View

Sorting

Products found: 13

logo
Offer a reference bonus
0.00

Adeya

SECURE BUSSINESS CONNECTIONS The Adeya solution allows interaction while using various device types. This flexibility allows collaboration between multiple offices, connecting employees working remotely, or organizing meetings with customers or suppliers. The files shared between users are end-to-end encrypted, the client has control over the exchanged content, including encrypted meeting notes. Customization Customize user interfaces for seamless integration with the environment. Unique in its unique capability to integrate with custom cryptographic algorithms Business Connections
Manage communities via a userfriendly and highly secure web application. Efficient management, ability to broadcast information and implement company policies can increase employee engagement and effectiveness of product use Dashbord
Track the use of community members, view and output reports through the dashboard.

SECURE MOBILE COMMUNICATIONS
Adeya is a leading provider of secure, end-to-end encrypted calls, instant messaging, and collaboration tools. Adeya’s cost-effective, easy-to-use solution allows you to securely communicate within your organization anytime, anywhere. The Adeya mobile app is available for most popular operating systems (iOS and Android). It is distributed via a private access point and is, accessible only to users who receive download invitations.
Private contacts
Centrally managed, automatically updated private contact list that is independent of the device’s native contacts.
Encrypted calls
Phone conversations or conferences completely encrypted, voice quality remains intact. PBX integration supported.
Secure Messaging
Encrypted SMS and instant messaging in the workplace. Secure broadcast and group chat among trusted contacts.

SECURE COLLABORATION TOOLS
The Adeya solution allows interaction while using various device types. This flexibility allows collaboration between multiple offices, connecting employees working remotely, or organizing meetings with customers or suppliers. The files shared between users are end-to-end encrypted, the client has control over the exchanged content, including encrypted meeting notes.
Multi-screen application
The design of the application is responsive, assuring the best exprience regardless of device - laptop, tablet or smartphone.
Secure File Sharing
Efficient, end-to-end encrypted file sharing securely exchages, stores and manages your corporate files.
Protected notes taking
Capture ideas, organize and share notes on the go. The best ideas are always synchronized, encrypted and safe.

Adeya can adapt to your information system architecture, investment plans, and hosting strategy. You can operate Adeya’s solution on-premise or on-cloud. Flexible custom deployment options and integration with existing IT systems are all capabilities that make Adeya’s solution unique.
Cloud Deployment - KEY ADVANTAGES
  • Suitable for controlled internalized deploplments.
  • Scalable architecture that can operate between a handful of users to tens of thousands of users.
  • Robust architecture allowing incorporation of multiple redundant sites.
  • Flexible architecture allowing cryptographic customization for cases where the use of national crypto sets may be required.

On premise Deployment - KEY ADVANTAGES
  • Suitable for fast, cost-effective, provisioning, and deployment on Adeya’s Swiss cloud.
  • Hosted in highly secure data centres located within Switzerland.
  • Benefiting from Switzerland’s strict privacy and data protection laws.
  • Set up your community of users in minutes.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

Perimeter 81 Zero Trust Network Access

Fully Customizable, Zero Trust Networking

Perimeter 81’s Zero Trust Network Access it is a suite of  networking capabilities service designed to assure the security and integrity of organization’s network. Multi-Regional Deployment Deploy private gateways in different locations to ensure your network can best serve international branches and employees with reduced latency and optimal speed. Policy-Based Segmentation Easily segment network access with our group creation and G Suite/ Google Cloud, Okta, Microsoft Azure AD and Active Directory/LDAP Identity Provider integration. Built-In Two Factor Verification Add an extra layer of security, prevent remote attacks and ensure regulatory compliance with SMS notifications, Google Authenticator and Duo Security authentication. Precise Split Tunneling Control whether you tunnel all your network traffic, or specific subnets, from our single-click client applications to Perimeter 81’s multi-tenant Network as a Service. Site-to-Site Interconnectivity Interconnect your cloud environments, including AWS, Azure, and Google Cloud, or create a secure communication link between two different networks located at different sites. Network Auditing & Monitoring Gain more insight into your network’s health, activity and security, including visibility into group and server creation, team member authentication, password changes and more. Defining Zero Trust for Your Network
  • Segment Your Network. Network segmentation allows organizations to define internal trust boundaries to granularly control traffic flow, enable secure network access and implement network monitoring.
  • Establish Trust Zones. Trust zones are comprised of distinct pockets of infrastructure where resources operate at the same trust level and similar functionality, minimizing pathways and limiting malicious threats.
  • Manage Your Infrastructure. Efficiently monitor the network via centralized management capabilities, allowing data to be processed by tools that may further enhance network visibility, detect unknown threats, or support compliance reporting.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

