slaider
Product catalog:

The best solution in the field
protection of information

slaider
Information Security

The best solution in the
protection of information

slaider
Communication network

The best solution in the
protection of information

slaider
Monitoring cyberspace
early warning

The best solution in the
protection of information

slaider
Integrated information system

The best solution in the
protection of information

slaider
Mobile phone monitoring
and the positioning system

The best solution in the
protection of information

slaider
Radio Frequency Detector
and an interference generator

The best solution in the
protection of information

» Catalog
All products
Information Security
Communication network
Monitoring cyberspace early warning
Integrated information system
Mobile phone monitoring   and the positioning system
Radio Frequency Detector   and an interference generator
Digital forensics
Vulnerability Management System

Vulnerability management system is capable of detecting all vulnerability risks in the network, providing professional and effective security analysis and repair advice, and auditing repair result according to security management process so as to reduce attack influence to the largest extent.

 

Vulnerability Management System
Write the E-Mail, we will contact you within days.



Penetration Test System

Automatic penetration test system focuses on automatic simulation of hacker penetration and integrates functions modules such as automatic penetration, vulnerability verification and social engineering. It is used for red team to test defense result of security system and for improving employees’ security awareness.

 

Penetration Test System
Write the E-Mail, we will contact you within days.



Next Generation Firewall

Privis firewall is independent designed next generation firewall which provides comprehensive security protection from layer 2 to layer 7 for the mobile Internet era. Privis firewall can achieve in – depth analysis of users, applications and content to provide users high performance, visualization, accurate and effective integration of application layer security protection system.

 

Next Generation Firewall
Write the E-Mail, we will contact you within days.



CyberInsight Radar System

CCSC system which could detect the Internet and business intranet. It can collect information of the network assets, equipments activities, geographical location, organization, service providers and other basic information. It could also recognize equipment type, equipment brand, equipment model, equipment versions, open ports, provision of services and usage of components.

 

CyberInsight Radar System
Write the E-Mail, we will contact you within days.



WebSOC Website Multi-demensional Monitoring System
Write the E-Mail, we will contact you within days.



APT Advanced Persistent Threat Detection System
Write the E-Mail, we will contact you within days.



Secure VoIP and IM Communication System

Without any changes to network topology (IMS/soft switch) and communication infrastructure, it provides VoIP service with secure encryption protection, and seamlessly integrates with 3G, 4G IP mobile terminals. A SIP-based VoIP security system is built.

Secure VoIP and IM Communication System
Write the E-Mail, we will contact you within days.



Privis 3.1 Cloud Key

A NIST/CSE certified hardware based cryptographic offload engine that deploys the latest USB 3.1 10Gbps speed with AES ECB or CBC 256-bit strength.
Allow user to encrypt data in place by selecting target file/folder on any host computer detectable storage drives, including those cloud drives.
You own the physical key and no one else has it.

Privis 3.1 Cloud Key
Write the E-Mail, we will contact you within days.



USB Encryptor 2.0

USB pass-through dongle with AES 256-bit hardware encryption.   The Privis USB Encryptor is a USB ciphering dongle that transparently encrypts data stored inside any USB drive including Blu-Ray DVD, DVD R/W, CD-R, thumb drive, hard disk or any flash card inserted into a USB card reader. Installation is easy. Simply insert the USB drive […]

USB Encryptor 2.0
Write the E-Mail, we will contact you within days.



Cryptophone

Smartphone with Security Applications Installed SecCall are application that realize secure VOIP voice and secure IM communications respectively. Smartphone installed thet application together with TF crypto card fulfill these secure service. SecCall is the application for secure packet domain calls and is the application for instant messaging including text, voice-text and pictures.

Cryptophone
Write the E-Mail, we will contact you within days.



SIP-based VoIP Security System

Developed by Privis under its sole intellectual property, SIP-based VoIP Security System provides end-to-end encryption services to SIP-based VoIP system. Attaching it to soft switch / IMS network without any changes to network topology and communications infrastructure, it offers systematic, high-strength, and high-quality VoIP secure communication solutions. 

SIP-based VoIP Security System
Write the E-Mail, we will contact you within days.



Secure Walkie-talkie

Secure Walkie-talkie provides a convenient and secure way for voice communication. Its high-strength crypto algorithm defends against any malicious eavesdropping. It is an ideal communication device for government, military, and data-sensitive agencies.

Secure Walkie-talkie
Write the E-Mail, we will contact you within days.



Privis 3.1 Cloud Key

A NIST/CSE certified hardware based cryptographic offload engine that deploys the latest USB 3.1 10Gbps speed with AES ECB or CBC 256-bit strength.
Allow user to encrypt data in place by selecting target file/folder on any host computer detectable storage drives, including those cloud drives.
You own the physical key and no one else has it.

