13
Secure Communication. Simplified.

Secure Communication. Simplified

  • Upload
    others

  • View
    9

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Secure Communication. Simplified

Secure Communication. Simplified.

Page 2: Secure Communication. Simplified

P

SAFECHATS

Problem

Most companies use popular insecure email and messaging services to communicate confidential information

The information flow within the Company is disorganized

Metadata is exposed and available to third-party services

Page 3: Secure Communication. Simplified

P

SAFECHATS

Introducing SAFECHATS

Ultra-secure communication solution

Designed with security in mind

Page 4: Secure Communication. Simplified

P

SAFECHATS

Why SAFECHATS?

Information is always end-to-end encrypted by default

All-in-one communication suite: • Text messaging (one-on-one and group chats) • Voice calls • File transfers (no size and file type limits)

Page 5: Secure Communication. Simplified

P

SAFECHATS

How does SAFECHATS solve the problem?

Customizable white label solution

Integrates with existing software infrastructure

Enterprise-wide account and contact list management, supervised audited chats for compliance

Page 6: Secure Communication. Simplified

P

SAFECHATS

What makes SAFECHATS different?

Your own isolated cloud environment or on-premise deployment

Customizable solution allows to be compliant with internal corporate security policies

No access to your phone number and contact list✔

Page 7: Secure Communication. Simplified

P

SAFECHATS

Screenshot Protection

Notifications on iOS

DRM protection on Android

Page 8: Secure Communication. Simplified

P

SAFECHATS

Identity Verification

Protection from man-in-the-middle attacks

SMP Protocol

Page 9: Secure Communication. Simplified

P

SAFECHATS

Privacy Features

Show / hide messages and files

Recall messages and files

Self-destructing messages and files

Page 10: Secure Communication. Simplified

P

SAFECHATS

Additional Protection

History retention control

Application lock:

• PIN-code • Pattern-lock on Android devices • Touch ID on iOS devices

Page 11: Secure Communication. Simplified

P

SAFECHATS

How does SAFECHATS compare to other products?

SafeChats Threema Work Wickr TigerText WhatsApp Telegram

Security

Well-known encryption protocol yes yes yes yes yes no

Encryption by default yes yes yes yes yes no

Voice calls yes no no no yes no

File sharing yes yes yes yes yes yes

Works without phone number registration / SMS verification yes yes yes yes no no

Remote identity verification yes no yes no no no

Privacy

Works without access to phone’s contact list yes yes no yes no no

Works without a SIM card yes yes yes yes no no

Keeps metadata private and secure yes yes yes yes no no

Page 12: Secure Communication. Simplified

P

SAFECHATS

How does SAFECHATS compare to other products?

SafeChats Threema Work Wickr TigerText WhatsApp Telegram

Enterprise features Mass-market tools

White label yes no n/a n/a no no

Integrations yes yes yes yes no no

App customization yes no no no no no

Account and contact list management yes yes n/a yes no no

Isolated or on-premise deployment yes no no no no no

Page 13: Secure Communication. Simplified

P

SAFECHATS

Platforms Supported

SafeChats.com