Self-hosted Solutions

Our self-hosted solutions enable rapid, frequent, highly-secure mobile communication services with reliable delivery. The solutions are infinitely scalable and enable clients to expand their technology stack.

Solution Architecture

Our solutions structure applications as a collection of microservices called an instance. Each instance is independently deployable on an Enterprise Server for Secure Communications. The enterprise server is protected behind a Firewall, through which the traffic is routed to a Secure Mobile Network, protected by an SSL and TLS encryption. Within the Secure Mobile Network, all traffic is encrypted end-to-end with OMEMO, OTR, or ZRTP encryption, based on the communication channel used. Mobile Service Providers are used to establishing communication, but due to encryption technology, no communication data is available to them.

Behind-the-firewall enterprise management portal is ensured a high level of granular control over users’ devices.

Shield

Instance Capacity: 3000 users;

Shield

Scalability: new instances added on-demand to increase capacity.

Self-hosted solutions for secure communication diagram

Integration & Deployment

Shield

On Cloud – Amazon Web Services; Microsoft Azure; Oracle

Shield

On-Premise – Deployment on dedicated organizations' servers

Deployment Options:

Total Control and Visibility Over Your Mobile Communications

shield
Instance Management
  • Lightweight management UI

  • Deploy, manage, and maintain all applications on your instance

  • Manage containers, images, networks, and volumes

  • At-a-glance view of what’s running in your environment

shield
Mobile Device Management (MDM)
  • Web-based MDM platform - Secure Administration System (SAS)

  • Intuitive UI

  • Organize fleets of devices in groups to apply mass actions

  • Push custom apps and control application settings

  • Enforce custom device policies and settings

  • Remotely wipe devices

shield
Encrypted Chat Management
  • Dedicated server for Extensive Messaging and Presence Protocol (XMPP)

  • OTR & OMEMO encryption protocols

  • Real-time monitoring of server statistics and user activity without access to sensitive data

  • Setup customization through additional plugins

shield
Encrypted VoIP Calls Management
  • Dedicated SIP Server, SIP load balancer

  • SIP Firewall ensuring calls security

  • ZRTP encryption protocol

  • Monitor server performance

shield
Encrypted Email Server Management
  • PGP email server

  • PGP encryption protocol

  • Whitelist and blacklist communication with other email servers

shield
Instance Management
shield
Mobile Device Management (MDM)
shield
Encrypted Chat Management
shield
Encrypted VoIP Calls Management
shield
Encrypted Email Server Management

Secure Your Communication Infrastructure and Ensure Total Control Over Mobile Security