Privis 3.1 Cloud Key
Write the E-Mail, we will contact you within days.



USB Encryptor 2.0

USB pass-through dongle with AES 256-bit hardware encryption.   The Privis USB Encryptor is a USB ciphering dongle that transparently encrypts data stored inside any USB drive including Blu-Ray DVD, DVD R/W, CD-R, thumb drive, hard disk or any flash card inserted into a USB card reader. Installation is easy. Simply insert the USB drive […]

USB Encryptor 2.0
Write the E-Mail, we will contact you within days.



Cryptophone

Smartphone with Security Applications Installed SecCall are application that realize secure VOIP voice and secure IM communications respectively. Smartphone installed thet application together with TF crypto card fulfill these secure service. SecCall is the application for secure packet domain calls and is the application for instant messaging including text, voice-text and pictures.

Cryptophone
Write the E-Mail, we will contact you within days.



SIP-based VoIP Security System

Developed by Privis under its sole intellectual property, SIP-based VoIP Security System provides end-to-end encryption services to SIP-based VoIP system. Attaching it to soft switch / IMS network without any changes to network topology and communications infrastructure, it offers systematic, high-strength, and high-quality VoIP secure communication solutions. 

SIP-based VoIP Security System
Write the E-Mail, we will contact you within days.



Secure Walkie-talkie

Secure Walkie-talkie provides a convenient and secure way for voice communication. Its high-strength crypto algorithm defends against any malicious eavesdropping. It is an ideal communication device for government, military, and data-sensitive agencies.

Secure Walkie-talkie
Write the E-Mail, we will contact you within days.



SEC-34 IP Encryptor (VPN)

VPN encryptor adopts self-designed security operating system and provides comprehensive security functions to meet data security protection needs in various network environments.
Besides data encryption, VPN encryptor can also provide some traditional security functions such as packet filtering, DDOS anti-attack, anti-virus and hot standby etc.

SEC-34 IP Encryptor (VPN)
Write the E-Mail, we will contact you within days.



SEC-33 Tel/Fax Encryptor

SEC-33 Tel/Fax Encryptor applies to various public or private phone networks like PSTN, emergency satellite communication system etc. to make end-to-end encryption for client important phone call and fax information. The encryptor guarantees data security while in transmission line, thus effectively prevents clients’ sensitive information from being intercepted through transmission line.

SEC-33 Tel/Fax Encryptor
Write the E-Mail, we will contact you within days.



SEC-30 Link Encryptor

Since it is rather easy for the adversaries to intercept signal of microwave, troposcatter and satellite communications, measures have to be taken to preserve the confidentiality of the data being transmitted. The most effective way to protect data confidentiality is to have it encrypted before transmission.

SEC-30 Link Encryptor
Write the E-Mail, we will contact you within days.



Secure VoIP and IM Communication System

Without any changes to network topology (IMS/soft switch) and communication infrastructure, it provides VoIP service with secure encryption protection, and seamlessly integrates with 3G, 4G IP mobile terminals. A SIP-based VoIP security system is built.

Secure VoIP and IM Communication System
Write the E-Mail, we will contact you within days.



Cryptophone

Smartphone with Security Applications Installed SecCall are application that realize secure VOIP voice and secure IM communications respectively. Smartphone installed thet application together with TF crypto card fulfill these secure service. SecCall is the application for secure packet domain calls and is the application for instant messaging including text, voice-text and pictures.

Cryptophone
Write the E-Mail, we will contact you within days.



SIP-based VoIP Security System

Developed by Privis under its sole intellectual property, SIP-based VoIP Security System provides end-to-end encryption services to SIP-based VoIP system. Attaching it to soft switch / IMS network without any changes to network topology and communications infrastructure, it offers systematic, high-strength, and high-quality VoIP secure communication solutions. 

SIP-based VoIP Security System
Write the E-Mail, we will contact you within days.



Secure Walkie-talkie

Secure Walkie-talkie provides a convenient and secure way for voice communication. Its high-strength crypto algorithm defends against any malicious eavesdropping. It is an ideal communication device for government, military, and data-sensitive agencies.

Secure Walkie-talkie
Write the E-Mail, we will contact you within days.



SEC-34 IP Encryptor (VPN)

VPN encryptor adopts self-designed security operating system and provides comprehensive security functions to meet data security protection needs in various network environments.
Besides data encryption, VPN encryptor can also provide some traditional security functions such as packet filtering, DDOS anti-attack, anti-virus and hot standby etc.

