Information security
on MIG devices
Large Russian companies are increasingly looking for opportunities to create automated workstations (AWS) for field employees. Industrial mobile devices are designed to work in an aggressive environment, but there are no lesser requirements for information security. Many of our customers operate in critical infrastructures. These are assets and activities that are particularly critical to the functioning of the government. When such organizations issue tablets or smartphones to their employees, they must be fully confident in the high level of information security. The use of household gadgets is associated with the risks of data leakage through «embedded» services and hardware blocks (travel routes, personal data, calls, contacts, etc.). Therefore, large businesses are starting to pay attention to mobile devices compatible with domestic encryption systems that provide security at the level of desktop computers. This approach allows to maintain a consistently high level of protection for line staff, employees working with state secrets and for the security service of the enterprise.
All MIG industrial mobile devices are designed for public sector and critical infrastructure applications. Our tablets and smartphones are compatible with the majority of Russian encryption systems, antivirus and EDS.
All MIG industrial mobile devices are designed for use in the public sector and critical infrastructure facilities. Therefore, special attention is paid to information security as well as compatibility with domestic encryption systems.
Depending on the type of operating system,
MIG devices are compatible with various
cryptocurrencies:
Russian operating system
Astra Linux Special Edition Smolensk release
Highest level of protection
Ultra-secure special-purpose OS. The only one in the country that has a full set of certificates of compliance with FSTEC of Russia (maximum first class of information protection and first level of trust), FSB of Russia and Ministry of Defense of Russia.
Tablet MIG T8X x86 5X
MIG T10x86, T8X x86 are compatible with Astra Linux OS.
In June 2021, full-cycle production (surface mounting of the motherboard) of MIG T8X on Astra Linux OS was launched on the basis of Kaluga Telegraph Equipment Plant, which guarantees the absence of built-in hardware plugs and increased information security.
Configurations with physically remote wireless communication interfaces — GSM, Wi-Fi, Bluetooth — are available.
A hardware smart card reader has been developed to work with qualified EDS, as well as with special purpose documents.
NFC reader of devices is adapted for work with documents of new type on chips with encryption according to ISO 14443 h. 4.
Compatible with certified means of crypto-protection of information: VPN, Antivirus, EDS, protection against unauthorized access, MDZ.
Russian operating system
«Aurora»
«Aurora» (Through 2019 — Sailfish Mobile OS RUS) certified by the Federal Security Service of Russia for compliance with the requirements for information protection means of protection classes AK2 and KS2 and by FSTEC for compliance with the requirements of the protection profile of operating systems of type "A" of protection class 4.
Smartphone MIG C55
The MIG C55 is fully compatible with the Aurora operating system in the domestic software registry.
Aurora Center centralized device fleet management system:
- On Premise deployment — solutions within the company’s infrastructure;
- device configuration using policies — limiting and controlling the use of smartphone hardware functions and data networks;
- installation, removal and updating of corporate applications by administrator or user from the trusted Aurora Market repository without user involvement;
- configuration of network settings on end devices;
- combining policies to meet complex security compliance rules;
- centralized management of mobile devices on the Aurora OS;
- sending commands to block access and delete corporate data if devices are lost.
Compatible with certified means of cryptographic protection of information: VPN, Antivirus, EDS.
Windows
Highest level of protection
Tablet MIG T10 x86
Configuration of MIG devices with physically remote wireless communication interfaces — GSM, Wi-Fi, Bluetooth — is available.
A hardware smart card reader has been developed to work with qualified EDS, as well as with special purpose documents.
NFC reader of devices is adapted to work with new type of documents on chips with encryption according to ISO 14443 part 4.
Classic OS versions compatible with certified means of crypto-protection of information are used: VPN, Antivirus, EDS, protection against unauthorized access, MDZ.
Android
Optimal level of protection
Smartphone MIG S6
MIG devices use an enterprise build of Android without the classic set of apps that collect data about the user’s movements, contacts, calls, and other information.
For MIG devices, special firmware is created to meet customer requirements: without GMS services, with blocked wireless interfaces (Bluetooth, Wi-Fi, etc.).
A centralized device fleet management system is available:
- remote control of password protection;
- remote device cleaning;
- detection of a compromised device (rooting).
Compatible with certified means of cryptographic protection of information: VPN, Antivirus, EDS, MDM.
Means of cryptographic protection of information
VPN
solution for effective protection of mobile devices from external and internal network attacks. VPN ensures confidentiality of information transfer and its protection on the mobile device, as well as reliably protects work with corporate data via the Internet
Electronic digital signature
to identify the field worker, sign documents on the mobile device, and securely store and transport information
Software Trusted Boot Module
to identify and authenticate the user before OS loading, to control the integrity of software and hardware of the mobile device before OS loading, as well as to block unauthorized OS loading from external removable media.
System for centralized management and monitoring of mobile devices (MDM)
for managing security policies on MIG devices and centralized installation and configuration of mobile applications
Means of information protection from unauthorized access
Antivirus programs
to detect viruses and unwanted malware, to recover files infected by such programs, and to prevent the
The compatibility of MIG tablets and smartphones with the listed information security tools and encryption systems makes the devices a full-fledged element of the corporate trusted environment.