
Mobile Protect Pro analyzes parameters on mobile devices such as charge state, USB and Bluetooth interfaces and networks. Consequently, the new solution from Deutsche Telekom can provide comprehensive protection not just for Android devices, but also for devices running iOS. Mobile Protect Pro is based on self-learning algorithms that also identify unknown risks and attack vectors that mobile device management systems have so far been unable to recognize or access. If damage is done, at-risk devices can be immediately locked out of the company network and automatically blocked from accessing corporate data.
Mobile Protect Pro is available for 1.99 euros net per device, per month, for five licenses or more. The service is likely to be rolled out to private customers, too.
Make economical encrypted calls with the Mobile Encryption app
Encrypted communications are a key aspect of mobile security, and Deutsche Telekom is bringing an innovation in this area to IFA. When the trade show launches, new customers with the Mobile Encryption app for business customers with Android and iOS devices will be able to make encrypted phone calls from 4.95 euros net per month, per device. This price includes all call costs. Existing customers also benefit from a price reduction. “Encryption is a crucial pillar of secure communication. By lowering our prices, we want to make encrypted communications appeal to even more companies,” explains Abolhassan.
When two users want to communicate using this solution, they only need install the Mobile Encryption app on their smartphones and order the corresponding service from Deutsche Telekom. No customer-specific technical infrastructure is needed in the background. The keys, which enable secure communications in the solution, are generated only on the smartphones used and are deleted immediately at the end of a call. As a result, they are always under the user’s exclusive control and are fully independent of the network provider.
Комментарии