SEC-34 IP Encryptor (VPN)
Write the E-Mail, we will contact you within days.



SEC-33 Tel/Fax Encryptor

SEC-33 Tel/Fax Encryptor applies to various public or private phone networks like PSTN, emergency satellite communication system etc. to make end-to-end encryption for client important phone call and fax information. The encryptor guarantees data security while in transmission line, thus effectively prevents clients’ sensitive information from being intercepted through transmission line.

SEC-33 Tel/Fax Encryptor
Write the E-Mail, we will contact you within days.



SEC-30 Link Encryptor

Since it is rather easy for the adversaries to intercept signal of microwave, troposcatter and satellite communications, measures have to be taken to preserve the confidentiality of the data being transmitted. The most effective way to protect data confidentiality is to have it encrypted before transmission.

SEC-30 Link Encryptor
Write the E-Mail, we will contact you within days.



Vulnerability Management System

Vulnerability management system is capable of detecting all vulnerability risks in the network, providing professional and effective security analysis and repair advice, and auditing repair result according to security management process so as to reduce attack influence to the largest extent.

 

Vulnerability Management System
Write the E-Mail, we will contact you within days.



Penetration Test System

Automatic penetration test system focuses on automatic simulation of hacker penetration and integrates functions modules such as automatic penetration, vulnerability verification and social engineering. It is used for red team to test defense result of security system and for improving employees’ security awareness.

 

Penetration Test System
Write the E-Mail, we will contact you within days.



Next Generation Firewall

Privis firewall is independent designed next generation firewall which provides comprehensive security protection from layer 2 to layer 7 for the mobile Internet era. Privis firewall can achieve in – depth analysis of users, applications and content to provide users high performance, visualization, accurate and effective integration of application layer security protection system.

 

Next Generation Firewall
Write the E-Mail, we will contact you within days.



CyberInsight Radar System

CCSC system which could detect the Internet and business intranet. It can collect information of the network assets, equipments activities, geographical location, organization, service providers and other basic information. It could also recognize equipment type, equipment brand, equipment model, equipment versions, open ports, provision of services and usage of components.

 

CyberInsight Radar System
Write the E-Mail, we will contact you within days.



WebSOC Website Multi-demensional Monitoring System
Write the E-Mail, we will contact you within days.



APT Advanced Persistent Threat Detection System
Write the E-Mail, we will contact you within days.



Waterproof high power jamming system

This jamming system can be deployed in large sensitive locations such as military or governmental compounds. It can also be used in Oil and Gas Storage Facilities and fields, Security Services, Military Units, Secret Services, Museums, Border Patrol and Drug Enforcement, Customs, etc.

Waterproof high power jamming system
Write the E-Mail, we will contact you within days.



High-Power portable DDS multi-band jamming system

DJ3500, full portable multi band DDS Jamming system, is designed with a ruggedized trolley type case ,light weight, high mobility and reliance. This device is configured with 5 different jamming modules. The jamming frequency can be more than 10 Bands. Jamming frequency module can be up to 250-300watt output power.

High-Power portable DDS multi-band jamming system
Write the E-Mail, we will contact you within days.



High-Power manpackmulti – band Jamming system

Privis solutions—DJ2500, High Power Frequency Scan Convoy Jamming System, implementing the most effective and reliable RF jamming technology and equipped with a fully-integrated broadband jamming system. DJ2500 is highly portable and light weight. Easy for back pack. It plays an important role to use the heavily loaded vehicle and trolley-type devices in some extreme hard situation.

High-Power manpackmulti – band Jamming system
Write the E-Mail, we will contact you within days.



High Power Handheld Signal Jammer

Police, Bomb disposal squads, VIP protection, Special Police (S.W.A.T), military security forces, bomb squads, anti-terror units, anti-drug units, Border control units, checkpoint personnel, Meeting room, Hospitals, Banks, Churches, Conference Rooms, Classrooms and so on, such types of law enforcement personnel who benefit greatly from the deployment of any of these best-in-class portable RF jamming solutions.

High Power Handheld Signal Jammer
Write the E-Mail, we will contact you within days.



Photo-frame style signal jammer

This photo-frame style jammer is designed mainly used for indoor cellphone signal shielding, such as meeting rooms, border control units, Border Patrol and Drug Enforcement, Customs, House, Churches, Courts, Theaters, Office, classroom, checkpoint personnel, Hospitals, Recording Studios, Banks, Contract Tendering Rooms, Testing Facilities, Security Services, Military Units, Secret Services, News Conference Scene, Libraries, Museums, Prisons and so on.

Photo-frame style signal jammer
Write the E-Mail, we will contact you within days.



Write the E-Mail, we will contact you within days.