Enterprise mobility solutions
Equipment development
Automatic identification
Request for technical support
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
page
oborudovanie
info
novosti
our-team
korporativnaya-mobil
proekty

Information security
on MIG devices

Large Russian companies are increasingly looking for opportunities to create automated workstations (AWS) for field employees. Industrial mobile devices are designed to work in an aggressive environment, but there are no lesser requirements for information security. Many of our customers operate in critical infrastructures. These are assets and activities that are particularly critical to the functioning of the government. When such organizations issue tablets or smartphones to their employees, they must be fully confident in the high level of information security. The use of household gadgets is associated with the risks of data leakage through «embedded» services and hardware blocks (travel routes, personal data, calls, contacts, etc.). Therefore, large businesses are starting to pay attention to mobile devices compatible with domestic encryption systems that provide security at the level of desktop computers. This approach allows to maintain a consistently high level of protection for line staff, employees working with state secrets and for the security service of the enterprise.

All MIG industrial mobile devices are designed for public sector and critical infrastructure applications. Our tablets and smartphones are compatible with the majority of Russian encryption systems, antivirus and EDS.

All MIG industrial mobile devices are designed for use in the public sector and critical infrastructure facilities. Therefore, special attention is paid to information security as well as compatibility with domestic encryption systems.

Depending on the type of operating system,
MIG devices are compatible with various
cryptocurrencies:

Russian operating system
Astra Linux Special Edition Smolensk release

Highest level of protection

Ultra-secure special-purpose OS. The only one in the country that has a full set of certificates of compliance with FSTEC of Russia (maximum first class of information protection and first level of trust), FSB of Russia and Ministry of Defense of Russia.

Tablet MIG T8X x86 5X

MIG T10x86, T8X x86 are compatible with Astra Linux OS.

In June 2021, full-cycle production (surface mounting of the motherboard) of MIG T8X on Astra Linux OS was launched on the basis of Kaluga Telegraph Equipment Plant, which guarantees the absence of built-in hardware plugs and increased information security.

Configurations with physically remote wireless communication interfaces — GSM, Wi-Fi, Bluetooth — are available.

A hardware smart card reader has been developed to work with qualified EDS, as well as with special purpose documents.

NFC reader of devices is adapted for work with documents of new type on chips with encryption according to ISO 14443 h. 4.

Compatible with certified means of crypto-protection of information: VPN, Antivirus, EDS, protection against unauthorized access, MDZ.

Russian operating system
«Aurora»

«Aurora» (Through 2019 — Sailfish Mobile OS RUS) certified by the Federal Security Service of Russia for compliance with the requirements for information protection means of protection classes AK2 and KS2 and by FSTEC for compliance with the requirements of the protection profile of operating systems of type "A" of protection class 4.

Smartphone MIG C55

The MIG C55 is fully compatible with the Aurora operating system in the domestic software registry.

Aurora Center centralized device fleet management system:

  • On Premise deployment — solutions within the company’s infrastructure;
  • device configuration using policies — limiting and controlling the use of smartphone hardware functions and data networks;
  • installation, removal and updating of corporate applications by administrator or user from the trusted Aurora Market repository without user involvement;
  • configuration of network settings on end devices;
  • combining policies to meet complex security compliance rules;
  • centralized management of mobile devices on the Aurora OS;
  • sending commands to block access and delete corporate data if devices are lost.

Compatible with certified means of cryptographic protection of information: VPN, Antivirus, EDS.

Windows

Highest level of protection

Tablet MIG T10 x86

Configuration of MIG devices with physically remote wireless communication interfaces — GSM, Wi-Fi, Bluetooth — is available.

A hardware smart card reader has been developed to work with qualified EDS, as well as with special purpose documents.

NFC reader of devices is adapted to work with new type of documents on chips with encryption according to ISO 14443 part 4.

Classic OS versions compatible with certified means of crypto-protection of information are used: VPN, Antivirus, EDS, protection against unauthorized access, MDZ.

Android

Optimal level of protection

Smartphone MIG S6

MIG devices use an enterprise build of Android without the classic set of apps that collect data about the user’s movements, contacts, calls, and other information.

For MIG devices, special firmware is created to meet customer requirements: without GMS services, with blocked wireless interfaces (Bluetooth, Wi-Fi, etc.).

A centralized device fleet management system is available:

  • remote control of password protection;
  • remote device cleaning;
  • detection of a compromised device (rooting).

Compatible with certified means of cryptographic protection of information: VPN, Antivirus, EDS, MDM.

Means of cryptographic protection of information

VPN

solution for effective protection of mobile devices from external and internal network attacks. VPN ensures confidentiality of information transfer and its protection on the mobile device, as well as reliably protects work with corporate data via the Internet

Electronic digital signature

to identify the field worker, sign documents on the mobile device, and securely store and transport information

Software Trusted Boot Module

to identify and authenticate the user before OS loading, to control the integrity of software and hardware of the mobile device before OS loading, as well as to block unauthorized OS loading from external removable media.

System for centralized management and monitoring of mobile devices (MDM)

for managing security policies on MIG devices and centralized installation and configuration of mobile applications

Means of information protection from unauthorized access

Antivirus programs

to detect viruses and unwanted malware, to recover files infected by such programs, and to prevent the

The compatibility of MIG tablets and smartphones with the listed information security tools and encryption systems makes the devices a full-fledged element of the corporate trusted environment.