Mission Centered
Mobility Platform
10 June 2020
Simon Hartley, CIS Mobile
CONFIDENTIAL. ALL RIGHTS RESERVED.
CIS Mobile
CIS Secure
 Specialist in hardening COTS telecom,
computing, and video conferencing devices
 Government customers across
IC, DoD, LE, and Civilian Government
 65,000 sq. ft. NSA-Tempest certified
production facility, labs, and demo center
 150+ Staff in Ashburn, VA
 2 decade history
CIS Mobile
 Wholly owned subsidiary of
CIS Secure Computing
 Focused exclusively on
FVEY secure mobility
 Patented technology with
$25MM+ invested since 2015
 Reference customers in
US, Canada, and UK
Consumer mobile device data exhaust and tracking
 Vanderbilt study on Google data collection
 Military fitness tracking
 NY Times Pentagon and POTUS tracking
 WhatsApp and Zoom tracking
 Troops leave behind personal devices
 “For the agencies that have prohibited personal
smartphone use for work, 40% of employees said the
guidelines have had little to no impact on their
behavior.”
CONFIDENTIAL. ALL RIGHTS RESERVED.
“High threat users”
Intel, military, LE, or IG targeted by:
 Nation states
 Organized crime
 Terrorist organizations
Mobile users who:
 Require mobile access to sensitive data / apps
 Work in secure buildings / sites
 Work / travel overseas
CONFIDENTIAL. ALL RIGHTS RESERVED.
Sample Use Cases
Google Google free
Hidden Containers – covert / overseas use
Later
Secure ModeTrigger Trigger Unrestricted
Use
Secure Mode
Google or no Google
Prevent leakage of sensitive data / meta data to third parties
Secure Mode – secure sites / missions
Google free – limit app store, launcher, and ad ID tracking Multiple containers – many phones to 1 and rapid deployments
Public
Persona
Hidden
Container /
Private
Persona
Prevent exfiltration of sensitive data
Address different job and security requirements
Prevent discovery of sensitive missions, apps, and data
Mission
Specific
Work
Personal
Unrestricted
Use
Key use cases
CONFIDENTIAL. ALL RIGHTS RESERVED.
AltOS Components
Operating System
Android (AOSP) + security
enhancements, system
services, containers &
embedded management
Management Server
Application, network, and
security management, control
and monitoring.
OTA Update Server
Distribution of updates and
security patches to altOS and
system software
Services
Maintenance and support,
security updates,
customization and devices
A mobile platform that provides the functionality, control, and
trust required for high risk mobile users (AWS or On-Premises)
CONFIDENTIAL. ALL RIGHTS RESERVED.
Supported Devices
Smartphones
• Pixel 3 and 3 XL
• Pixel 3a and 3a XL
• Sonim XP8 – Ruggedized
CONFIDENTIAL. ALL RIGHTS RESERVED.
AWS or on-prem management
Remote worker setup – wired or wireless – mirror / desktop*
 Google Pixel 3a smartphone
 Powered USB hub
 Monitor adapter
 Mouse
 Keyboard
 Network connection

More Related Content

PDF
How To Protect Mobile Apps and APIs from Attackers
PDF
Managing Mobile Business Insecurities
PDF
Shining a Light on Shadow Devices
PPTX
Accellion - The European Information Security Summit, London
PPTX
Mobile (in)security ?
PDF
Mobile (in)security? @ Mobile Edge '14
PPTX
2014 BYOD and Mobile Security Survey Preliminary Results
PPT
How BYOD Will Shape Wireless Network Security in 2012
How To Protect Mobile Apps and APIs from Attackers
Managing Mobile Business Insecurities
Shining a Light on Shadow Devices
Accellion - The European Information Security Summit, London
Mobile (in)security ?
Mobile (in)security? @ Mobile Edge '14
2014 BYOD and Mobile Security Survey Preliminary Results
How BYOD Will Shape Wireless Network Security in 2012

What's hot (20)

