PEOPLE ON THE MOVE

The protection of privacy and confidentiality has become essential for exposed individuals and organizations that intensively use cellular networks to communicate while on the move in challenging environments. Connected devices are open to the world, ideal for personal and professional use, but are now faced with a fast-growing surface of attacks that represent as many opportunities for malicious actions.

The solution is based on a trusted mobile carrier that not only protects calls, texts and data transmissions, but also secures critical information accessible from signaling networks and attacks on mobile networks.

Main advantages and benefits of the Dust Mobile solution:

Robust end-to-end voice and data protection – Dust Mobile is a “secure by design” carrier that provides end-to-end communication security through encryption, strong authentication and rights management, supported by proprietary mechanisms held at the SIM card and cellular network level.

Usage Protection – High-grade protections against mobile cyber threats and attacks inherent to cellular networks, such as identity theft, disclosure of user information, interception of communications or denial of service.

Global and Resilient Network Coverage – Carrier-class 2G / 3G / 4G Lte / 5G connectivity in 203 countries and territories with access to at least two cellular networks per country where possible, allowing you to benefit from the best network available at all times.

Optimised network performance – Taking advantage of the qualities of a true private network – the worldwide GRX-IPX network used by Dust Mobile is reserved for telecom operators – the Dust Mobile solution offers lower latency and higher availability, regardless of the country visited, compared to standard roaming connectivity.

Enhanced User Experience – Getting connectivity wherever possible by automatically or manually switching to the best cellular connectivity available among Dust Mobile’s 580 cellular network partners (MNO) worldwide, and always with the same level of security.

All the services of a mobile operator but in shielded mode Unified communications with data services, voice calls, conferencing, instant text messaging, file transfer and protected Internet access. People use their usual mobile device without constraint or change of habits. The Dust Mobile’s services are transparent for user and correspondent.

Diversification of usage and concept of operations – several phone numbers from more than 100 countries on a single Dust Mobile SIM card for protected conversations with any fixed or mobile PSTN number (direct termination of calls in the correspondent’s country) and one Dust phone number for end-to-end encrypted communications, without routing through networks open to the public (only Dust to Dust)

Ease of use The Dust Mobile technology is simple and non-invasive, totally transparent to the user, who can continue to use applications and services as usual. This ease of use minimizes human factors risks and the adoption rate of the solution without any attempt to circumvent it.

Fast and easy to implement – Requiring no complex software installation or updates, the Dust Mobile solution is agile and adapts to any size of organization. The solution can be integrated and controlled to build a secure private network between a fleet of Dust Mobile SIM cards and the customer information systems.

Real-time supervision and control – an administrator can monitor the Dust Mobile SIM fleet in real time (activity, usage, security and signaling, except for content that is protected) and can remotely control all security, connectivity and signaling functions. In addition, alerts, security profiles and filters can be deployed at the level of each SIM card.

Highly competitive business model – two approaches based on customer needs, but which include by default all the security offered by the Dust Mobile solution after the purchase of a Dust Mobile sim card.

“Pay-as-you-go”, billing is based on usage only with the price of communications and data exchanged at extremely competitive international rates.

“All-in Plan”, a monthly plan that includes a volume of communications and data exchanges, then a metered rate beyond that.

Protecting privacy and sensitive informations

USE CASE

Designed for people at risk who use their smartphone as their primary daily tool and who wish to protect not only their professional activity but also their privacy from targeted cyber attacks without having to deploy or maintain any additional infrastructure but keeping the use of their favorite apps and security software.

The Dust Mobile solution is ideal for protecting mobile communications against attacks that are intrinsic to cellular networks, but also against malware, ransom software, identity theft, interception and other malicious applications that threaten board members, executives, celebrities, exposed individuals and their entourages.


SOLUTIONS

Dust Wide – All-in Plan

with a smartphone or a 4G tablet

Contact us for more details or book a brief with an expert.

Working remotely but securely

USE CASE

The increase in the number of remote workers has generated a strong growth in cyber incidents. The use of non-recommended applications as well as the presence of security threats in non-updated applications have demonstrated the need to improve the level of protection leveraged by an efficient communication security, among other things.

It is quite a challenge for companies and organizations to deploy new security policy, manage and continuously update secure virtual private network with a scalable software and hardware infrastructure to serve individual devices that are not always up-to-date.


SOLUTIONS

Dust World – Pay-as-you-go
Dust Wide – All-in Plan

with a 4G USB Dongle, a mobile broadband router, a connected laptop, a Smartphone or a 4G Tablet.

Contact us for more details or book a brief with an expert.

Mitigating mobile cyber threats everywhere

USE CASE

International mobility mean that companies, organizations and their employees are exposed to an increased risk of cyber attacks that exploit vulnerabilities to access sensitive data and information. The use of WiFi or connection to data, voice and SMS services via an unsecured cellular network is an additional threat factor for the disclosure and interception of information (MitM).

