Securing Bangladesh's Sovereignty
Eliminating Digital Blind Spots in National Security Communications
Eliminating Digital Blind Spots in National Security Communications
Convenient, consumer-grade communication tools are the weakest link in national security. They create vulnerabilities that adversaries are actively exploiting for espionage and intelligence gathering.
Consumer-grade applications are built for convenience, not national security. BlackBerry SecureComm is engineered from the ground up for the highest levels of protection and sovereignty.
✘ Open to Anyone: Anyone can register, making it hard to control who is in your communication network. Risk: Unauthorized access and infiltration.
✘ No National Control: Your data is stored on foreign servers, outside your nation's legal reach. Risk: Loss of data sovereignty and foreign access.
✘ Weak Management: Lacks central controls for managing users, devices, and security policies. Risk: Inconsistent security and insider threats.
✘ Not for Government: Not designed or certified for handling sensitive government information. Risk: Non-compliance and legal vulnerabilities.
✘ Metadata Exposed: Information about who you call, when, and where can be collected, even if messages are encrypted. Risk: Revealing operational patterns and intelligence.
✘ Identity Vulnerable: Susceptible to faked identities and deep fake audio/video. Risk: Deception, misdirection, and compromised orders.
✘ Files at Risk: Data stored on your device (files, chat history) can be accessed by spyware. Risk: Sensitive information theft even when offline.
✘ Voice Calls Not Always Secure: Voice and video calls may have unencrypted segments, especially when connecting to regular phone networks. Risk: Eavesdropping on critical conversations.
✔ Military-Grade Encryption: All communications (voice, message, file) are fully encrypted from end-to-end. Benefit: Unbreakable confidentiality.
✔ Full National Sovereignty: Deployable on-premise, ensuring all data remains within your nation's borders and control. Benefit: Complete data ownership and legal protection.
✔ Centralized Control: Comprehensive tools for managing users, devices, and enforcing strict security policies. Benefit: Robust security posture and reduced insider risk.
✔ Globally Certified: Trusted by NATO and G20 nations, with the highest government certifications. Benefit: Proven reliability for classified operations.
✔ Metadata Protected: Communication metadata is hidden within encrypted tunnels. Benefit: Operations remain secret, patterns concealed.
✔ Verified Identity: Cryptographic proof of identity ensures you always know who you are communicating with. Benefit: Eliminates deception and ensures trusted communication.
✔ Encrypted Data at Rest: The app's folder and all its content are encrypted, making them inaccessible to spyware. Benefit: Files and chat history are secure even if the device is compromised.
✔ Always Encrypted Voice: Voice and video calls only function when fully encrypted end-to-end. Benefit: Guaranteed secure voice communication without vulnerable segments.
Blackberry's SECU Suite is introduced as a tool to strengthen an organization's cyber defenses. A key feature of SECU Suite is its use of NSA-approved end-to-end encryption, which distinguishes it from typical applications in protecting sensitive communications. The suite also employs cryptographic authentication to prevent user identity spoofing. Furthermore, SECU Suite provides organizations with control over metadata and content, which aids in ensuring compliance and offering valuable data insights.
With a global track record for providing certified, true end-to-end encrypted solutions for Android™ and iOS®, SecuSUITE for Government technology is protecting 20+ countries against electronic eavesdropping from unclassified through Top Secret.
Protecting the men and women who protect us
SecuSUITE not only allows personnel to exchange fully secure voice and messaging with other mobile devices, it also supports fully encrypted voice calls out of any foreign network—which can be prone to man-in-the-middle (MITM) attacks—back to the caller’s home network.
Protecting embassies and official international missions
Locally or abroad, diplomatic staff can use their smartphones, safe in the knowledge that their voice and messaging exchanges are protected with end-to-end encryption, whether they are calling another secure mobile phone or back to their home country network.
