SYDNEY, Feb. 28, 2017 /PRNewswire/ — Cog Systems, developer of the world’s most secure software platform for connected devices, has made the HTC One A9 the most secure smartphone on the market. It is now commercially available to government and enterprise customers.
Cog Systems has a long heritage in designing and implementing ‘hardened’ mobile devices for select governments. The company leverages their D4 Secure Platform™ to develop SDKs for specific categories of connected devices. D4 Secure SDKs™ protect organizations and their users with an unparalleled level of data and system security without sacrificing the flexibility to run any application – safely and securely. This same technology and expertise is now available for use in the commercial markets.
“With 73 percent of all Americans having fallen victim to some type of cyber crime, everyone needs a secure device, not just select government agencies,” said Cog Systems CEO Dr. Daniel Potts. “Our D4 Secure SDK – Mobile is about to upgrade the level of mobile security available to the enterprise market for the first time.”
The D4 Secure SDK – Mobile runs on the HTC One A9. This solution is the most secure device on the market. In fact, the U.S. Department of Defense has recently acquired the first round of commercially available devices for their own internal use.
The HTC One A9, Secured by D4, is an ultra-secure smartphone built on a type 1 hypervisor with enhanced storage encryption, non-bypassable VPN, support for nested VPNs, plus many other advanced security features.
The HTC One A9, Secured by D4 is now available by contacting Cog Systems directly or through select carriers and resellers. As the product is built on a commercial device, even with the substantially added layers of security, the cost has stayed consistent with the existing commercial pricing for the device.
“Our D4 Secure SDK – Mobile is just the beginning,” said Potts. “We are expanding the D4 Secure Platform to other connected devices beyond mobile, including gateways and IoT devices. This broad reach will allow for a complete ecosystem approach to unlocking the true potential of connected devices while gaining a level of security that can be trusted.”