6 ways to Burn.
Meet Your New Burner.
With access to OmertaNet out of the box, our limited edition handset with a large screen, exceptional battery, and six emergency wiping options. Stay connected, enjoy a great viewing experience, and have peace of mind knowing your data is secure. All this at a price that's right.
Root of Trust
Trusted Boot
Trusted Boot, a feature of the Knox Platform, secures mobile device boot processes by identifying unauthorized and outdated boot loaders. It ensures only validated components run and offers device health assessment. Knox Verified Boot expands Android Verified Boot to enhance boot-time security.
Real Time Kernel Protection
Omerta Attestation
Advanced App protection
Additional Security Features
- Bluetooth, NFC, Location Tracking, GPS, USB Port & Internet Sharing: For maximum security the BRIGHTBURN6 has all access points removed or blocked as standard.
- De-Googled & de-Samsunged: For enhanced privacy the device has all Google & Samsung Apps removed & open source App stores are provided.
- Enforced access management: The BRIGHTBURN6 incorporates tough access management rules to prevent a weak pin being implemented.
- Hardware-Backed Keystore: This feature is a hardware-dependent claim. All Omerta Infiniti devices have keystores backed by hardware protections.
- Secure Lockdown on Tampering: Upon detecting critical security compromises, the system locks down sensitive areas, preventing unauthorized enterprise data access and leakage. When there is evidence of device tampering, Omerta prevents users from accessing the data in a work profile or on a fully managed device. To unlock the device again, one needs to factory reset the device, which wipes out the data inside.
- Keystore Support of eSE & Other High-Security Storage: Numerous services require credentials for access. They include Wi-Fi, VPN, email, and websites. In order to safely store sensitive credentials, developers need to write new credential storage code for any new storage hardware. Omerta provides a plug-and-play framework for credential management across a variety of hardware, eliminating the need to develop in-house credential management implementation logic.
- Sensitive Data Protection (SDP): SDP keeps data encrypted while a work profile or fully managed device is locked, even during runtime when other solutions decrypt data.
- Enforced Two-Factor Authentication: Enables IT admins to force end-user two-factor authentication for logging in to a work profile or fully managed device. Two-factor authentication is done through a combination of biometrics (fingerprint and iris) and more traditional means (password, PIN, pattern).