Protecting entire nations
In an era where the threat of terrorism is an everyday reality, the people protecting the security and critical business of the nation need the ability to communicate securely at a moment’s notice. SecuSUITE allows government personnel to protect all official voice and messaging exchanges from being hacked.
Where there’s the greatest threat, you need the highest security. With SecuSUITE, calls are encrypted from the mobile device all the way back to the crypto gateway installed in your organization’s trusted network, so eavesdroppers can’t hear a thing.
From SecuSUITE -enabled mobile device to SecuSUITE -enabled mobile device.
From a SecuSUITE -enabled mobile device to a landline within the network
From a SecuSUITE -enabled mobile device to the user’s home network and from there to external mobile or landlines via PSTN extension.
From any mobile or landline on the user’s home network to a SecuSUITE -enabled mobile device.
From a SecuSUITE -enabled mobile device to a secure conference bridge.
For multiple participants on SecuSUITE-enabled devices.
Whether operating locally or abroad, employees can make secure phone calls and exchange secure messages, including group chats, using the off-the-shelf iOS® and Android™ devices they already carry—rather than bulky, inconvenient and complicated specialized communications systems.
If communication technology is hard to use or unpredictable, employees may make calls on unsecured lines, or give up the ability to make secure calls while mobile. With SecuSUITE making an encrypted mobile call is as painless as making a regular call.
When critical issues are at stake, every second counts. SecuSUITE allows calls to connect as quickly as a standard GSM® call. And while some competitors’ solutions are known for poor audio, SecuSUITE provides excellent voice quality.
Choose whether to integrate with MDM or deploy SecuSUITE in full ‘sovereign mode’. Unlike other solutions on the market, SecuSUITE can be deployed in environments that require a full ‘sovereign mode’, with absolutely no dependency on any vendor infrastructure.
SecuSUITE will not run on rooted or jailbroken devices. On start-up, the app always performs an integrity check – if it has been modified in any way, it will not start. When the app is updated to a new version, it always performs an integrity signature validation before allowing the update to be installed.
Extend secure communication to any environment with SecuSUITE's tactical and portable deployment capabilities. Designed for immediate and independent operation, SecuSUITE can be packaged into robust, transportable solutions, such as Pelican cases, creating self-contained sovereign systems. This enables secure voice and data exchange in field operations, emergency response scenarios, or temporary command centers where reliance on existing infrastructure is impractical or insecure. Experience rapid setup and operation, delivering end-to-end encrypted communication and cryptographic user authentication without dependence on external vendors, ensuring secure information flow wherever your mission takes you.
The NATO Communications and Information (NCI) Agency has awarded a contract for BlackBerry’s SecuSUITE to encrypt the conversations of its technology and cyber leaders wherever they communicate – in the workplace, at home or travelling abroad.
Malaysia has significantly boosted its national security by partnering with BlackBerry to combat espionage and advanced cyber threats. This collaboration involved implementing BlackBerry's key cybersecurity solutions, including SecuSUITE, AtHoc, and UEM. A major outcome is the Cybersecurity Center of Excellence (CCoE) established in Kuala Lumpur in 2024. This initiative ensures secure government communications, protects vital digital assets, and supports Malaysia's goal of building a skilled cybersecurity workforce and enhancing national cyber resilience.
Common Criteria certified based on NIAP Protection Profiles for:
National Information Assurance Partnership (NIAP) Compliance
SecuSUITE Client Protection Profiles:
Application Software - Protection Profile for Application Software
VoIP: Extended Package for Voice and Video over IP (VVoIP)
Functional Package for TLS
SecuGATE related Protection Profiles
Network Device - Collaborative Protection Profile for Network Devices
SIP Server - Enterprise Session Controller (ESC)
Approved by CSfC program under NSA specifications
Complies with CNSA cryptography requirements
Supports FIPS 140-2 validated keystores
White Paper: The Case for Secure Communications in Government
Infographic: The Future of Secure Communications
DigiSec BD is a strategic and technology implementation partner of BlackBerry in Bangladesh