Feature Article

February 13, 2013

The Motorola AME 2000 Offers Encrypted Voice and Data

The smartphone has become an essential part of our life in business and pleasure. It is no longer a tool used only for communication; companies are leveraging them within bring your own device (BYOD) policies and individuals are replacing their computers with them.

This amount of usage means these gadgets are used to communicate and store sensitive data. If you are communicating sensitive data with your smartphone because of the position you hold in your organization, it is essential to protect what you are transmitting. If you are not careful and your information is of enough value, individuals with the right technology can intercept your communique. 

Luckily, the newly introduced Motorola AME 2000 Secure Mobile Solution is a combination of hardware and software that provides end-to-end encrypted voice and data communication. The product is so reliable it is used by federal agencies that are communicating with public and private wireless networks.

The phone is a product of Motorola Solutions, Inc. (MSI) a division of Motorola that provides mission-critical solutions for communications and services for enterprise and government customers. The technology is based on the company’s Assured Mobile Environment (AME) solution. The aim of AME is to use commercial-off-the-shelf (COTS) products with hardware and software so it can be fitted with the ability to provide end-to-end encryption of voice and data communications.

“Secure mobility is among the U.S. government’s top technology priorities. The AME 2000 features a familiar Android-based OS experience with layered security, device management and applications that comply with federal guidelines. It’s an affordable mobile solution for civilian and defense agencies to better execute their missions that serve and protect our nation,” said Paul Mueller, vice president, U.S. Federal Government Markets Division, Motorola Solutions, Inc.

The AME 2000 is a COTS smartphone with an Android OS operating system. Some of the features found within the system are:

  • The AME-equipped devices are capable of end-to-end AES 256/NSA Suite B encrypted voice and messaging services. A Suite B IPSec VPN or virtual private network delivers secure data through public and private broadband networks in the GSM, 3G, 4G LTE and Wi-Fi spectrum
  • It supports applications installed by the customer such as mapping, video, remote medical monitoring. Additionally it gives users access to a browser, e-mail applications, text messaging and contacts.
  • Government-sponsored security recommendations from Security Enhanced Android (SEAndroid) is implemented to provide security assurances, so processes cannot be compromised, bypassed or hijacked by flawed or malicious applications

“It’s critical that commercial devices used by the federal government are augmented with solutions to ensure security and confidentiality. The AME 2000 addresses the different vulnerabilities of commercial technology by enabling users to communicate and access sensitive data securely from wherever their duties take them,” said Brenda Herold, corporate vice president, Global ASTRO Products and Solutions, Motorola Solutions, Inc.

As smartphones have quickly become fully integrated into company and home networks, they have also become a valued target. If your job or personal resources demand protection from potential intruders, it is critical to evaluate your risk environment and find the best security solution for you communication needs.




Edited by Jamie Epstein


comments powered by Disqus

FOLLOW MobilityTechzone

Subscribe to MobilityTechzone eNews

MobilityTechzone eNews delivers the latest news impacting technology in the Wireless industry each week. Sign up to receive FREE breaking news today!
FREE eNewsletter
Out in the Field Where SuperWiFi is Real!
Andy Mancone Director of Marketing and Sales at KTS Wireless Talks about the opportunities to support solutions that support Rural implementations including Agriculture.
Super WiFi Share the Gain with out the Pain
The precedents are being set to change spectrum policy forever in TV WhiteSpaces. Learn about the Spectrum Use Databases and the concepts of Spectrum Sharing with us in Austin Oct 2-5
Interview with VPI Systems
TMC's Rich Tehrani speaks with Russ Green, Senior Vice President of Marketing and Product Management for VPI Systems
Interview with Thrupoint
TMC's Paula Bernier speaks with David Jodoin, Chief Strategy Officer for Thrupoint
Interview with Nuance
TMC's Erik Linask speaks with Christy Clark Murfitt, Sr Manager of Solutions Mktg, Enterprise Division for Nuance