Data Retention
Data retention defines the policies of persistent data and records management for meeting legal and business data archival requirements.Read more…
A free enterprise grade secure communications app for voice, video and messaging.
Quickly and easily create a secure bubble that you control around your entire communications infrastructure.
Extend your security bubble to third party apps and services.
Build a proven security stack into new and existing apps with minimal coding and development.
A free enterprise grade secure communications app for voice, video and messaging.
Quickly and easily create a secure bubble that you control around your entire communications infrastructure.
Extend your security bubble to third party apps and services.
Build a proven security stack into new and existing apps with minimal coding and development.
Ceerus Enterprise offers
centralised management of a
decentralised communications
network with regional policy
based on jurisdiction
Mike-Sakke, Key Management
September 28th 2016
Data retention, deletion and access across all communications channels in an organisation for compliance purposes (e.g. GDPR subject access requests)
Control and monitor policy applied on all communications channels
Control data placement and storage both on-premise and in the cloud
Control policy by region, by team, and by project
Enforce a consistent cybersecurity posture across all communications channels with a single platform for predictable risk and compliance and the ability to respond quickly to emerging threats and new regulations. Ceerus Connectors will extend policy to channels like WhatsApp and Wickr
Enforce a consistent cybersecurity posture across all
communications channels with a single platform for
predictable risk and compliance and the ability to respond
quickly to emerging threats and new regulations. Ceerus
Connectors will extend policy to channels like WhatsApp and
Wickr
Create a security bubble that
extends to third party apps to
cover all communications
channels inside and outside
your organization for staff,
customers or partners. Ceerus
is the only platform that
securely bridges commonly
used third party apps so users
always have a secure
conversation even if they are
not using the same app.
Ceerus is integrated with WhatsApp
Business API to enable compliance and
monitoring as well as security policy on
WhatsApp customer and staff
communications
Deploy on-premise or cloud instances of
Wickr alongside Ceerus to enable
interoperability between Wickr users and
Ceerus users
Set policy and data retention for SMS
notificaitions, reminders and other
communications where data connectivity is
unavailable
Enable call recording and audibility of
landline calls and non-app users for
compliance and regulatory purposes
Ensure a consistent policy when
collaborating with users on MS Teams
chat rooms
Create a security bubble that extends to third party apps to cover all communications channels inside and outside your organization for staff, customers or partners. Ceerus is the only platform that securely bridges commonly used third party apps so users always have a secure conversation even if they are not using the same app.
Technical infoCeerus is integrated with WhatsApp Business API to enable compliance and monitoring as well as security policy on WhatsApp customer and staff communications
Deploy on-premise or cloud instances of Wickr alongside Ceerus to enable interoperability between Wickr users and Ceerus users
Set policy and data retention for SMS notificaitons, reminders and other communications where data connectivity is unavailable
Enable call recording and auditability of landline calls and non-app users for compliance and regulatory purposes
Ensure a consistent policy when collaborating with users on MS Teams chat rooms
Create a security bubble that extends to third party apps to cover all communications channels inside and outside your organization for staff, customers or partners. Ceerus is the only platform that securely bridges commonly used third party apps so users always have a secure conversation even if they are not using the same app. Technical info
Ceerus is integrated with WhatsApp Business API to enable compliance and monitoring as well as security policy on WhatsApp customer and staff communications
Deploy on-premise or cloud instances of Wickr alongside Ceerus to enable interoperability between Wickr users and Ceerus users
Set policy and data retention for SMS notifications, reminders and other communications where data connectivity is unavailable
Enable call recording and audibility of landline calls and non-app users for compliance and regulatory purposes
Ensure a consistent policy when collaborating with users on MS Teams chat rooms
Ceerus Enterprise is a package of all the server components needed to run and maintain a secure communications service
We are completely agnostic to hosting environment so you can host Ceerus Enterprise on any cloud or onpremise server anywhere in the world
Our pricing model is based on a variety of different factors and our team will be happy to prepare a quote for deploying Ceerus Enterprise
Ceerus Enterprise is aimed at organisations operating in regulated environments and handle personal or commercially sensitive data
You have full control over access policy for Ceerus Enterprise and this can be controlled through the policy management portal
Due to the cryptographic components of Ceerus Enterprise, we are governed by export control regulations. Please talk to us about your requirements and we can give you a more accurate overview of the process to deploy Ceerus Enterprise in your jurisdiction
Data retention defines the policies of persistent data and records management for meeting legal and business data archival requirements.Read more…
Multimedia Internet KEYing (MIKEY) is a key management protocol that is intended for use with real-time applications. It can specifically be used to set up encryption keys for multimedia sessions that are secured using SRTP, the security protocol commonly used for securing real-time communications such as VoIP.
Sakai-Kasahara Key Encryption in Multimedia Internet KEYing (MIKEY). This is an Identity-Based Authenticated Key Exchange method. Read more…
SS7 (Signaling System No. 7) is a set of telephony signaling protocols developed in 1975, which is used to set up and tear down telephone calls in most parts of the world-wide public switched telephone network (PSTN). The protocol also performs number translation, local number portability, prepaid billing, Short Message Service (SMS), and other services.
In 2008, several SS7 vulnerabilities were published that permitted the tracking of cell phone users. In 2014, the media reported a protocol vulnerability of SS7 by which anybody can track the movements of cell phone users from virtually anywhere in the world with a success rate of approximately 70%. In addition, eavesdropping is possible by using the protocol to forward calls and also facilitate decryption by requesting that each caller's carrier release a temporary encryption key to unlock the communication after it has been recorded. Read more…
Eavesdropping is the act of secretly or stealthily listening to the private conversation or communications of others without their consent in order to gather information. The practice is widely regarded as unethical, and in many jurisdictions is illegal.
Read more…
Phishing is the fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in an electronic communication. Typically carried out by email spoofing, instant messaging, and text messaging, phishing often directs users to enter personal information at a fake website which matches the look and feel of the legitimate site. Read more…