COMMUNICATION SECURITY GROUP in Encryption Software

Are you from this Company?
COMMUNICATION SECURITY GROUP
Colorado, USA
1994
$500MN to $1BN
Enterprise
91 Likes
73 Buyers Negotiating

Summary

Communication Security Group's Cellcrypt is a comprehensive solution for trusted mobile communications. Cellcrypt facilitates secure, encrypted voice and conference calls, secure messaging and encrypted file transfers.
Features:
Private Messaging - It allows users to send secure messages between smartphones, PCs, and Macs and also allows them to share photos, videos, voice clips etc.
Secure Voice calls - Cellcrypt totally encrypts the voice calls and routes them through the mobile device’s data connection.
Top Secret Level Cryptography - It also offers top secret grade cryptography with Signal Obsfucation.
Seecrypt offers private, real-time messaging, secure voice, and conference calling solutions along with encrypted file sharing. With Seecrypt, businesses are secured against call interception and eavesdropping by the highest quality of encryption and authentication.

Discussions

Strengths
  • +12
    Professional Services
  • +14
    Support and Maintenance
  • +9
    On-Site Support
  • +10
    Remote Support
  • +9
    AES
  • +7
    Large Enterprises
  • +10
    Cloud
  • +14
    Directly
  • +9
    On-Premise
  • +5
    Through Partners / Third-Party Vendors
  • +11
    Communication Encryption (Voice email, and message)
  • +13
    Data Encryption
  • +8
    SMEs
  • +12
    Data-at-rest encryption
  • +13
    Managed Services
  • +10
    Customer Redressal Mechanism/Program
  • +9
    Level of Support
  • +5
    Consulting Service
  • +6
    Training and education
  • +10
    Patented inhouse algorithm
Cautions
  • -10
    IaaS
  • -9
    PaaS
  • -8
    SaaS
  • -12
    Cloud Encryption
  • -10
    Database and Application Encryption
  • -14
    Data Loss Prevention
  • -8
    Disk Encryption
  • -9
    File/Folder Encryption
  • -6
    Key Management
  • -5
    Tokenization
  • -7
    Others
  • -6
    Application-level encryption
  • -8
    Application-level tokenization
  • -7
    Column-level encryption
I agree to 360Quadrants Terms of use and privacy policy
Success
info
Error
Company Size :
  Enterprise
  SME
  Startup