Skip to main content
TrustRadius
Cryptosmart

Cryptosmart

Overview

What is Cryptosmart?

Cryptosmart Mobile is a security solution designed to protect mobile devices and communications with encryption. According to the vendor, this product caters to a range of businesses, including government agencies, military organizations, large international organizations, and professionals from various...

Read more
Recent Reviews
TrustRadius

Leaving a review helps other professionals like you evaluate Cybersecurity Consulting Services

Be the first one in your network to review Cryptosmart, and make your voice heard!

Return to navigation

Pricing

View all pricing
N/A
Unavailable

Sorry, this product's description is unavailable

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

Alternatives Pricing

What is Pentest-Tools.com?

Pentest-Tools.com allows users to discover and report vulnerabilities in websites and network infrastructures. They provide a set of integrated pentesting tools designed to enable users to perform easier, faster, and more effective pentest engagements. Quickly discover the attack surface of a…

What is Pentest-Tools.com?

Pentest-Tools.com allows users to discover and report vulnerabilities in websites and network infrastructures. They provide a set of integrated pentesting tools designed to enable users to perform easier, faster, and more effective pentest engagements. Quickly discover the attack surface of a…

Return to navigation

Product Details

What is Cryptosmart?

Cryptosmart Mobile is a security solution designed to protect mobile devices and communications with encryption. According to the vendor, this product caters to a range of businesses, including government agencies, military organizations, large international organizations, and professionals from various industries. It aims to ensure the confidentiality and protection of sensitive information against interception, loss, or theft.

Key Features

Secure Communications: According to the vendor, Cryptosmart Mobile provides end-to-end encryption for voice, data, and SMS communications to protect against interception, loss, or theft of mobile devices.

Data Encryption: The vendor states that Cryptosmart Mobile offers robust data encryption for emails, internet browsing, intranet access, and other data exchanges, adding an extra layer of protection to sensitive information stored on mobile devices.

Mobile Device Security: Cryptosmart Mobile includes local encryption on mobile devices, a lock screen, and strong authentication measures to prevent unauthorized access. According to the vendor, it also allows for remote data wiping in case of a lost or stolen device to maintain data confidentiality.

Network Security: The vendor claims that Cryptosmart Mobile features a built-in network firewall to protect against remote attacks and intrusions. It also offers port control to manage and secure network connections, along with anti-rooting and anti-trapping measures to prevent unauthorized access to corporate networks.

Strong Authentication: According to the vendor, Cryptosmart Mobile enables strong authentication of mobile devices, ensuring that only authorized users can access the device. It offers smartcards for key management, adding an extra layer of security to the authentication process.

Compatibility with Samsung Devices: The vendor states that Cryptosmart Mobile is compatible with the latest Samsung Galaxy devices, supporting both high-end smartphones and mid-range smartphones to make security accessible. It also extends compatibility to tablets, allowing for secure exchanges and data mobility.

User-Friendly Solution: Cryptosmart Mobile is described as a user-friendly and intuitive solution that is simple to use. According to the vendor, it offers a seamless and familiar user experience on Samsung smartphones and tablets without compromising security.

Cryptosmart Features

  • Supported: Endpoint Management
  • Supported: Whitelisting/Blacklisting

Cryptosmart Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsAndroid
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews

Sorry, no reviews are available for this product yet

Return to navigation