Privoro Platform

Safecase The SafeCase is a first-of-its-kind ExoComputer – a secondary computing device providing trusted services independently of the paired mobile device. Cloud Featuring a robust policy engine and device logging capabilities, the cloud – interfaced via the Privoro Portal – offers administrators the ability to manage each SafeCase. IOS App The Privoro app on the user’s mobile device enables communications with the Privoro Cloud as well as user validation of SafeCase protections. Secure Data Channel Every communication between the SafeCase and cloud utilizes an inner encryption tunnel through the mobile device's data channel to provide high-security, end-to-end, trusted communication Features and capabilities
  • ExoComputer. SafeCase trusted hardware is the bedrock foundation for all other features and capabilities. It has been rigorously designed, developed and manufactured to a nation-state threat model across the entire system.
  • Mobile hardening. Integrated within the SafeCase are verifiable protections against remote surveillance via the mobile device’s cameras and microphones.
  • Policy management. Administrators can monitor SafeCase activity and set and enforce policies (including geofences) for the SafeCase; optional Mobile Device Management (MDM) integrations enable policy enforcement via paired mobile devices.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

SaltDNA SaltLEGAL

Secure Legal Communications Mobile communications present major privacy challenges for the legal industry. Client-attorney privileged discussions, mergers/acquisitions details and legal strategy are just a few examples of mobile communications that have been intercepted and reported on in the news. Historically there have been many cases of cyber attacks within the legal industry. For example, in 2016, 48 elite law firms suffered cyber hacks to their security systems, which was reportedly due to the use of consumer applications and online services used for communications and sharing legal documentation. The consequences in cases such as this is significant for a law firm and its clients.
  • Technology used by magic circle law firms globally.
  • Allows for lawyer-client communications on chosen matters.
  • Clients only have access to allocated lawyers.
  • Integrations with internal DMS systems.
  • Control how clients' data is stored.
  • Secure messages, calls & document transfer between lawyer & clients.
Features: Secure Messaging Our solution offers users private real-time messaging and group chat functionality to their colleagues or clients in relation to specific legal matters. Secure Conferencing We offer secure one-to-one calls and conferencing allowing up to 16 participants at any one time. All VoIP calls are encrypted and secure in any region. In-App Restrictions Administrators can restrict the capability of users to take screenshots within the app. They can also enforce additional app pin to be set, as well as an 'auto-burn' timer. Deployment Options Available as a hosted service or as an on-premise installation within private infrastructure. Message Broadcasts Push out live alerts to large groups of users within an organisation. Share messages, images & documents. Closed Contacts Organisations can manage the communication channels within their company. They control who speaks to who as user's contacts aren't linked to their personal device.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

SCRYPTMail

Why SCRYPTmail?
  • Geniune. We promise not to confuse nor misrepresent your security risks. Trust is the cornerstone of any business, but many companies fall short by trying to emphasize benefits and hide downsides. We promise to be transparent and open in order to provide you with objective information about our technologies.
  • Private. Your emails and data are encrypted end-to-end with a secret phrase that never leaves your computer. As a result, we can't scan nor read your emails.
  • Anonymous. Can you be truly anonymous on internet? Unfortunately, the answer is no. In order to establish a connection with a server, you have to provide an IP address that can be tracked back to your computer. It does not matter if we store logs or not because that is what your provider does.
  • No third party server scripts. We deliver all scripts from our servers. No Google Analytics, Facebook or Twitter. While such scripts can be useful to us as a service to track usage, they leak metadata like user information, location and more.
  • PGP and NIST recommendations. Standard protocol to exchange public keys between users. The email you are about to send will be encrypted by AES with random 256 bit key and then key encrypted with the public key of intended recipient. Only the person having correct private key will be able to read it. We use only open source encryption libraries to ensure public audit.
  • Grade A HTTPS encyption. Heartbleed attack? POODLE or BEAST? - We got you covered. We are regularly testing our service with third party security services to ensure up to date communication protection.
  • Encrypted. We mean it, no half measures. Your message encrypted from start to finish. Many similar services advertise email encryption, but not all of them truly encrypt your emails. Attachments, recipients, other metadata often are left in clear text. We encrypt all of it!
  • Freedom and simplicity. Who told you that privacy should be compromised for simplicity?
  • Send anywhere. Send email in clear text or encrypted text. Clear text messages will be deleted from our servers immediately after successful delivery to the recipient’s domain. Encrypted messages will require a PIN to unlock and decrypt. You must provide this PIN via another means of communication like in a phone call, via text or in person.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

