Cookies help us deliver our services. By using our services, you agree to our use of cookies. Find out more
Privacy Overview
This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Essential
Name
Description
Lifetime
CART
The association with your shopping cart.
1 Year
CATEGORY_INFO
Allows pages to be displayed more quickly.
1 Year
COMPARE
The items that you have in the Compare Products list.
1 Year
CUSTOMER
An encrypted version of your customer id.
1 Year
CUSTOMER_AUTH
An indicator if you are signed into the store.
1 Year
CUSTOMER_INFO
An encrypted version of the customer group you belong to.
1 Year
Marketing
Name
Description
Lifetime
CUSTOMER_SEGMENT_IDS
Stores your Customer Segment ID
1 Year
EXTERNAL_NO_CACHE
A flag that, indicates whether caching is on or off.
1 Year
FRONTEND
Your session ID on the server.
1 Year
GUEST-VIEW
Allows guests to edit their orders.
1 Year
LAST_CATEGORY
The last category you visited.
1 Year
LAST_PRODUCT
The last product you looked at.
1 Year
NEWMESSAGE
Indicates whether a new message has been received.
1 Year
NO_CACHE
Indicates whether it is allowed to use cache.
1 Year
PERSISTENT_SHOPPING_CART
A link to information about your cart and viewing history if you have asked the site.
1 Year
Google Analytics
Name
Description
Lifetime
RECENTLYCOMPARED
The items you recently compared.
1 Year
STF
Information on products you emailed to friends.
1 Year
STORE
The store view or language you have selected.
1 Year
USER_ALLOWED_SAVE_COOKIE
Indicates whether a customer authorized cookies.
1 Year
VIEWED_PRODUCT_IDS
The products that you recently looked at.
1 Year
WISHLIST
An encrypted list of products added to your wish list.
A comprehensive deep root security analysis of your Android and iPhone smartphone to interrogate and identify known and unknown malicious programs which will not be detected by commercial software. The VIP service offers real-time protection provided by cyber security professionals for complete peace of mind.
Details
Android and iPhone Smartphone Protection; of Interception, Malicious Apps, Snooping
This unique 'one of a kind' professional service is granted exclusivity to our clients in which a thorough cyber analysis of your Apple iPhone or Android device is conducted to deep scan software configurations and to notify you of intentionally malicious applications, digital firms and remote 'spying software' which may of been unknowingly installed or remotely installed without your knowledge.
The iPhone / Android Mobile Defense provides a highly advanced and comprehensive inspection of your handset is concluded using two (2) root scans and a detailed report outlines potentially serious vulnerabilities. In addition to the professional two (2) tier analysis, we can also maintain a real-time invisible ring fence of your device using technology beyond the capability of normal anti-virus and firewall protection.
WHY YOU ABSOLUTELY NEED THIS PRODUCT
Officially it is reported that over 7.22 billion handsets are in use every day. We store vast amounts of personal and corporate information on our mobile devices, however, with the ever advancing cyber technology, it is our mobile phones which are easily targeted and open to interception, fraud and remote monitoring than ever before. We are already aware of government Smurf programs, hackers capabilities, and even a novice ex-partner can target a handset with freely available software tools.
The technology the team use to effectively scan, locate, isolate and continue to firewall your handset is not available to the general public except through special invitation, however, so confident in the service we offer means you can rest assure your handset remains extremely safe from being monitored, and in the worse case scenario syphoned of private and secure passwords with vulnerabilities including unauthorised bank account access.
There are many available services from reputable security companies which provide scanning of your mobile device in an effort to protect you from vulnerabilities for a monthly fee, however, the service we offer here goes much further and much more advanced. The license cannot be purchased as an end user license - you cannot freely obtain this professional service from anywhere. Where other software companies offer 'deep root' scans, they do only touch the surface and provide details of installed applications and their purpose.
ULTIMATE ANDROID AND IPHONE DEFENCE
The software licence provides a unique pillar in the defence structure to respond in real-time interacting with you (the client) whilst maintaining your complete privacy.
A completely thorough deep rooted scan of every aspect of the handset and a carefully structured analysis for suspicious activity, configuration and network attacks
Undertakes an in-depth cyber inspection to detect trojans or spyware including details about the attacker by using reverse engineering and honey pot techniques
Protects you from advanced and targeted mobile malware (VIP service)
Keeps you protected when connecting to unsecured WiFi networks (VIP service)
If required, the reports provided can be used as evidence in a court of law
ABOUT THE SECURITY TEAM
Established by engineers and former army officers in the field of cyber and intelligence that entails over 20 years of experience in cyber warfare and information technology. The company is the world's only remote testing service in which the client may continue to use the phone uninterrupted. The company specialises specifically in the detection of malicious programs and trojan horses and provides their services to leading brand names in the fight against cyber hacking.
It should be noted that this is a professional and ethical service - there is absolutely no access to confidential data.
DETAILED REPORTS
Granted by licence from Check Point Capsule as a base to safely install the software license via server & registration key. The installation process is very simple. Once installed, other advanced scanning tools are used which are specially programmed for the analysis to achieve a certain result.
