Lochbox, as a Zero-Trust approach, never assumes that the network is secure. It always assumes that an attacker might be attempting to eavesdrop or hijack the communications. As such, Lochbox securely uses the data channel for the Cellular carriers, not the voice channel. Devices are tracked individually and are flagged if distrusted, wiping Lochbox, cached in memory data and preventing usage. Regardless of network, a secure TLS connection is setup between the device and the Lochbox cloud servers, and the Business' Lochbox Key Server. (user authentication, ACL, ...)
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article