
Vigile – highest level of mobile security

Security-first hardware
The Vigile device includes several cutting-edge features, including physical switch for disabling the cameras and microphone on a hardware level, hardware integrity attestation, secure fingerprint unlock and capability to disable device sensors.
Powered by Secure OS
Secure OS is a security-hardened operating system based on Android. Secure OS represents the pinnacle of mobile security, engineered to defend against the most sophisticated mobile cyber threats.
Users can take charge of their device through our hardware control feature enabling users to manage hardware components and sensors (Wi-Fi, Bluetooth, Location, USB, etc.) reducing the attack surface by switching them on and off depending on their use.
Incoming and outgoing communication is end-to-end encrypted and transmitted over an encrypted network. All data stored on the device is secured and encrypted.
A state-of-the-art software attestation flow alerts users if there is any discrepancy between the installed software and settings of the device and their software policies. The flow utilizes a server-side fingerprint of their settings with their actual device settings.
All encryption keys are generated on the device and stored on a FIPS 140-2 certified cryptographic module. No private keys are ever shared or stored outside the device.
Users can set up several device wipe triggers to
delete all information on the device and render it
useless. Triggers include remote wipe command, duress PIN wipe, wipe due to wrong PIN input, as well as a unique offline wipe countdown, triggering phone wipe if the device has been offline for a pre-set time period.
Secure OS is a completely de-Googled Android
Operating System. It relies on open-source
technology to deliver necessary mobile
microservices such as location, push notifications, time, app updates, and others.
Self-hosted Device Management
The granular control helps organizations protect their sensitive information by managing security polices, access to applications, as well as a variety of management actions.
Organizations can host our MDM software on their server, enabling complete control over the security infrastructure and data sovereignty.
Want to learn more?
Download our complete solution overview now.