Assac Networks and Gilat Telecom have signed a cooperation agreement for the supply of ShieldiT – an integrated, all-in-one smartphone security solution, that enables secured, managed communication over a satellite connection

Assac Networks and Gilat Telecom have signed a cooperation agreement for the supply of ShieldiT – an integrated, all-in-one smartphone security solution, that enables secured, managed communication over a satellite connection

27 June 2022, Tel-Aviv, Assac Networks – a company specializing in cyber solutions for the complete protection of mobile devices for government agencies, defense and commercial organizations, which recently completed an investment round led by ASPIS Cyber Technologies, Inc., with ICARO as its marketing partner – has signed a cooperation agreement with Gilat Telecom’s Government Division. The two companies will provide a complete protection solution for mobile devices, in all types of communication – satellite, Wi-Fi and cellular, in a new combined solution that adds a controlled layer of secure communication over existing infrastructure.

 

Military, security and strategic organizations are typically engaged in sensitive communications involving confidential data which must be protected. However, their personnel’s Bring-Your-Own-Device (BYOD) smartphones rely on public and private networks that are easily hackable; they may be operating in an area where there is no GSM reception, or a risk of GSM jamming; or there may be low bandwidth or lack of data connection – all of which put critical communications with headquarters and other team-members at risk. In such cases, a redundant and available means of secure communication is required.

 

The new ShieldiT with satellite capability provides secure mobile communication in mission-critical activities that involve the exchange of sensitive, and confidential information – such as between government agencies and remote operations at strategic sites in rural areas – even where the only available communication is via satellite.

 

“Assac Networks’ ShieldiT is the only solution with a unified, managed anti-hacking and anti-tapping capability for Bring-Your-Own-Device smartphones, which fully integrates with existing voice and IT systems,” says Shimon Zigdon, CEO of Assac Networks. “ The company has decades of experience in providing smartphone security and mobile communication encryption solutions that are tailor made to meet the strictest security requirements and operational needs of any government agency or other strategically-important unit. With this new cooperation agreement with Gilat Telecom, we are proud to now enhance both companies’ offerings and provide our customers with integrated, all-in-one smartphone security, with a unique satellite connection capability.”

 

“We are delighted with our collaboration with Assac Networks, which expands Gilat’s offering,” says Ami Schneider, VP Government Solutions Division of Gilat Telecom. “As a company that has been operating in the security and homeland defense market for decades, we identified the need for full protection of mobile devices for satellite communications users, whether to support a mission, or in remote areas. This integrated solution addresses this need, and we have already seen a great deal of interest in it from our customers.”

 

ShieldiT works on BYOD smartphones, whether iOS and Android, and offers three layers of security: (a) threat management – robust and AI-powered, with a user-friendly dashboard; (b) anti-hacking – for detection and prevention of cyberattacks, data theft and malware; and (c) anti-tapping – point-to-point, military-grade voice and text message encryption and eavesdropping prevention. All ShieldiT features are controlled centrally via the unified ManageiT management dashboard, enabling incident response to be conducted from the management console. The integration of ShieldiT with a satellite modem empowers its users to have on-demand communications for tactical networks on the move, in a solution that is easily integrated on vehicles, naval vessels, and aircraft, and offers high-performance tracking.

 

About Assac Networks

Established in 2011 by seasoned veterans of the Israeli defense and security industries, Assac Networks develops and implements unique end-point security solutions.

The company develops, integrates and markets network-forensic and security products and solutions in the fields of mobile and landline communication – as well as cyber protection systems for ISPs, mobile carriers, governmental agencies and commercial organizations. Among its clients are law enforcement and intelligence agencies and large enterprises around the world.

Assac’s flagship product, ShieldiT, integrates two proven smartphone security solutions originally designed to meet the strict, high-level security requirements of the security and defense market, which have been adapted for the consumer and corporate user.

For further information please visit https://assacnetworks.com

 

About Gilat Telecom – Government Division

Gilat Telecom’s Government Division specializes in providing end-to-end strategic and tactical solutions, including communications over satellite, fiber optics, and radio infrastructure, to governments, defense, HLS, first responders, and other public sector operations around the world.

