top of page

Data Isolation
SmartSafe equipped devices have controllable information storage which can be accessible to the operation system or completely inaccessible under the control of SmartSafe security policies. This enables a corporation to be able to implement location and time based security policies at a hardware level.


Cyber Surveillance
Each SmartSafe controlled device operates on a control policy. That control policy is determined by the presence of a virtual (mobile app) or physical beacon. This then determine what surveillance devices (camera and microphone) can be allowed by policies for use in video conferencing in safe environments or home use, all other times they will be disabled.
bottom of page