PPTX
2015 Endpoint and Mobile Security Buyers Guide
PPTX
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
PPT
Mobile Security
PPTX
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
PDF
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
PDF
Is your enterprise ready for WYOD?
PDF
ForeScout IoT Enterprise Risk Report
PDF
Five mobile security challenges facing the enterprise
PPTX
Achieving Secure BYOD in Government Agencies
PPTX
Tips and Tricks on Securing your Android Devices
PPTX
Computing on the Move - Mobile Security
PDF
Securing Your Wearable Tech Brand
PDF
Ibm security domains 2015[3]
PDF
Mobile security mobile malware countermeasure academic csirt
PDF
I.G.N. Mantra - Mobile Security, Mobile Malware,and Countermeasure
PDF
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
PDF
10 Things That Compromise Patient Data
PPTX
GDPR Part 4: Better Together Quest & SonicWall
PPTX
Safeguarding Cloud and Mobile Healthcare Data
2015 Endpoint and Mobile Security Buyers Guide
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Mobile Security
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
Is your enterprise ready for WYOD?
ForeScout IoT Enterprise Risk Report
Five mobile security challenges facing the enterprise
Achieving Secure BYOD in Government Agencies
Tips and Tricks on Securing your Android Devices
Computing on the Move - Mobile Security
Securing Your Wearable Tech Brand
Ibm security domains 2015[3]
Mobile security mobile malware countermeasure academic csirt
I.G.N. Mantra - Mobile Security, Mobile Malware,and Countermeasure
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
10 Things That Compromise Patient Data
GDPR Part 4: Better Together Quest & SonicWall
Safeguarding Cloud and Mobile Healthcare Data
Ad

Similar to OLD - altOS Secure Mobile Platform - Public (20)

PDF
WSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
PPTX
Microsoft Intune y Gestión de Identidad Corporativa
PPTX
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
PDF
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
PDF
Fortinet ZTNA - Um contexto de sua Implementação
PPTX
IoT Mashup - webinos iot and m2m - Allott
PPTX
iotmaship - Webinos iot and m2m - allott
PPTX
Sophos Mobile Control - Product Overview
PDF
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
PDF
ISACA CACS 2012 - Mobile Device Security and Privacy
PPTX
Big data, Security, or Privacy in IoT: Choice is Yours
PDF
Augmate Capabilities Deck
PPTX
Con8896 securely enabling mobile access for business transformation - final
PDF
How to Enable, Monitor, and Secure Your Remote Workforce
PPTX
Stratégies de croissance via la mobilité (ems)
PPTX
EMM Product Sales Deck
PPTX
Going_Mobile_101_IIMC_v5
PDF
Microsoft Enterprise Mobility and Security EMS
PPTX
Fortinet k
PDF
Mobile Security for Banking and Finance
WSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
Microsoft Intune y Gestión de Identidad Corporativa
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
Fortinet ZTNA - Um contexto de sua Implementação
IoT Mashup - webinos iot and m2m - Allott
iotmaship - Webinos iot and m2m - allott
Sophos Mobile Control - Product Overview
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
ISACA CACS 2012 - Mobile Device Security and Privacy
Big data, Security, or Privacy in IoT: Choice is Yours
Augmate Capabilities Deck
Con8896 securely enabling mobile access for business transformation - final
How to Enable, Monitor, and Secure Your Remote Workforce
Stratégies de croissance via la mobilité (ems)
EMM Product Sales Deck
Going_Mobile_101_IIMC_v5
Microsoft Enterprise Mobility and Security EMS
Fortinet k
Mobile Security for Banking and Finance
Ad

Recently uploaded (20)

PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
PPTX
The various Industrial Revolutions .pptx
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PPTX
Microsoft Excel 365/2024 Beginner's training
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
Developing a website for English-speaking practice to English as a foreign la...
PPT
Geologic Time for studying geology for geologist
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
Configure Apache Mutual Authentication
PDF
Zenith AI: Advanced Artificial Intelligence
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
A contest of sentiment analysis: k-nearest neighbor versus neural network
Chapter 5: Probability Theory and Statistics
Benefits of Physical activity for teenagers.pptx
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
The various Industrial Revolutions .pptx
Credit Without Borders: AI and Financial Inclusion in Bangladesh
Microsoft Excel 365/2024 Beginner's training
Convolutional neural network based encoder-decoder for efficient real-time ob...
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
OpenACC and Open Hackathons Monthly Highlights July 2025
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
Developing a website for English-speaking practice to English as a foreign la...
Geologic Time for studying geology for geologist
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
A comparative study of natural language inference in Swahili using monolingua...
Configure Apache Mutual Authentication
Zenith AI: Advanced Artificial Intelligence

OLD - altOS Secure Mobile Platform - Public

  • 1. Mission Centered Mobility Platform 10 June 2020 Simon Hartley, CIS Mobile
  • 2. CONFIDENTIAL. ALL RIGHTS RESERVED. CIS Mobile CIS Secure  Specialist in hardening COTS telecom, computing, and video conferencing devices  Government customers across IC, DoD, LE, and Civilian Government  65,000 sq. ft. NSA-Tempest certified production facility, labs, and demo center  150+ Staff in Ashburn, VA  2 decade history CIS Mobile  Wholly owned subsidiary of CIS Secure Computing  Focused exclusively on FVEY secure mobility  Patented technology with $25MM+ invested since 2015  Reference customers in US, Canada, and UK
  • 3. Consumer mobile device data exhaust and tracking  Vanderbilt study on Google data collection  Military fitness tracking  NY Times Pentagon and POTUS tracking  WhatsApp and Zoom tracking  Troops leave behind personal devices  “For the agencies that have prohibited personal smartphone use for work, 40% of employees said the guidelines have had little to no impact on their behavior.”
  • 4. CONFIDENTIAL. ALL RIGHTS RESERVED. “High threat users” Intel, military, LE, or IG targeted by:  Nation states  Organized crime  Terrorist organizations Mobile users who:  Require mobile access to sensitive data / apps  Work in secure buildings / sites  Work / travel overseas
  • 5. CONFIDENTIAL. ALL RIGHTS RESERVED. Sample Use Cases Google Google free Hidden Containers – covert / overseas use Later Secure ModeTrigger Trigger Unrestricted Use Secure Mode Google or no Google Prevent leakage of sensitive data / meta data to third parties Secure Mode – secure sites / missions Google free – limit app store, launcher, and ad ID tracking Multiple containers – many phones to 1 and rapid deployments Public Persona Hidden Container / Private Persona Prevent exfiltration of sensitive data Address different job and security requirements Prevent discovery of sensitive missions, apps, and data Mission Specific Work Personal Unrestricted Use Key use cases
  • 6. CONFIDENTIAL. ALL RIGHTS RESERVED. AltOS Components Operating System Android (AOSP) + security enhancements, system services, containers & embedded management Management Server Application, network, and security management, control and monitoring. OTA Update Server Distribution of updates and security patches to altOS and system software Services Maintenance and support, security updates, customization and devices A mobile platform that provides the functionality, control, and trust required for high risk mobile users (AWS or On-Premises)
  • 7. CONFIDENTIAL. ALL RIGHTS RESERVED. Supported Devices Smartphones • Pixel 3 and 3 XL • Pixel 3a and 3a XL • Sonim XP8 – Ruggedized
  • 8. CONFIDENTIAL. ALL RIGHTS RESERVED. AWS or on-prem management
  • 9. Remote worker setup – wired or wireless – mirror / desktop*  Google Pixel 3a smartphone  Powered USB hub  Monitor adapter  Mouse  Keyboard  Network connection