For further information, please visit: www.gilatgov.net

 

For further information:

Liat Heiblum – Press Relations

liat@hypetech-marketing.com

Mobile: +972-50-6333446

Assac Networks announces award of three major government contracts in African countries, for provision of its unique ShieldiT mobile protection solution

Assac Networks announces award of three major government contracts in African countries, for provision of its unique ShieldiT mobile protection solution

 2 May 2022, Tel-Aviv

Assac Networks – a company specializing in cyber solutions for the complete protection of mobile devices and secured communications for government agencies, defense and commercial organizations – today announced that it has been awarded contracts for the supply and installation of its unique ShieldiT system, for law enforcement agencies in three African countries, one of them is a returning customer.

Assac Networks’ flagship product, ShieldiT, is the only solution with a unified, managed anti-hacking and anti-tapping capabilities for Bring Your Own Device (BYOD) smartphones, which are the most vulnerable point in an organization’s IT network today. The system has been already deployed by governmental authorities around the world, and has been proven to prevent cyberattacks.

“Winning three different projects at the same time, shortly after having won and carried out a contract for installation of the system in a GCC state, evidences Assac Networks’ expansion,” says Shimon Zigdon, CEO of Assac Networks. “We are proud that the company’s government customers, who carry national responsibility for information security, are choosing ShieldiT as an effective solution for protection against cyber attacks. Recently, the company has also raised significant investment, so we expect to further our expansion into other countries as well.”

About ShieldiT

ShieldiT comprises three elements: threat management – robust and AI-powered, with a user-friendly dashboard; anti-hacking – detection and prevention of cyberattacks, data theft and malware; and anti-tapping – point-to-point, military-grade voice and text message encryption and eavesdropping prevention. The unified ManageiT management dashboard centrally controls all ShieldiT features. The synergy of ManageiT and ShieldiT enables corporations to control and conduct incident response from the management console.

About Assac Networks

Established in 2011 by seasoned veterans of the Israeli defense and security industries, Assac Networks develops and implements unique end-point security solutions.

The company develops, integrates and markets network-forensic and security products and solutions in the fields of mobile and landline communication – as well as cyber protection systems for ISPs, mobile carriers, governmental agencies and commercial organizations. Among its clients are law enforcement and intelligence agencies and large enterprises around the world.

 

For further information please visit https://assacnetworks.com/, or contact:

Liat Heiblum

Press Relations

liat@hypetech-marketing.com

Mobile: +972-50-6333446

Assac Networks will participate in CYBERTECH EUROPE 2022

Assac Networks will participate in CYBERTECH EUROPE 2022

Cybertech Europe, Rome is only few weeks away!
Assac Networks brings to Cybertech Europe its innovative mobile endpoint protection and communication security solution. We will present our patented and managed cyber-defense solution against advanced mobile threats, hacking and tapping.
Come to meet our VP Sales & Marketing 
Alex Rudnicki and learn about the world’s first app to integrate both anti-hacking protection and anti-tapping encryption in one solution.
For more details, please contact at: 
alexr@assacnetworks.com
See you soon at Cybertech Europe!

Protecting organizations’ most vulnerable endpoint

Protecting organizations’ most vulnerable endpoint

When organizations’ employees use their private smartphones to access their organization’s IT network and email accounts, cyber criminals can take advantage of this vulnerability and infiltrate the organization’s systems. Assac Networks provides the solution to mitigate this threat.

Although awareness to the importance of cyber security is quite high nowadays, and organizations invest heavily in order to protect themselves from cyber threats, there still exists a major and significant cyber security weak link which, in large, is still not properly addressed.

We are referring to employees’ and managers’ smartphones – private iOS and Android, which are extensively used by them to access the organizations’ IT networks and mail servers, and are extremely vulnerable to both hacking and tapping.

Just recently, Gil Shwed, founder of Check Point, said in an interview to the “7 Days” magazine, that “We are witnessing a huge increase in the number of attacks on smartphones. The technology to protect against such attack is available, but, in many cases, organizations do not implement it. It is like saying: I bought the safest car in the world, but I never buckle up.”

