DECT Headsets

Highest Security Level DECT Wireless Headsets

What is DECT? 

Digital Enhanced Cordless Telecommunications (DECT™) is the European Telecommunications Standards Institute’s (ESTI) standard for short-range cordless communications, adapted for voice, data, and networking applications. DECT technology has become the global standard for secure residential and business cordless phone communications. More than 110 countries have adopted the DECT system, with more than 100 million new devices sold annually. 

DECT Security Certification 

To meet the increased demand for secure communications, the DECT Forum, the international association of the wireless home and enterprise communication industry, has established the DECT Security Certification program. The certification program consists of requirements and security features, which, when implemented in a product, are validated by an accredited and independent test laboratory to show compliance. (DECT Security Certified products listed here)

3 Steps in the DECT™ Security Chain 

The DECT™ security chain is made up of three steps, as shown below:  

Pairing 

The first and vital step in the process is to bind the headset with the base. Pairing can be done over the air or for greater security by physically docking the headset into the base. This ensures the secret key shared during the process is exchanged via the charging contacts and not over the air.  

Authentication  

The secret key shared during the pairing process is used for each call to establish authentication between the subscribed headset and the base. A non-paired headset will not work with the base.  

Encryption 

The audio between the headset and the base is encrypted for each call so that intruders cannot read it – the encryption keys are regenerated every 60 seconds. 

DECT™ Security Evolution 

DECT security has evolved from the original security definition to new enhanced definitions called Step A, B, and C, each step offers increased security over the previous step. Each new security level includes all features of the prior level.  

  • DECT security – Authentication (DSAA)*, Encryption (DSC, 64 bit keys) 
  • DECT security step A – New features which correct certain vulnerabilities. Secure DECT certification. 
  • DECT security step B – New authentication using strong AES 128 bit encryption (DSAA2)* 
  • DECT security step C – Strong encryption of audio stream using AES 128 bit keys (DSC2)* 

* DSAA and DSC are the authentication and encryption algorithms defined in the DECT security standard ETSI EN 300 175-7 applicable for DECT security and DECT security step A. DSAA2 and DSC2 are the equivalent updated security algorithms for the next steps of DECT security, steps B and C. 

FIPS 140-2 

The Federal Information Processing Standard Publication 140-2 (FIPS 140-2) is a U.S. government computer and security standard used to approve cryptographic modules. Select DECT wireless headsets go one step further and utilize encryption algorithms (Advanced Encryption Standard (AES) 256-bit encryption) listed in FIPS 140-2 standards required by the US military and government. This level of security goes beyond DECT level C.  

Who Needs DECT Security Step C or FIPS 140-2 Level Security? 

Any industry that shares sensitive or private information over voice calls should strongly consider DECT wireless headsets with a higher level of security to include Financial, Banking, Healthcare, Insurance, Government, and Contact Centers.  

Secure DECT Wireless Headsets  

EPOS has a Protected Pairing process which transfers sensitive pairing data via the charging terminal of the IMPACT SDW 5000 base station instead of ‘over the air’. The security of the pairing process is further enhanced by the authentication algorithm (DSAA2), which uses AES-128-bit keys. The EPOS Impact SDW 5000 Series has reached step B in the DECT security level by implementing this enhanced algorithm. There are multiple wearing styles and connectivity options available to support individual preferences. Contact us for help in selecting the right EPOS Impact SDW 5000 model! Security Features in the IMPACT SDW 5000 Headset Series

Yealink WH6X Series utilize DECT security level step C: Authentication – DSAA2, Encryption – DSC2 (128bit) and Cordless Advanced Technology: CAT-iq 2.0. They are available as stand alone DECT wireless headsets that connect to a computer or compatible IP phones that support USB headsets and they also have a new category of audio devices with their Yealink UC Workstation series.  

AES-128 encryption ensures secured communication when using Cisco Headset 560 Series available with a Standard or a Multibase. The Standard base supports single connectivity to a desk phone or a computer. The Multibase supports connectivity to a desk phone, computer, and mobile phone.

Military Grade Security 

These DECT wireless solutions utilize AES 256-bit keys for the very strongest level of encryption in professional headsets. The Jabra Engage 75 Series and Poly Savi 7300 Office models are also available in multiple wearing styles and connectivity options to support your team members regardless of work style and workspace. Contact us if you need help selecting the right wireless headsets for your team. 

Conclusion 

Cybercrime is on the rise, and in a business environment where customer calls are evermore sensitive, making valuable conversations secure is vital. Protect sensitive information by using secure DECT wireless headsets from EPOS, Jabra, Poly, and Yealink. Call One, Inc. helps mid-to-large organizations, including Financial, Banking, Healthcare, Insurance, Government, and Contact Centers, do their business better by providing professional-grade audio and video solutions. 

 

1 reply
  1. Ric
    Ric says:

    Can Danny do a video review also of all DECT headsets on this blog? Aside from Jabra engage 75 and Epos 5066, Pls include Yealink and the poly 7300. (call quality, mic noise reduction, range)

    Reply

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *