Layered solutions are the backbone of our secure mobile approach. Layers of commercial encryption, layers of authentication and authorization, boundary protection, appropriate hardening of devices and appropriate physical security measures all contribute to the overall security. In order to ensure interoperability, our solution relies on COTS equipment, open standards/protocols, and avoids proprietary hardware and software requirements. Sensitive data is protected by means of multiple layers of approved commercial cryptography as well as incorporated data-at-rest protection measures for sensitive information on the devices. Please click here for Resilient Point’s Secure Mobility Facts sheet.