• broken image

    Hushmeeting Black Box Server:

    Crypticall takes every precaution to ensure our customers’ data is kept private and secure. We encourage clients to take full charge of their critical data with our Hushmeeting enterprise solutions which gives them full control over their hardware server without any need to grant any third-party access to others.
     
    On-site installation of the server adds to a higher level of privacy and physical security allowing you to control your saved data and access it within your premises according to your protocol.
     
    Our engineers will give instructions to your technical team for autonomous configuration and management of the server and its hardware to ensure maximum privacy from us and other third parties.
     
    Please be aware that HushmeetingBlack Box server deployment does not allow for any software modifications. If your organization is looking to modify our solutions to your encryption and security configuration needs, please refer to our Hushmeeting Secure Server.
  • Hushmeeting Secure Server

    HushmeetingSecure Server provides clients with top-notch security and privacy options as it is deployed on-site along with a full know-how transfer to the client’s technical team to empower them to check, modify and deploy the software’s source code to ensure complete confidentiality.
     
    After gaining visibility on the source code, clients can choose between encryption algorithms, select to implement post-quantum cryptography, and run their certification authority and SSL certificates, with no need to delegate any private information to us or any third parties.
     
    Our expert engineers train and transfer thorough knowledge of the equipment and the software to the client’s technical team after which they can verify the compilation of the executable source code allowing them complete independence in editing and managing.
  • Hushmeeting Devices

    Our Hushmeeting phone and Hushmeeting PCs work with a special operating system (non-standard) are specially manufactured to identify and thwart any attacks and intrusions that may target the communication channel, software, or any hardware component of the device.
     
    All Hushmeeting devices are managed with a very strong authentication system with a secure chat implemented into the system which allows for fully encrypted communication: text and audio messages, pictures, videos, documents, and GPS positions. With extremely scalable communication, Hushmeeting devices allow for secure audio and video calling among an unlimited number of participants.
     
    Secured productivity tools are used for documents, emails, and other data instead of Outlook, Excel, or Word to secure information from any backdoors towards the internet.