infographic: the evolution of secure mobile computing

1
EVOLUTION OF SECURE MOBILE COMPUTING 1990 s 2000 s Curre nt Near Future Large cumbersome crypto, rack, laptop and other devices would be transported in several unwieldy pelicases. SST Mobile Office Equipment becomes smaller and more powerful and can be contained in one large Pelicase SST SCT1150E Secured Venue Tablet Encrypted HDD capable of storing up to Top Secret Data Next Generation Secured Tablet Encrypted HDD capable of storing up to Top Secret Data with a Dongle containing Micro IP crypto device for transmission of Top Secret Data Long Term Future Next Generation Secured Tablet Encrypted HDD capable of storing up to Top Secret Data with integrated Micro IP crypto device for transmission of Top Secret Data 2012 SST Secure Comms Hub IP Crypto Device, 3G and Modem www.sst.ws

Upload: api-technologies-corp

Post on 27-Jul-2015

358 views

Category:

Technology


4 download

TRANSCRIPT

Page 1: INFOGRAPHIC: The Evolution of Secure Mobile Computing

EVOLUTION OF SECURE MOBILE COMPUTING

1990s

2000s

Current

Near Future

Large cumbersome crypto, rack, laptop and other devices would be transported in several unwieldy pelicases.

SST Mobile Office Equipment becomes smaller and more powerful and can be contained in one large Pelicase

SST SCT1150E Secured Venue TabletEncrypted HDD capable of storing up to Top Secret Data

Next Generation Secured TabletEncrypted HDD capable of storing up to Top Secret Data with a Dongle containing Micro IP crypto device for transmission of Top Secret Data

Long Term FutureNext Generation Secured TabletEncrypted HDD capable of storing up to Top Secret Data with integrated Micro IP crypto device for transmission of Top Secret Data

2012 SST Secure Comms Hub – IP Crypto Device, 3G and Modem

www.sst.ws