Secusmart SecuSUITE

SecuSUITE for Government is a multi-platform solution for end-to-end encryption of voice calls and text messages. Available on iOS and Android™, it connects calls quickly, keeps them secure and ensures excellent voice quality. It works globally, across network barriers and across all mobile networks. Deployed securely on premise (or hosted in a certified third-party data centre or a data centre trusted by the client), it can be managed centrally and end users can be enabled over the air. Ensure employees can make secure calls from their smartphones To make encrypted calls, government employees generally have to be sitting at their desks using a secure landline. In our mobile world where everything is time-sensitive, that’s just not viable any more. With SecuSUITE for Government, employees can be truly mobile and make confidential and secure phone calls from their smartphones. Whether economic prosperity, political stability or national security is at stake, it’s a capability which can make all the difference. Government employees are increasingly able to use a range of mobile devices and operating systems at work – in some cases, they may even own the device (BYOD). In such instances, enabling secure voice communication on a single OS or device type isn’t enough. Enter SecuSUITE for Government – a cross-platform solution which protects mobile communications on the devices and operating systems employees prefer, including iOS and Android. Ensure users can start making secure mobile calls immediately, without a steep learning curve Government end users aren’t necessarily technology experts – nor should they have to be. If secure communication technology is cumbersome or hard to use, employees may revert to making calls on unsecured lines or give up the ability to make secure calls whilst out of the office. SecuSUITE for Government is intuitive and similar to the native dialler that employees use every day on their iOS, Android or BlackBerry devices. This means users can focus on communicating instead of on learning a new way to make calls or send text messages. Make secure calls without sacrificing on voice quality, performance or usability SecuSUITE for Government is designed with efficiency in mind. All its encryption and authentication processes run seamlessly and securely in the background, without impacting on battery life, performance or usability. Some competing solutions require users to read out numbers or hashtags before communicating – a technology relic from the past century! With SecuSUITE for Government, making an encrypted mobile phone call is as painless as making a regular call. Users are already authenticated, the certificate exchange takes place during call setup and the client is optimised to maintain its SIP connection, meaning users are always reachable. Technology which meets your highest security standards - backed by cerification When the security stakes are high, you need assurance that the communication technology you’re using meets your standards – and those that may be stipulated by regulators. While many of our competitors claim to be certified for a range of uses, BlackBerry has the longest history of gaining security certifications and national approval in the field. To protect against evolving sophisticated cyber threats, SecuSUITE for Government is secured with strong data-in-transit (DIT) and data-at-rest (DAR) encryption. SecuSUITE for Government can support dual layers of encryption across all data channels, complies with SUITE B cryptography requirements, supports FIPS 140-2 validated keystores and is currently being evaluated for the following Common Criteria certifications based on NIAP Protection Profiles:
  • Protection Profile for VoIP Applications v.1.3 (VoIP PP)
  • Collaborative Protection Profile for Network Devices v.1.0 (ND cPP)
  • ND cPP Extended Package SIP Server (ND cPP SIP EP)
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

Shadline

Shadline supports 3 layers of defence

  • Increase your daily security
  • Limit a cyber attack
  • Prevent a global black-out
Features:

  • Communication
  • Transfer
  • Storage
  • Administration
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

Signal Messenger

Why use Signal?
Explore below to see why Signal is a simple, powerful, and secure messenger Share Without Insecurity State-of-the-art end-to-end encryption (powered by the open source Signal Protocol) keeps your conversations secure. We can't read your messages or listen to your calls, and no one else can either. Privacy isn’t an optional mode — it’s just the way that Signal works. Every message, every call, every time.
  • Say Anything. Share text, voice messages, photos, videos, GIFs and files for free. Signal uses your phone's data connection so you can avoid SMS and MMS fees.
  • Speak Freely. Make crystal-clear voice and video calls to people who live across town, or across the ocean, with no long-distance charges.
  • Make Privacy Stick. Add a new layer of expression to your conversations with encrypted stickers. You can also create and share your own sticker packs.
  • Get Together with Groups. Group chats make it easy to stay connected to your family, friends, and coworkers.
No ads. No trackers. No kidding. There are no ads, no affiliate marketers, and no creepy tracking in Signal. So focus on sharing the moments that matter with the people who matter to you. Free for Everyone Signal is an independent nonprofit. We're not tied to any major tech companies, and we can never be acquired by one either. Development is supported by grants and donations from people like you.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