The Dust Mobile solution is designed for professionals and exposed individuals who travel frequently or are on assignment in foreign countries and work on strategic and sensitive projects on a permanent or occasional basis.


SOLUTIONS

Dust World – Pay-as-you-go

with a 4G USB Key, a smartphone, a tablet, or a mobile broadband router

Contact us for more details or book a brief with an expert.

BUSINESS and MISSION CONTINUITY

To effectively support a business continuity plan for critical or sensitive activities, it is important to rely on an alternative communication network that is efficient, reliable, and available in case of emergency, but also secure.

Traditional solutions based on wireless networks are exposed to threats inherent to mobile networks such as interception of communications, disclosure of usage information or denial of service.

An equally necessary element is the resilience of the connectivity and its ability to provide the widest possible service coverage while enjoying the best quality of service available at a given bridge.

The solution is based on a trusted mobile carrier that not only protects calls, texts and data transmissions, but also secures critical information accessible from signaling networks and attacks on mobile networks.

Main advantages and benefits of the Dust Mobile solution:

Robust end-to-end data protection – Dust Mobile is a “secure by design” carrier that provides end-to-end communication security through encryption, strong authentication and rights management, supported by proprietary mechanisms held at the SIM card and cellular network level.

Usage Protection – High-grade protections against mobile cyber threats and attacks inherent to cellular networks, such as identity theft, disclosure of user information, interception of communications or denial of service.

Global and Resilient Network Coverage – Carrier-class 2G / 3G / 4G Lte / 5G connectivity in 203 countries and territories with access to at least two cellular networks per country where possible, allowing you to benefit from the best network available at all times.

Optimised network performance – Taking advantage of the qualities of a true private network – the worldwide GRX-IPX network used by Dust Mobile is reserved for telecom operators – the Dust Mobile solution offers lower latency and higher availability, regardless of the country visited, compared to standard roaming connectivity.

Enhanced Experience – Getting connectivity wherever possible by automatically or manually switching to the best cellular connectivity available among Dust Mobile’s 580 cellular network partners (MNO) worldwide, and always with the same level of security.

Fast and easy to implement – Requiring no complex software installation or updates, the Dust Mobile solution is agile and adapts to any size of organization. The solution can be integrated and controlled to build a secure private network between a fleet of Dust Mobile SIM cards and the customer information systems.

Real-time supervision and control – an administrator can monitor the Dust Mobile SIM fleet in real time (activity, usage, security and signaling, except for content that is protected) and can remotely control all security, connectivity and signaling functions. In addition, alerts, security profiles and filters can be deployed at the level of each SIM card.

Highly competitive business model – two approaches based on customer needs, but which include by default all the security offered by the Dust Mobile solution after the purchase of a Dust Mobile sim card.

“Pay-as-you-go”, billing is based on usage only with the price of communications and data exchanged at extremely competitive international rates.

“All-in Plan”, a monthly plan that includes a volume of communications and data exchanges, then a metered rate beyond that.

Crisis Management and ad-hoc com’s

USE CASE

In the world of sensitive activities and critical missions, a crisis can strike without warning at any time. Authorities and management must develop sound strategies and deploy reliable solutions to respond quickly to crises that may arise, so that their organization can continue to operate in a secure environment and maintain optimal operational conditions.

Crises can take many different forms, but they all share the need to maintain secure communications alternatives that enable the execution of a crisis management strategy tailored to the needs of rapidly evolving situations.

Dust Mobile supports continuity initiatives by providing :

– strengthening resilience and countering vulnerabilities
– Risk-free testing of continuity plans
– Quickly form an integrated crisis management team
– Overcoming traditional barriers and deploying ad hoc connectivity
– Adapting plans to many unknowns
– Relying on an external framework of trust not targeted by the crisis


SOLUTIONS

Dust World – Pay-as-you-go
Dust World IoT – Pay-as-you-go
Dust Wide – All-in Plan

with a mobile broadband router or modem, a connected laptop, a Smartphone, a 4G Tablet and connected sensors.

Contact us for more details or book a brief with an expert.

Resilient and improved mobile connectivity

USE CASE

Companies and organizations expect a mobile carrier to provide continuity of service to support their operations whatever the conditions. This is based on
– the geographical coverage
– the availability and persistence of the communication service on the move
– the quality of connectivity over time
– the capacity to absorb the traffic in a given place

The major operators demonstrate an excellent level of performance, but this is not always consistent across the entire scope of activities of an organization or company, especially if these same activities cover several countries and territories.

With generally more than one cellular network per country (except monopoly countries), the Dust Mobile solution offers an optimized quality of service with a switch to the best connectivity offered by the 580 network partners available worldwide, automatically or manually, locally or remotely, at the user’s choice.