Recognizing the threat to organizations which stems from this vulnerability, Assac Networks developed a comprehensive solution, which is already operational and is used by numerous commercial and security organizations worldwide.

“Nearly 75% of the endpoint connections in all organizations are Smartphones, according to a Gartner Research,” says Shimon Zigdon, CEO of Assac Networks. “Employees use smartphones to access the organizations’ systems, such as email and files, as well as for their personal communication and applications, including WhatsApp, Facebook, Instagram and others.”

Organizations nowadays attempt to maximize communication and data security by using VPNs to create a partition between employees’ private and corporate applications. Unfortunately, VPN has its own vulnerability, as the hackers can target the employee’s mobile device, which is usually unsecured, and use it to infiltrate the organization’s email system, and from there they can quite easily breach the entire IT system.

“Once the hacker succeeds in accessing the organization’s email server, he can, for example, send phishing links via email to the organization’s employees, run malicious software inside the network, impersonate an actual employee to steal information, and launch a DoS attack”, says Shimon Zigdon.“ Such a cyber attack, which can be carried out using a simple BYOD smartphone, can covertly cause a great deal of damage to the organization. This kind of threat carries a huge potential risk because by using an employee’s smartphone to breach the network, the hacker can pose as an actual employee, and gain access with privileged credentials. This enables him to put his hand on the organization’s most sensitive data.”

The solution Assac Networks provides for such cyber threats is a proven app, available for both Android and IOS devices that integrates two different protection systems: ShieldiT, an app and system solution that provides protection against both tapping and hacking. ShieldiT’s anti-tapping technology prevents eavesdropping on employees’ conversations and messaging, and its anti-hacking technology detects and prevents installation of malware on the device.

To complement ShieldiT, Assac Networks also developed ManageiT, which enables CISOs to manage all the endpoints, supervise the threats facing the company, prepare the organization for possible attacks and locate vulnerable points. Both the app and the system solution fully integrate with the organization’s voice and data networks.”

While some employees may oppose the installation of a security application on their smartphones, it is important to emphasize that such an application also secures their own privacy and essential information, such as bank account details, private photos and all the data stored on the device. It’s important for all of us to remember that any hacker can, for example, fairly easily access any person’s WhatsApp app, impersonate the actual user, send intimate pictures, as well as use malicious apps to steal bank account’s credentials and much more.

“Securing the smartphone endpoint against both hacking and tapping, secures not only the organization’s IT and voice systems but also protects the employees private data,” summarizes Zigdon.

 For additional information and to get a demo: info@assacnetworks.com

The original article and photograph were published (in Hebrew) by Israel’s leading financial and business newspaper and website – Calcalist: https://calcalist360.webflow.io/articles/smartphone

UHS Hospitals hit by ransomware attack

UHS Hospitals hit by ransomware attack

A recent cyberattack has recently caused UHS hospital network, one of the largest healthcare centers network in the US, to shut down its IT computer systems all across the US.

While it’s not yet clear if any patient data was stolen, but the attack did require a complete shut-down of the entire UHS computer network. Reports by UHS employees hint that the ransomware involved was Ryuk, which can be difficult to detect and contain as the initial infection usually happens via spam/phishing and can propagate and infect IoT/IoMT devices.

Shimon Zigdon, CEO and founder of Assac Networks, an Israeli-based provider of mobile security anti-hacking and anti-tapping smartphone solutions, says that “such attacks take place much more frequently than people realize”, and that “such an incident once again proves how important it is to ensure that all the organization’s devices which are connected to the  IT network, including smartphones and tablets, are fully secured with anti-malware and anti-hacking systems.” The reason is that mobile devices constitute the very weakest link in the organization’s cybersecurity line of defense, and therefore they serve as the easiest way through which a hacker can infiltrate an organization’s IT network.

