SpeakInPrivate Phones - Introduction - PowerPoint PPT Presentation

About This Presentation
Title:

SpeakInPrivate Phones - Introduction

Description:

With the seemingly endless threat about data loss, maintaining one’s privacy can be overwhelming. That’s where speak in private comes aid to be a secure starting point for your professional and proprietary communications. – PowerPoint PPT presentation

Number of Views:6

less

Transcript and Presenter's Notes

Title: SpeakInPrivate Phones - Introduction


1
SpeakInPrivate Your Confidential Communication
Device. Simple and affordable privacy. Secure
voice, video, text, file transfers and lot more.
2
Index
3
SpeakInPrivateSecurity-oriented intelligence
device version of customized Android software
that uses a virtual private network (VPN) to make
users phone activity anonymous. It allows users
to untraceably and privately make calls, send
texts, send and receive files, and video chat.It
is an interesting and undoubtedly useful device,
it has valuable specs that any person would want
to have on his handset.
4
Key Features
5
Security Features
6
Other Features (Basic Model)
Particulars Features
Body Dimension - 142 x 71.9 x 9.2 mm Weight - 150 g Sim - Dual Sim
Display Size - 5.0 inches
Platform OS - Android OS, v4.2.2
Memory Card Slop - Up to 32 GB Internal - 4 GB , 1 GB RAM
Camera Primary - 8 MP Secondary - 2 MP
7
Other Features (Superior Model)
Particulars Features
Body Dimension - 76.6 x 153.5 x 8.5 mm Weight - 176 g Sim - Single Sim
Display Size - 5.7 inches
Platform OS - Android OS, v4.4 (KitKat)
Memory Card Slop - Up to 128 GB Internal - 32 GB , 3 GB RAM
Camera Primary - 16 MP Secondary - 3.7 MP
8
Technology Used
9
Process of Encryption Communication
10
Index
11
Benefits of Speak in Private
12
Index
13
Target Market
  • Target markets include India and
  • India friendly nations-
  • India
  • South East Asia except China
  • Central Asia
  • Middle East
  • Africa
  • Caribbean

14
Target Customers
15
Market Penetration Strategy - INDIA
  • Direct Sales in India through agents.
  • Public Private Partnerships.
  • Leveraging on Existing Clientele.
  • Leveraging a network of IPS and army officers for
    client reference.
  • Seek empanelment's in various bodies to get
    authorized access to opportunities.

16
Market Penetration Strategy - International
  • Developed Sales partners in Saudi Arabia , UAE,
    Mongolia, Malaysia, Zimbabwe etc.
  • Developing more Sales Partners in target market
    globally.
  • Seeking opportunities in International defense
    sectors across developing economies.

17
Index
18
Business Threats
19
Index
20
Service Speak in private Cell Crypt Black Phone Secure Star
Anti Forensics Yes No No No
Anti Recording Yes No No No
Anti Snap shot Yes No No No
Biometric lock Yes No No No
Calling outside network Yes Yes Yes Yes
Device specific Yes Yes Yes No
Encrypted calling Yes Yes Yes Yes
Encrypted file system Yes No Yes No
Encrypted File Transfer Yes No Yes No
Encrypted Text Yes No Yes No
Encrypted Video Calling Yes No No No
Firewall Yes No No No
Key Exchange Yes Yes Yes Yes
Personalised Key Yes No No No
Private OS Yes No Yes No
Remote Wipeout Yes No Yes No
Signalling Encryption Yes Yes Yes Yes
VPN Yes No Yes No
Comparison
21
Summary
  • With the rapid growth of mobile phone usage in
    recent years, it is often observed that it has
    also become a part of many illegal and criminal
    activities. So, in most cases tracing the mobile
    number becomes a vital part of the investigation
    process.
  • Also, sometimes we just want to trace a mobile
    number back to the caller for reasons like
    annoying prank calls, blackmails, unknown number
    in a missed call list and so on.
  • Advent of smart phones and 4G connections give
    this opportunity a unique timing advantage.

22
Thank You
Write a Comment
User Comments (0)
About PowerShow.com