infographic: the evolution of secure mobile computing
TRANSCRIPT
EVOLUTION OF SECURE MOBILE COMPUTING
1990s
2000s
Current
Near Future
Large cumbersome crypto, rack, laptop and other devices would be transported in several unwieldy pelicases.
SST Mobile Office Equipment becomes smaller and more powerful and can be contained in one large Pelicase
SST SCT1150E Secured Venue TabletEncrypted HDD capable of storing up to Top Secret Data
Next Generation Secured TabletEncrypted HDD capable of storing up to Top Secret Data with a Dongle containing Micro IP crypto device for transmission of Top Secret Data
Long Term FutureNext Generation Secured TabletEncrypted HDD capable of storing up to Top Secret Data with integrated Micro IP crypto device for transmission of Top Secret Data
2012 SST Secure Comms Hub – IP Crypto Device, 3G and Modem
www.sst.ws