Evidence the presence of unauthorised electronic devices in STRAP rooms and other top secret areas.
Deliver a robust mobile device abuse assurance capability to government and enforcement authorities.
SECURE AREA SURVEILLANCE
24/7 live monitoring provides assurance and real-time alerting. Logged activity is available for later investigation.
AN EFFECTIVE DETERRENT
All staff will understand that ignoring regulations will result in being detected by Mobilewatch.
Provides evidence for investigations, particularly where devices ownership has been authorised.
Advanced technical capability to routinely manage security and personnel in wide range of restricted areas
24/7 monitoring of all active mobile devices in designated zones.
COVERS ALL SIGNALS
Detects all mobile signals across all networks, i.e. 2G, 3G, 4G, LTE, WiFi and Bluetooth.
COVERS MULTIPLE SITES
As a networkable solution, you can monitor various locations from one location (e.g. London). UK bases, foreign bases and locations in operational theatres.
OPERATES VIRTUAL ZONES
Virtual policy controlled zones can be created at each monitored site in order to trigger alerts and provide occupancy metrics.
Provides automated real-time alarms, device position and its network address as well as detailed historical playbacks (from 6 months up). Alarms are automatically sent to a control room / security officer for investigation.
COVERS ALL DEVICES
Accurately measures and maps the journey of all authorised devices and alarms instantly when any unauthorised device is used.
IDENTIFIES DEVICES WITH MDM
Integration with major mobile device management (MDM) systems enables Mobilewatch to identify and enroll consented devices and differentiate between authorised (issued) and unauthorised (private) devices.
Policy-driven MDM integration can automatically de-activate certain vulnerable applications (including cameras, voice recording and social media apps) in designated zones.
Enables customised analytics and statistics via bespoke API. For example, the statistics can show the zonal journey of a device over a selected time range, connections between the devices, mergers of the user devices, their dwell time and provide required incident analytics.
ANONYMOUS AND PRIVACY COMPLIANT
Devices and counted passively and anonymously, meaning there is no intrusion into people’s privacy, as the system does not match a device with a person without their consent.