Editor's Notes

  • #2: Our Alternative Android OS (altOS) is flashed one time onto standard Google Pixel 3a/3a XL smartphones and hardened Sonim XP8 smartphones then maintained OTA from a web-based console. We offer greater control than consumer-oriented Apple / Android mobile devices while being more affordable, easier to use, and maintain than government only platforms. We focus on these use cases for government communities beyond what regular Apple/Samsung devices do: Combo many devices into one  - Multiple secure containers e.g. to support remote working / multiple independent levels of security Secure sites / missions  - Controlling modems, cameras, mics, and tracking   Covert / OCONUS usage  - Hidden containers, anti-forensics, and spoofing Rapid updates / deployments  - “Easy button” for scaled on-premises or cloud over-the-air management What do customers see drivers for altOS being? Moving from PCs and desk phones to mobile, to drive productivity Consolidating multiple devices into one, to drive prod Separating different levels of security – personal / unclassified / classified for security Driving actual usage of secure systems rather than defaulting to extremes of a) No mobile or b) Leaky COTS devices everywhere FOUO For Official Use Only SBU Sensitive But Unclassified CUI Controlled Unclassified Information NIPR Non-classified Internet Protocol SIPR Secret Internet Protocol
  • #3: FVEY – Five Eyes – US, Canada, UK, Australia, and New Zealand
  • #4: digitalcontentnext.org/blog/2018/08/21/google-data-collection-research/ washingtonpost.com/world/the-us-military-reviews-its-rules-as-new-details-of-us-soldiers-and-bases-emerge/2018/01/29/6310d518-050f-11e8-aa61-f3391373867e_story.html techcrunch.com/2019/11/15/los-angeles-juice-jacking-usb/ csoonline.com/article/3448316/cell-phones-dont-belong-in-scifs-says-republican-congressman.html businessinsider.com/nyt-tracked-trump-leaked-location-data-mobile-phone-spying-easy-2019-12 nytimes.com/interactive/2019/12/19/opinion/location-tracking-cell-phone.html wsj.com/articles/police-tracked-a-terror-suspectuntil-his-phone-went-dark-after-a-facebook-warning-11577996973 https://wsj.com/articles/u-s-military-bans-tiktok-over-ties-to-china-11578090613 https://www.zdnet.com/google-amp/article/us-troops-deploying-to-the-middle-east-told-to-leave-personal-devices-at-home/ https://www.militarytimes.com/flashpoints/2020/01/23/deployed-82nd-airborne-unit-told-to-use-these-encrypted-messaging-apps-on-government-cellphones/ https://www.govexec.com/workforce/2020/03/white-house-calls-maximum-telework-flexibilities-dc-area-employees/163797/ https://techcrunch.com/2020/03/31/zoom-at-your-own-risk/ https://www.afcea.org/content/government-mobile-device-use-still-vulnerable
  • #7: Single Server Configuration base requirements for a server with all services installed sized to manage up to 1,000 devices. OS:    Ubuntu 18.04 LTS x64 (AMD64)  Multi Core CPU:  minimum 8 cores   CPU speed:    minimum 2 GHz  RAM :     16 GB  DISK:     minimum 1 TB  The database growth rate is approximately 150 MB disk space and 70 MB RAM for each additional 1K devices, the above server configuration should be suitable for deployments up to 5k devices.   Protection is three-fold: • Patching — Our altOS platform is based on the Android Open Source Project (AOSP).  Any issue is patched by Google, and we pass through the monthly patches to our customers to keep them safe any  issues reported.  AltOS’ differentiation in the marketplace is not trying to find or respond to security issues faster than Google itself but instead in making the patching process simpler and easier than the traditional process whereby Google releases patches to OEMs, who then release them to carriers, and then to devices, which can mean vulnerability windows of months. • App white / black listing - You can control what apps run on your altOS devices from our management console.  You can ensure your users only use apps that you’ve tested and approved to protect against these kinds of malicious attacks. • Optional Mobile Threat Defense (MTD) / Mobile Endpoint Defense tools — We have partnered with Zimperium to test their tools on altOS.  We can do the same with other protection products.
  • #8: "Google's $399 iPhone Killer” -- www.wired.com/story/google-pixel-3a-io-2019-todays-news/ “Rugged phone you can literally jump on” -- mobilesyrup.com/2019/07/19/sonim-xp8-review/
  • #10: Older hardware / OS = mirroring New hardware / OS = desktop experience with multiple windows