Cummings Engineering Releases SecureMobile 1.0

Cummings Engineering has released its flagship product, SecureMobile™ 1.0, powered by SAIFE,™.

Cummings provides market leader for secure voice and data products and the Bring Your Own Device, or BYOD, initiatives to government, law-enforcement, homeland security and military markets where protecting privileged communications is critical. The company has been conducting pilots with the US Military for the past year as part of a Government-Only Early Adopter Program. 

“We deliberately designed our pilots to gain firsthand working knowledge of what our government customers’ real needs are by working closely with them as they tested SecureMobile for both vulnerabilities and utility,” said Darren Cummings, President, Cummings Engineering. “We were committed to releasing a product only when we felt the appropriate security was achieved – the stakes are too high for our customers. We are confident this product represents the highest level of secure communications on a commercial off the shelf (COTS) device today.”

Cummings’ products employ a patent-pending cryptographic foundation for all of its products which has been validated by the US Government’s National Institute of Standards & Technology’s Federal Information Processing Standards Publications (FIPS 140-2).

While this security solution is already in use at the federal level, this product launch hopes to bring the highest level of mobile security to new federal government organizations, as well as state and local law enforcement agencies.

Cummings Engineering built its products and innovations around patent-pending Cummings’ technology named the “Secure Agile Interoperable Framework for the Enterprise (SAIFE).” SAIFE enables users to achieve trusted mobile security and information sharing across any network and any device.

The technology leverages military grade encryption, known as the Suite B algorithms from the National Security Agency (NSA), to apply the highest grade of security available in the commercial market.

“Commercial mobile devices are ubiquitous and important as they help our government IT departments by lowering costs. However, mobile security is difficult, and connecting them can create a significant threat to the system and the people they support. SecureMobile is the first of many applications powered by SAIFE to overcome these threats and help enable trusted use of commercial phones, tablets and networked devices,” said Cummings. “July 4th represents independence for our government customers by enabling the ability to leverage commercial devices on trusted networks.”


 

Featured

  • Making the Grade with Locks and Door Hardware

    Managing and maintaining locks and door hardware across a school district or university campus is a big responsibility. A building’s security needs to change over time as occupancy and use demands evolve, which can make it even more challenging. Knowing the basics of common door hardware, including locks, panic devices and door closers, can make a difference in daily operations and emergency situations. Read Now

  • Choosing the Right Solution

    Today, there is a strong shift from on-prem installations to cloud or hybrid-cloud deployments. As reported in the 2024 Genetec State of Physical Security report, 66% of end users said they will move to managing or storing more physical security in the cloud over the next two years. Read Now

  • New Report Reveals Top Security Risks for U.S. Retail Chains

    Interface Systems, a provider of security, actionable insights, and purpose-built networks for multi-location businesses, has released its 2024 State of Remote Video Monitoring in Retail Chains report. The detailed study analyzed over 2 million monitoring requests across 4,156 retail locations in the United States from September 2023 to August 2024. Read Now

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

Featured Cybersecurity

Webinars

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3