Sirin Labs Sirin OS

IS THE WORLD'S MOST SECURE BLOCKCHAIN OS FOR MOBILE DEVICES SIRIN LABS’ propietary operating system will give FINNEY™ users an easy-to-use Android experience with the Play Store and the apps it contains. What sets SIRIN OS™ apart is the enhanced security of the entire device and the built-in cold wallet accessible via the Safe Screen. Users will have a familiar experience along with an extension beyond the Android OS to ensure the blockchain and wallet security. These factors will enable FINNEY™ to hearld in mass adoption of blockchain technology. TOKEN CONVERSION SERVICE FINNEY™ will provide users with our proprietary Token Conversion Service, which enables the seamless and automatic exchange between supported tokens and coins, eliminating the need to visit external exchanges. SRN THE TOKEN The SIRIN Token (SRN) is a utility token, whose purpose is to be used as the cornerstone of the SIRIN LABS ecosystem, which currently consists of the SIRIN OS, FINNEY smartphone, SIRIN Decentralized Application (DApp) Store, and the SIRIN LABS brick-and-mortar stores.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

Staxx Solutions Koolspan

Talk Securely Anytime, Anywhere: Protect your calls and messages with end-to-end encryption. Trustcall global service A cloud-based secure call and text message subscription service. Trustcall hybrid Secure calls and messaging solution with flexible infrastructure and architecture to fit an organization’s requirements. Trustcall on-prem A mobile communications security platform hosted, managed, and maintained by an enterprise or government organization. The platform integrates into existing enterprise ecosystems via APIs. Only robust, cross-platform, hardware or software-anchored, End-to-End secure communications solution for Android and iPhone. Easy to download, install, and use - available on iTunes, Google Play; or can be provisioned via MDM/EMM and integrate with enterprise systems. Best in class quality and performance across network types. Flexibility to meet the needs of customers. Secure FIPS 140-2 validated, end-to-end 256-bit AES encryption. Global enterprise support, help, and customer service.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
2
19
logo
Offer a reference bonus
0.00

Teamwire

Teamwire is a fast and easy to use app to serve all enterprise messaging needs. The app provides a compelling set of features to improve the communication with colleagues and teams. Users can send 1:1 and group messages, post status updates to teams, exchange video and voice messages, and share files, calendar dates, photos and much more. Features:
  • Fast messaging
  • Advanced group messaging
  • Professional content sharing
  • Powerful messaging extensions
  • Easy connection
  • Cross-platform availability
  • Customization of app design
  • Alerting and crisis communication
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

TeleMessage Mobile Archiver

The TeleMessage Mobile Archiver effectively addresses compliance, regulatory, eDiscovery response requirements and reduces risk across a variety of industries. TeleMessage captures mobile content, including SMS, MMS, Calls and WhatsApp calls and chats from corporate or BYOD mobile phones. Messages are securely and reliably retained within TeleMessage servers or forwarded to an archiving data storage vendor of your choice.
  • Text Message & Call Archiving: TeleMessage Archives SMS, MMS, Voice calls and WhatsApp calls and chats
  • Industry Compliance: Including MiFID II, SEC, Dodd-Frank Act, HIPAA, SOX, GLPA and those put into effect by the US Federal Courts
  • Employee Productivity: Boost employee motivation and collaboration with clear guidelines concerning text messaging in the workplace
  • Searches: Gain fast access to electronic records in the event of records requests, audits, examinations and legal litigation
  • Reporting: Administrator tools include full audit trail maintenance and allow the creation of archiving reports based on different criteria
  • Flexible Deployment: Use any device, operating system, carrier/plan and ownership model.
  • Robust Solution: Use multiple several enterprise archive for full redundancy or separation of monitoring and long term archiving
  • Fully Proprietary Data: Retain complete ownership of their data and mobile communication and store in any enterprise archive.
  • Multi-channel Preparedness: Multiple mobile archiving methods for capture of SMS, MMS, Voice calls and WhatsApp chats and calls.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

TigerConnect TigerFlow Enterprise

Better Care Team Collaboration Across the Organization and Beyond Forever change the way your teams collaborate with TigerFlow Enterprise, healthcare’s most comprehensive, all-in-one platform solution for enabling top-to-bottom communication transformation. Connect your facilities, your data, your staff, and even your patients on a single network for faster workflows, lower costs, and better care for patients.
EHR Integration, VoIP, Nurse Call, and More EHR Data in Real Time Intelligently route results and relevant patient data from the EHR to TigerConnect. Group Video & Voice Consults Conduct remote video and voice consults with patients, PCPs, case managers, specialists, and others. Virtualized Nurse Call & PBX Integration Receive bedside requests instantly and speak directly to patients from anywhere in the hospital. Patient Messaging Engage patients directly over secure text. Send attachments, docs, and photos. For patients, no portals or apps needed. (Add-on feature) Features:
  • EHR Integration
  • VoIP Video & Voice
  • Nurse Call Integration
  • Lab Integration
  • Image Results
  • Escalated Messaging
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.