top of page

Location based security

Data can be lost in many ways for example 'dummy' wifi spots in coffee bars or criminal or state sponsored operations capable of controlling surveillance on computing devices or employee accidental or deliberate action all of which result in loss of sensitive information.

Data Isolation

SmartSafe equipped devices have controllable information storage which can be accessible to the operation system or completely inaccessible under the control of SmartSafe security policies.  This enables a corporation to be able to implement location and time based security policies at a hardware level. 

Coffee Table

Cyber Surveillance

Each SmartSafe controlled device operates on a control policy.   That control policy is determined by the presence of a virtual (mobile app) or physical beacon. This then determine what surveillance devices (camera and microphone) can be allowed by policies for use in video conferencing in safe environments or home use, all other times they will be disabled.

bottom of page