New Conference Call Security by Cellcrypt

Updated: January 07, 2011

Cellcrypt has recently launched a secure conference service capable of providing device authentication and voice call encryption. The service is available for mobile phones and smartpones including BlackBerry and Nokia smartphones.

The Cellcrypt Secure Conference Service authenticates participants' mobile phones and encrypts conversations end-to-end between each participant and the conference bridge, thus protecting confidential conversations within business networks. To use Cellcrypt's service, participants can simply select a bridge number from their individual phones when entering calls. A similar product, Cellcrypt's Enterprise Gateway solution, offers businesses the chance to secure conference calls between office phones.

This solution lets administrators manage conference calls within an organization by using a simple web console to define the users involved, create bridge numbers, and define call policies such as user white lists and additional access PINs. Individual bridges may also allow selective public telephones access by using caller ID and PINs for authentication. Both services build on Cellcrypt's past security solutions, described by one writer on VoIP Monitor: “Encryption is government-grade and certified to FIPS 140-2 standard by the US National Institute of Standards and Technology.”
 

Featured Research
  • How Video Conferencing is Transforming Healthcare

    The telemedicine revolution is finally happening. Experts have been discussing the potential for patients and healthcare providers to connect remotely for years, but the market is just now moving to adopt it—in a big way. Data suggests this market will grow over 14% annually through 2020! more

  • Video Conferencing Software Cost Guide

    The benefits of video conferencing are well established. Investments usually deliver a great ROI thanks to increased worker productivity, reduced travel costs, and better collaborations. more

  • The IT Manager Who Shattered Shadow IT

    Shadow IT has become a household (or office-hold) name in today’s modern businesses, but what a lot of organizations don’t realize is the number of risks involved in ignoring those rogue technology installations. The average large enterprise uses around 1,220 individual cloud services, which is more than 13 times the 91 services recognized by IT departments. more

  • Mind the Gap!

    The rise of the digital workforce has resulted in a double-edged sword of enhanced flexibility and productivity, offset by increased complexity in staying connected and efficiently collaborating. Yes, today’s workers have an unprecedented range of tools and applications that increase the places, platforms and processes by which they can do their jobs. more

  • Video Conferencing Best Practices

    Video conferencing is quickly becoming one of the most important communication channels for both small and big businesses. As more businesses turn to this technology, expectations about the experience are also rising. It’s not enough to just offer video conferencing as a communication method. You also need to meet minimum audio and visual standards, and there’s even proper etiquette to consider. more