The adjustable internal compartment of one Signal Safeguard SSG-COM Combination Cell Phone/Tablet Unit has the capability of countless configurations to fit every need. Learn more… [/one_third][one_third] Watch video below to learn more about our RF Shielded Countermeasure Metal Enclosure. [/one_third]
Supports up to 50 CELL PHONES and/or up to 25 TABLETS at one time. These are two examples of how the combination unit adapts to your needs. Capacity is based on average size of PEDs without cases. Request a Quote… [/one_third_last]
The Information On Your Cell Phone and Tablet is Vulnerable
Signal Safeguard (SSG) is an RF shielded countermeasure metal enclosure.
SSG is designed to protect Portable Electronic Devices (PEDs) preventing wireless signals from infiltrating PEDs, rendering the devices ineffective. SSG not only physically protects and manages PEDs but more importantly secures the information on them addressing several regulations for Cyber Security, Information Assurance (IA), Personal Identifiable Information (PII) and related security. Ordinary wooden or locker boxes do NOT protect the wireless communications when left in unprotected areas, such as outside of a SCIF, hallways or visitor areas. [/two_third][one_third_last]
Signal Safeguard RF shielded products are now on GSA Advantage. Contract number GS-35F-053BA for Federal Supply Schedule 70.
We welcome the opportunity to discuss how to implement Signal Safeguard in your environment. If you have any questions, please don’t hesitate to contact us.
[infopane color=”8″ icon=”0001.png”]
NIST Guidelines to Secure Mobile Devices
Organizations should implement the following guidelines to improve the security of their mobile devices. [bullets icon=”0269.png”]
- Organizations should develop system threat models for mobile devices and the resources that are accessed through the mobile devices.
- Organizations deploying mobile devices should consider the merits of each provided security service, determine which services are needed for their environment, and then design and acquire one or more solutions that collectively provide the necessary services.
- Organizations should have a mobile device security policy.
- Organizations should implement and test a prototype of their mobile device solution before putting the solution into production.
- Organizations should fully secure each organization-issued mobile device before allowing a user to access it.
- Organizations should regularly maintain mobile device security.
[/bullets] [button href=”http://csrc.nist.gov/publications/drafts/800-124r1/draft_sp800-124-rev1.pdf” size=”medium” hovercolor=”#1d67de” textcolor=”#ffffff” target=”_blank” tooltip=””]Download Guidelines[/button][/infopane] [/three_fourth] [one_fourth_last]