The Motorola LEX L10i or LEX L10ig Mission Critical LTE Handheld is purpose-built to deliver the Public Safety Experience (PSX) that responders need to work faster, safer and smarter. It addresses the unique requirements of public safety personnel by delivering the mission critical capabilities not available on consumer-grade smart phones.
THE DIFFERENCE BETWEEN THE L10i & THE L10ig IS THE ig RUNS GOOGLE MOBILE SERVICES (GMS) GMS DEVICES CAN DOWNLOAD APPS FROM GOOGLE PLAY AND ARE CERTIFIED TO RUN GOOGLE APPS SUCH AS GMAIL AND GOOGLE MAPS.
The Motorola LEX L10i is equipped with the PSX User Interface that is customizable, role-based, and adaptive. It intelligently aggregates and prioritizes information to only present what is critical to the user, based on their current status and activity.
The sleek LEX L10i or LEX L10ig is ergonomically designed for one-handed operation with a non-slip grip and a 4.7 inch touch screen. It features best-in-class audio performance and a dedicated PTT button for fast voice collaboration. It uses a removable battery that enhances long-term usage in the field.
There is a choice of Standard and High Capacity batteries HIGHLY SECURE. The LEX L10i or LEX L10ig is secured with Security Enhanced (SE)Android OS. The Lex10i offers higher protection and assurance but does so in a way that is not restrictive to the users. The following features are implemented in the LEX L10i or LEX L10ig. Many of our competitors do not implement all or any of them. Security Enhanced (SE) Android This hardens the device and stops execution & propagation of malware infected applications. It also enforces application permissions preventing escalation of privileges or bypass of security features. Many commercial devices do not adopt Android SE making them susceptible to attacks from 'bad' applications. Data at Rest Protection. FIPS validated cryptography to protect user data stored on the device; optionally utilizing key storage on CryptR Micro HW Module for those users who demand extra levels of protection. Device offers AES 256 encryption of data. Management - Theft Recovery & Reactivation Prevention; Secure Wipe; Controls Security Capabilities of Device; Security policy enforcement Virtual Private Network (VPN) Sensitive data with in transit Encryption utilising Government strength Cryptography. Security levels are maintained while traversing networks Secured Applications - Secure VoIP & Secure PTT. This can leverage CryptR Micro HW Module for key management & encryption