FAQs

Find clear answers to key questions about our push-to-talk over cellular (PoC) platform, our device ecosystem,
and our extensive range of solutions and features.

 

Our push-to-talk over cellular (PoC) platform is device agnostic, meaning it works seamlessly on rugged smartphones, field-ready devices, screenless wearables, tablets, and standard Android or iOS phones. This means your team stays connected, using the devices that best suit their needs.

Yes. The Mobile Tornado Push-to-Talk (PoC) application can be used on any certified PoC device, including rugged phones, vehicle-mounted devices and smartphone, even when the screen is off or locked. Users can push the dedicated PTT button or emergency SOS button to communicate instantly.

This feature is essential for mission-critical communications and for industries where quick, reliable communication is required at all times. ng your device, just like a traditional two-way radio. It ensures seamless, real-time communication for teams that rely on fast, reliable PoC communication.

Mobile Tornado supports a range of accessories to enable you to communicate safely and legally whilst driving. These include remote speaker microphones (RSM), Bluetooth PTT buttons and headsets. This enables you to communicate instantly without touching your phone, making it ideal for sectors like transport, logistics, fleet management and emergency services.

Yes. Push-to-talk over cellular (PoC) devices allow you to send messages as well as make instant voice calls. You can also send text messages, PDFs, image and videos.

Yes. Mobile Tornado’s push-to-talk over cellular (PoC) application works on both Android and iOS smartphones. It is also fully compatible with a range of other devices, including rugged and field-ready devices. The Mobile Tornado application can be downloaded on both the Apple and Google stores and our PoC application is mobile network agnostic, meaning it works across any mobile operator, Wi-Fi network or broadband connection.

If your PoC device is lost or stolen, your system administrator can remotely deactivate it immediately. All sensitive data can be wiped and then restored on a replacement device. By remotely managing your PoC device, information is protected and unauthorised access is prevented.

Can’t find the answer?

Complete the form below and a member of the team will get back to you to help.