CipherTalk® Mobile Phone Security and Encryption

 

CipherTalk Secure Mobile Voice and Text Encryption

Product Features

  • Military-grade end-to-end encrypted voice and text
  • Anonymous communications
  • Interoperable mobile phone and desktop phone family
  • Hardened Android smartphone platform
  • Global coverage — Wi-Fi, GSM
  • Device security with hardened operating system, IP Firewall, Permission Enforcement Agent
  • Simple, efficient and reliable to use
  • Flexible procurement options
  • Optional CipherONE Secure Connect Network

CipherTalk Secure Smartphone with Encrypted Voice and Text

CipherTalk 8500 Secure Mobile Phone with hardened Android™ OS

The CipherTalk secure mobile phone and encryption product provides military-grade end-to-end encrypted voice and text cell phone protection as well as anonymous communications. Protect your most sensitive communications from the full range of threats quickly and easily, and from anywhere in the world via GSM or Wi-Fi.


CipherTalk Desktop Secure Telephone, Compatible with CipherTalk Mobile Phone

CipherTalk Secure Desktop IP Phone

The CipherTalk family includes a secure mobile phone with device and intrusion protection mechanisms and a secure desktop voice over IP phone. The interoperable family enables secure voice and text communications on the go and in the office, any way and anywhere. The CipherTalk is also easy to use, enables instant call set up, and is reliable. Flexible procurement options and plans are available to meet budget requirements.

A customer-owned CipherONE Secure Connect private network is available as an option for customers desiring further control.


Quality

TCC is dedicated to quality products and services. TCC is ISO 9001 certified. ISO 9001, granted to TCC by TUV, is the most stringent standard available for total quality systems in design/development, production, installation and servicing.


Cipher One

CipherONE® Optimized Network Encryption

Our solutions meet TCC's CipherONE Optimized Network Encryption best-in-class criteria for maximum cryptographic strength, and are optimized for performance and ease of use for our customers.

Read More