Data Retention
Data retention defines the policies of persistent data and records management for meeting legal and business data archival requirements.Read more…
A free enterprise grade secure communications app for voice, video and messaging.
Quickly and easily create a secure bubble that you control around your entire communications infrastructure.
Extend your security bubble to third party apps and services.
Build a proven security stack into new and existing apps with minimal coding and development.
A free enterprise grade secure communications app for voice, video and messaging.
Quickly and easily create a secure bubble that you control around your entire communications infrastructure.
Extend your security bubble to third party apps and services.
Build a proven security stack into new and existing apps with minimal coding and development.
Deploy and maintain security in all your applications with minimal development effort using the pre-built Ceerus Software Development Kit and APIs that take away the pain of implementing strong security.
The security components of the Ceerus platform have been tried and tested in the most demanding environments. Using the simple SDK and APIs, you can build the same level of security into your products and achieve regulatory compliance without the heavy investment requirements for building a secure product from scratch
Future proofing your security against emerging threats becomes easier using our Security as a Service model that allows you to keep your entire security stack up to date without the need for a dedicated support and maintainance team.
We are adding new services to
our platform to provide a wide
variety of features and
functionality to support every
need
Mike-Sakke, Key Management
Our Key Management Servers use the Mikey-Sakke standard promoted by the UK government as the next generation standard for regulated environments. Using our online KMS service, enterprise keys for every application can be managed through one single, easy to use API
Ceerus offers all the functionality needed to setup a secure voice, video and messaging service within your existing apps or to build new ones quickly without worrying about infrastructure setup, scalability or cost of development
User management services, including onboarding, offboarding and authentication can all be accessed using simple APIs that offer industry leading security and processes to ensure a frictionless experience for users while providing highest levels of security using multifactor authentication and ID based encryption as standard
Cloud services on leading platforms like AWS and Rackspace as well as on-premise deployments can all be managed using simple APIs that take away the complexity of deploying secure communications services at scale with a variety of options for hosting environment and data storage
Our Key Management Servers use the Mikey-Sakke standard promoted by the UK government as the next generation standard for regulated environments. Using our online KMS service, enterprise keys for every application can be managed through one single, easy to use API
Ceerus offers all the functionality needed to setup a secure voice, video and messaging service within your existing apps or to build new ones quickly without worrying about infrastructure setup, scalability or cost of development
User management services, including onboarding, offboarding and authentication can all be accessed using simple APIs that offer industry leading security and processes to ensure a frictionless experience for users while providing highest levels of security using multifactor authentication and ID based encryption as standard
Cloud services on leading platforms like AWS and Rackspace as well as on-premise deployments can all be managed using simple APIs that take away the complexity of deploying secure communications services at scale with a variety of options for hosting environment and data storage
Our simple usage-based pricing means you don’t get locked into big contracts.
Category | Price | Unit |
---|---|---|
Instant messaging | £0.001 | Per message |
Voice Calls (VOIP) | £0.002 | Per minute |
Video Calls (High Quality) | £0.006 | Per minute |
Video Calls (Standard Quality) | £0.003 | Per minute |
Here are some of the frequently
asked questions about Ceerus
SDK/APIs and why you should
use it
The Ceerus Software Development Kit and APIs contain all the software packages to allow developers to integrate secure communications capabilities quickly into their new and existing products with minimal coding and development
Ceerus SDK/API enables integration of Ceerus capabilities into an app or service while Ceerus Connectors allow you to break out of the Ceerus platform to use channels of communication on our various partner platforms
Ceerus SDK/API provides the same encryption, key management and authentication capabilities as the Ceerus App and ensure all conversations are end-to-end secure
Ceerus SDK/API was built from the ground up with security in mind. The technology has already been proven in some of the most challenging environments. Deploying Ceerus SDK/API with Ceerus Enterprise or Ceerus Connectors allows organisations to take complete control of their communications data.
Ceerus SDK/API is for developers and product teams who want to build strong security into their products
With Ceerus SDK/API, you are in complete control of who has access to your data. Our end-to-end encryption ensures that no decrypted content is exposed anywhere in the network or servers.
Data retention defines the policies of persistent data and records management for meeting legal and business data archival requirements.Read more…
Multimedia Internet KEYing (MIKEY) is a key management protocol that is intended for use with real-time applications. It can specifically be used to set up encryption keys for multimedia sessions that are secured using SRTP, the security protocol commonly used for securing real-time communications such as VoIP.
Sakai-Kasahara Key Encryption in Multimedia Internet KEYing (MIKEY). This is an Identity-Based Authenticated Key Exchange method. Read more…
SS7 (Signaling System No. 7) is a set of telephony signaling protocols developed in 1975, which is used to set up and tear down telephone calls in most parts of the world-wide public switched telephone network (PSTN). The protocol also performs number translation, local number portability, prepaid billing, Short Message Service (SMS), and other services.
In 2008, several SS7 vulnerabilities were published that permitted the tracking of cell phone users. In 2014, the media reported a protocol vulnerability of SS7 by which anybody can track the movements of cell phone users from virtually anywhere in the world with a success rate of approximately 70%. In addition, eavesdropping is possible by using the protocol to forward calls and also facilitate decryption by requesting that each caller's carrier release a temporary encryption key to unlock the communication after it has been recorded. Read more…
Eavesdropping is the act of secretly or stealthily listening to the private conversation or communications of others without their consent in order to gather information. The practice is widely regarded as unethical, and in many jurisdictions is illegal.
Read more…
Phishing is the fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in an electronic communication. Typically carried out by email spoofing, instant messaging, and text messaging, phishing often directs users to enter personal information at a fake website which matches the look and feel of the legitimate site. Read more…