“Especially now, due to Covid-19, hundreds of millions of people are working remotely, conducting business activities using their mobile devices,” said Zigdon. “This is compounding the cybersecurity threat, as so much sensitive data, files, and information are being processed using BYOD devices. With mobile devices being so prone to, for example, phishing attacks, all that a hacker needs to do in order to gain access to the IT network is to send an innocent-looking SMS or an e-mail with a link to one of the organization’s employees. Once any one of those employees clicks thelink, a whole chain of hacking events is set in motion, eventually infecting the entire organization’s IT and iOT network. “

These attacks occur on a daily basis,” summarizes Shimon, ”yet many of them stay unreported for various reasons. CISOs need to consider the risks and the potential damage, and take proactive steps in order to mitigate such threats.”

 

For information about Assac Networks’ ShieldiT app, a comprehensive smartphone and mobile communication security solution to protect organizations against cyberattacks, data breaches, and eavesdropping, please leave your details and we will contact you ASAP.

 

Can you tell if a hacker has control over your smartphone?

Can you tell if a hacker has control over your smartphone?

Cyber attacks that target mobile devices are becoming more common, as cybercriminals take advantage of the relative ease with which these devices can be hacked. In many cases, a hacked smartphone is used in order to gain access to organizations’ IT networks and steal vital information.

According to a McAfee’s report, in the first quarter of 2019 alone, more than 35 million cyber hacking incidents involving mobile devices took place, 10 million more than in the previous quarter. In addition, during September 2019 alone, about 172 malicious apps were identified in the Google Play Store, and those were downloaded more than 335 million times. The numbers of malicious apps are astronomical, and are only expected to grow from year to year.

“There are thousands of different types of malicious apps out there that are installed on millions of mobile devices,” says Shimon Zigdon, CEO and founder of Assac Networks, a cyber defense company which developed ShieldiT, the first-ever app to provide both anti-hacking and anti-tapping protect3ion for smartphones and mobile communications. “These malicious apps run covertly, without the devices’ users ever knowing about it. While the goal of some of these apps is to simply make money by displaying advertisements, the goals of many other malicious apps is to collect data stored in mobile devices, record everything the user types in, such as bank account information, credit card numbers, personal data, etc. The information collected by these apps is transmitted to cyber criminals, who can use it in a variety of harmful ways.”

“For example, it’s quite possible that every time you log into your bank account, or make a purchase from a website using your credit card, a malicious app installed on your device collects the data you type in and transmits it to a hacker,” says Zigdon. “The risk of malicious applications can go much further when it comes to employees of commercial and government organizations, because a hacked mobile devices can easily be used by cyber criminals to access organizations’ IT networks and servers – mail, data, sensitive files, etc,  steal organizational  data, install malicious software and more.”

How easy is it for hackers to install malicious apps on a mobile device? Very easy

“Hackers no longer need for you to install a malicious app,” Shimon adds. “All they need you to do is click a video on any social channel or an icon on a website, and from that point onwards, what is yours is theirs to know. Without an anti-hacking detection and protection app, you will never know that their app is running in the background, wreaking havoc to your organization, collecting information about you, and recording all your mobile calls. Those apps can also record whatever is said in the vicinity of the device. Cyber criminals can even turn on the camera and film whatever you’re doing without you ever knowing about it. “

The only way to mitigate these threats is to use an app that continuously monitors and scans your mobile device, and detect if any malicious apps are running on it,”  adds Shimon. “That’s the reason we’ve developed ShieldiT. It’s a single solution that protects individuals and organizations against both hacking and tapping. You can find apps that protect you from either tapping OR hacking, but ShieldiT is unique in that it provides dual protection- from both hacking and tapping. “

ShieldiT was originally developed to meet the need of governmental and HLS security organizations, but with cyber threat and attacks on BYOD becoming so ubiquities, the technology was adapted to meet the security needs of enterprises, telecom service providers, and other organizations. The app’s anti-tapping protection utilizes military-grade encryption technology and provides anti-tapping protection even in scenarios where the party on the other end of the call uses a non-encrypted device.

“ShieldiT is in fact the only app today that provides comprehensive protection – against malicious apps, wiretapping, and also the interception of text messages made from the device,” summarizes Shimon. “The solution thus provides private users and especially organizations with the protection they need through computer-based learning identification., thereby it can even detect and prevent ZERO DAY attacks.”

For further information about ShieldiT anti-hacking and anti-tapping protection for smartphones and mobile communications, please contact us:
https://assacnetworks.com/contact/