Solutions

Dust World IoT – Pay-as-you-go

with a 4G USB Key, a smartphone, a tablet, a connected laptop, a mobile broadband router, connected objects and M2M devices

Contact us for more details or book a brief with an expert.

Critical infrastructure and secure “pop-up” network

USE CASE

Businesses, government agencies, organizations and emergency services must be able to quickly and easily deploy secure and reliable connectivity between sites and their operating infrastructures. Often, these temporary or remote sites do not provide a reliable telecommunication infrastructure that can be made available quickly on demand without significant setup costs and lead time to deliver.

Dust Mobile contributes to the resilience of remote sites in the event of a failure of permanent telecommunications resources to enable continuity of operations and capacity to keep control of a remote infrastructure in the event of severe cyber attack.

Critical infrastructure management and security managers want dedicated, private and secure communication resources to maintain remote control of their critical equipments without depending on the availability and security of WAN links.

Dust Mobile enables a reliable and protected out-of-band network and distant connectivity to be deployed anywhere in the world in just a few minutes, to meet the needs of users without constraints and benefitting from embedded security whatever the operational needs and usage concepts.


SOLUTIONS

Dust World IoT – Pay-as-you-go

with an advanced mobile broadband router

Contact us for more details or book a brief with an expert.

Operational readiness and network failover

USE CASE

Exposed organizations regularly review their dependencies and ability to withstand accidental or malicious communications failures.

One response is to deploy reliable alternative telecommunications capabilities to automatically switch to a secure backup network if the primary network fails or is temporarily unavailable for maintenance.

To ensure business continuity and maintain the minimum vital operational capacity, organizations must always count on a reliable, secure, resilient and fully segmented communications network.

The Dust Mobile solution provides such a solution based on cellular network connectivity with seamless protection at the local or global level.


SOLUTIONS

Dust World IoT – Pay-as-you-go

with an advanced mobile broadband router

Contact us for more details or book a brief with an expert.

OPERATIONAL PERFORMANCE & INDUSTRIAL CAPABILITY

Industry 4.0 – the ability of machines, devices, sensors and people to connect and interact with each other – is leading to a massive increase in the volume of sensitive data being transmitted. This increased exposure of industrial processes to the risk of cyber attacks requires increased security for data exchanges and remote access, among other things.

Main advantages of the Dust Mobile solution :

Robust end-to-end protection of data exchanges against threats and attacks intrinsic to cellular networks, such as identity theft, disclosure of user information, interception of communications or denial of service.

Global and resilient network coverage with carrier-class 2G / 3G / 4G Lte / 5G cellular connectivity in 208 countries and territories with at least two networks per country (excluding monopoly countries) providing the best network available at all times.

Fast and easy to implement cat requires no specific infrastructure or complex software to install or maintain, the Dust Mobile solution adapts to any operational concept.

Real-time supervision and control of SIM cards (activity, usage, security and signaling) allows remote control of the cellular environment, all security and signaling functions. In addition, alerts and filters can be deployed at the level of each SIM card.

Machine to Machine secure connectivity – M2M

USE CASE

The security requirements of machine-to-machine (M2M) networks are crucial for strong authentication, encryption key exchange and data transmission. If the communication support network is not secured and managed in an inefficient way, all systems are at risk and therefore doomed to face numerous cyber-attacks compromising the availability of services, capacity to remote-control machines and the confidentiality of critical informations.

Dust Mobile, as a “secured-by-design” mobile carrier, offers an end-to-end M2M communications security solution linked to strong multi-level authentication supported by its “hardware secure element” and a homogeneous service coverage throughout the world.


SOLUTIONS

Dust World IoT – Pay-as-you-go

with mobile broadband modem and GSMA compliant device

Contact us for more details or book a brief with an expert.

Secure networking connected objects – IoT / IIoT / IoP

USE CASE

It is essential to ensure end-to-end security for connected objects. Businesses and organizations deploying IoT, IIoT, IoP in mission-critical environments are looking to integrate enhanced security to ensure secure and reliable solutions that all stakeholders can rely on, with the smallest possible attack surface, along with real-time security monitoring capability. They need to build trust, take steps to protect critical data, and respond to new requirements with a unified and collaborative approach.

The diversity of connected devices requires a flexible security framework and a trusted partner capable of supporting the industry worldwide with a consistent level of service and connectivity.

Dust Mobile, as trusted operator, offers this secure, resilient and reliable solution and supports enterprises and manufacturers implementing an appropriate security framework that meets these requirements.


SOLUTIONS

Dust World IoT – Pay-as-you-go

with mobile broadband modem and GSMA compliant device

Contact us for more details or book a brief with an expert.