D-RISK® Mobile

Preventing loss of data, privacy, infrastructure, intellectual property and more

D-RISK Mobile is a compact, portable, smart security gateway device that provides complete end-point protection.

D-Risk Mobile

Indicates number of endpoint devices connected to D-RISK Mobile

1 of 5

Displays upload and download speeds

2 of 5

Displays current battery life for D-RISK Mobile device

3 of 5

Full touch screen for performing device management

4 of 5

Menu button provides ability to manage D-RISK mobile device through touch screen capability

5 of 5

COMING SOON

D-RISK® Mobile Rugged Version

When things get rough, we still have you covered

The D-RISK mobile Rugged version is build with the same capabilities as the standard version of D-RISK mobile, but also includes ruggadized casing to provide the ultimate protection during transportation, operation and storage.

PORTABLE & COMPACT

A portable device that employs the most advanced data forensics detection and monitoring techniques available.

AI INSIGHTS

By using the power of machine learning, identify, authenticate, and protect user endpoint devices wherever the user may be, anywhere in the world.

ASSET MANAGEMENT

D-RISK Mobile enables seamless, device management allowing you to maintain complete control of how your endpoint devices are protected.

PRIVATE COMMUNICATIONS

Circles of Trust® (CoT) can be created to provide unparalleled security to protect endpoint devices and their data communications over exploited and untrusted networks.

VULNERABILITY ANALYSIS

Identify, Protect, Detect and respond to vulnerabilities before the risk increases

SIMPLIFIED IoT DEVICE PROTECTION

Defend against cyber threats and attacks via predictive analytics to monitor and detect anomalies from all inbound and outbound attack vectors.

ADVANCED ENCRYPTION

Provides for secure Data-at-Rest, Data-in-Transit, and edge computing protection.

Device end-point protection that's easy, customizable, and low cost

By leveraging Artificial Intelligence and Machine Learning, the D-RISK Mobile device offers security while on the go, now and in the future. The proprietary algorithm provides Static, Dynamic, and Predictive Analysis of activity coming and going from computing and IoT devices. Regularly updating threat profiles ensures safe performance, secure data, and inoculation from multiple attack vectors.

Formatted and designed for ease of use and customer peace of mind, each device can be programmed with our custom Circle of Trust architecture. Built upon the concept of zero trust, this feature allows people or devices to communicate in a completely secure manner. 

For example, D-Risk mobile allows individuals to send information instantly from anywhere in the world via a private network without the need for a central server.

Unlike other solutions, Cervais’ D-RISK Mobile incorporates the best-in-breed security mechanisms to provide a “defense-in-depth” approach to protect user endpoint devices.

Comprehensive Security. Many Needs. One Solution.

As endpoint devices connect to D-RISK mobile and access the internet, DRM monitors the traffic coming to and from the endpoint device.

We can protect data flowing through Bluetooth and WiFi devices such as physical security cameras, scada devices, POS devices and so much more.

Our game changing technology introduces our custom Circle of Trust architecture, built upon the concept of zero trust. Our secure messaging ecosystem allows people or devices to communicate in total privacy through voice, chat, and data sharing.

We have created an undetectable, untraceable and unhackable environment through P2P communications.

With the use of Quantum encryption which provides an added layer of security, DISK Mobile users can be confident that that they are protected in the most safe and secure manner.

Organizations have the ability to configure the encryption strength of the D-RISK Mobile device depending on the requirements and needs of their employees.

D-RISK Mobile closes the gaps that currently exist with inadequate security resulting in Loss of data, Loss of privacy, Loss of critical infrastructure, and Identity Theft. Our customers are able to focus on managing their businesses instead of worrying about cyber threats.

D-RISK Mobile technical specifications

Performance 

  • Operating System: Linux 3.18 to Android 10
  • Application Processor: Octa-core ARM Cortex-A53 64-bit CPU @2.0GHz performance
  • GPU: Adreno 506 with 64-bit addressing, designed for 600MHz
  • Memory: 16GB eMMC + 2GB LPDDR3

Connectivity

  • Wi-Fi 802.11a/b/g/n/ac 2.4GHz/5GHz – Max 433Mbps
  • Bluetooth BT4.2 LE 2402MHz~2480MHz
  • Cellular Features Cat 6 FDD: Max 300Mbps (DL) / Max 50Mbps (UL)
  • LTE Bands B2 / B4 / B5 / B7 / B12 / B13 / B14 / B17 / B25 / B26 / B66 / B71
  • Unlimited CoT connections, simultaneous client connections

Interfaces

  • SIM Dual SIMs – One (1) internal and One (1) external
  • Ports – 3x USB-C (3.0) ports, 1xRJ45 – Supports hardwired transmission rates up

Physical

  • Dimensions 4.17 in x 4.17 in x 1.14 in
  • Weight 5 oz
  • Touchscreen 2.1” color touchscreen, 480 x 480 resolution
  • Battery 10000mAh, up to 12hrs, Power Bank functionality with external device charging

Security

  • Features Provides Quantum Hardware Encryption, Secure Boot, Firmware Signature, Content Protection, Data-at-Rest / Data-in-Transit Protection, Key Management