Preliminary testing will be conducted over a 48 hour period to undertake a comprehensive scan of all applications, digital signatures and files. This initial test assess the device, the operating system, all applications and the level of risk informing you of any spyware, malware, any applications with a dangerous authorisation, and for suspicious digital signatures and processes. The test is also possible to know where any software application was also installed from.
A secondary testing ends 72 hours later and after a thorough and more complex analysis of the handsets artefact, thus identifying malicious 'ghost' programs and complex trojan horses that may of been unknowingly installed or specifically targeted through remote installation. This secondary testing process entails diverse and sophisticated software and techniques.
VIP SERVICE
For high profile clients we offer the VIP service in which the handset remains under real-time analysis as an ongoing service. This service is suitable for individuals, businesses, corporate company employees, private investigators, police, government and private sectors who absolutely must ensure their handsets remain secure against intrusions for complete peace of mind.
More Information
F.A.Q's
IS IT POSSIBLE TO PURCHASE THIS SERVICE ELSEWHERE?
This unique service is offered to us by a small team of security professionals that we have built a trusted relationship with over many years. This is not a service you can buy 'off the shelf' or is freely available to the commercial market. This is a unique and highly advanced ethical service which offers unsurpassed seep root analysis and ongoing protection for high profile clients.
HOW DO I KNOW MY PERSONAL INFO WILL NOT BE ACCESSED?
The software is not designed to interrogate words or images nor is it designed to access, copy or modify information already stored on a handset. If this were the case, Check Point Capsule would not license the base installation. This is a professional service with over 20 years experience combatting cyber warfare technology to ensure our information remains safe and secure.
AMY HANDSET IS ALREADY PROTECTED BY A REPUTABLE ANTI-VIRUS COMPANY.
In this case, your handset is using an anti-virius product which offers the same level of protection to most handsets whereas the Smartphone Defence is a professional and unique service and not so much a product. The service firstly provides a fast interrogation to provide a basic overview to identify installed applications and the level of intrusion they can access. In fact, our preliminary scan is comprehensive in itself by scanning all applications, digital signatures and files and also assesses the operating system informing you of any spyware, malware, and reports any applications with a potentially dangerous authorisation. In addition, the scan can also identify where any software application was installed from.
The secondary scan leaves all competition for dust quite simply because this is not an easily accessible service to obtain. This secondary scan is the development of highly skilled cyber security engineers which runs over a 72 hour period to deep scan and finding the most embedded malformations. The scan deep roots the full architecture of the device and goes much further than any other service of its kind.
HOW EASY IS THE SOFTWARE TO INSTALL AND REMOVE?
The process to install takes around one (1) minute by accepting the license agreement and inputting a unique numerical and alphabetical code. The removal process is simply a matter of deleting the installed app and severing the connection to the secured servers.
CAN I USE THE SERVICE AGAIN AT A LATER DATE?
Yes, of course. A new installation license and code will be needed. It should be noted that the VIP service provides 24/7 'around the clock' real-time monitoring for ongoing protection and provides unrivalled peace of mind that your handset is bug free, and not being intercepted.
Technical Info
A professional and ethical deep root cyber security analysis for iPhone and Android smartphones
Developed by cyber personnel with over 20 years in cyber warfare and information technology
Licensed by Check Point Capsule for base install access
Deep root scanning and device artefact interrogation
WANT YOUR PRODUCT FOR TOMORROW? If you place your order no later than 12:00 noon (Monday to Friday), your parcel will be dispatched the same business day by DPD courier. If you place your order AFTER 12:00 noon, your parcel will be dispatched the following business day.
DPD will endeavour to deliver your parcel between 07:00 - 18:00.
A ‘business day’ means Monday to Friday, excluding weekends and Bank Holidays.
WANT AN EVEN FASTER DELIVERY? Expedited UK deliveries by 10:30 am and 12:00 noon are available for an additional fee, which is clearly shown during the checkout process. Orders must be received no later than 12 noon. If you place an order AFTER 12 noon, you will not qualify for expedited delivery.
SATURDAY DELIVERY Weekend deliveries between 07:00 - 18:00 are available for an additional fee, which is clearly shown during the checkout process. Orders must be received no later than 12 noon on a Friday. If you place an order AFTER 12 noon, you will not qualify for Saturday delivery.
For purchases to EU and other worldwide destinations, we use couriers by DPD, UPS, TNT and FedEx which are fully trackable.
A flat rate standard shipping fee of £40.00 applies for delivery between 6-7 business days depending on the destination, and £45.00 for expediated delivery between 4-5 business days depending on the destination.
Deliveries to EU and other worldwide destinations are not guaranteed by the timescales stated above, and will depend on factors that are outside our control. Parcels sent to EU and other worldwide countries may require a Customs Declaration attached to the outside of the parcel. To avoid any delay or repercussions, we must describe the item/s and quantities contained in the parcel and, as such, cannot take responsibility for parcels being stopped by customs and/or additional charges being applied by Customs and Excise in the receiving country.