A Platform Designed
to Deliver

What Makes Us Stand Out

Private, Fast, Always-on Network

Ownership and control for highly available services

Our network infrastructure is at the heart of our services. Without it, our applications and solutions wouldn’t work, and your information would not be safe. In other words, our secure infrastructure makes your secure communication possible and reliable. Read More

To guarantee complete security and control, we realized early that we need to own the infrastructure our services rely on. Not only the physical components but the entire process of management. This approach has allowed us to diminish the role of third-parties and set it up so that it can scale infinitely, never crash, and perform at high speed over our fiber optic connection ring.

High Availability

High Availability

Infinitely Scalable

Infinitely Scalable

Optic Fiber Connection

Optic Fiber Connection

Minimal Data Retention

Minimal Data Retention

IN-HOUSE MANAGED

  • Mobile Operator
  • Networking
  • Storage
  • Servers
  • Virtualization
  • Operating System
  • Middleware
  • Runtime
  • Data
  • Applications

OUTSOURCED

  • Mobile Operator
  • Networking
  • Storage
  • Servers
  • Virtualization
  • Operating System
  • Middleware
  • Runtime
  • Data
  • Applications

Others

STEP 1 - The Journey Starts with Your Request

Secure
from the Start

As our user, you expect to hit the “send” button and your request (message) to land in the mailbox of the intended recipient securely. As you should. But before your request reaches its final destination, it goes on a journey from our apps, to our Secure SIM, to our mobile provider, and then to the heart of our network, the servers. Read More

We secure all that traffic. We designed our ecosystem in such a way that from our custom encrypted device, Secure Phone, encrypted apps, secured traffic inside our network, to being your data provider via Secure SIM – your information is always safe.

  • Multi-IMSI for the best connectivity
  • Unlimited global data
  • No roaming fees

Secure SIM

Secure Sim
Secure Phone
Secure OS

Secure
OS

AES-128 bit

Encryption

Custom Recovery Highly tuned kernel Mandatory Encryption Learn More >

End-to-End
Encrypted Communication

Your communication is end-to-end encrypted with the PGP, OTR, OMEMO and ZRTP encryption protocols from the first action you take. This means that even if a third party intercepts your email, chat or call message, it will be incomprehensible.

STEP 2 - Your Request Meets Our Inspection

Advanced Security Network Operations Center

Your request needs to pass the inspection of our multi-tier Advanced Security Network Operations Center (ASNOC) before it proceeds. At the ASNOC, we ensure the high availability of our network relying on a combination of security experts, processes and technology.Read More

We share security intelligence and resources to assess threats in real-time and perform security device monitoring and alerting. Also, we have capabilities for advanced threat detection and real-time incident response, containment, and remediation.

Instant Stop of
DDoS Attacks

A Distributed Denial of Service attack, or DDoS attack, flood a network and servers so that they cannot process legitimate traffic. In such attacks, intruders try to saturate the network connectivity of the target and deny access for legitimate users.

To fight DDoS, we don’t rely only on our firewall but have partnered with a mitigation provider that has a network with 3 Terabits per second of scrubbing capacity, and a network of data centers that deliver minimal latency of 50 milliseconds.

Start to Finish
Security Operations

We fight security incidents and potential breaches by covering the whole lifecycle of the threat all the way from initial detection to final resolution.

Lifecycle 1
Lifecycle 2
Lifecycle 3
Lifecycle 4
  • Real-time incident response, breach containment and remediation
  • Low detection-to-cleanup time with retrospective security
  • Enterprise firewall & quality of service (QoS) functionalities for smarter and deeper inspection
  • No process latency

3 Tbps

Scrubbing Capacity

50 ms

Minimal Latency

24/7

Continuous Scanning

STEP 3 - Your Request Reaches Our Servers

Secure, Highly Available, Scalable

Everything connected to our servers is designed with security in mind. Moreover, to deliver the best user experience, we organized our server structure in a way that allows infinite scalability and high availability. Inside, all traffic flows through our encrypted fiber-optic network and touches only encrypted hard drives and storage.

Controlled Server Access

We use token-based authentication to log to our servers. This method offers an additional layer of security to the username/password one. It is much like when you want to send a money transfer, but in addition to your password you need to provide one more authentication; a code sent via a text message, for example.

BGP Connection
Redundancy

Our network is always-on thanks to the redundant uplinks over the BGP4 protocol. We have implemented BGP multihoming to different carriers, which allows us to connect to a new Internet provider everytime the service goes down.

Server One
Server Two
Server Three

Encrypted Fiber Connectivity

Our servers and data centers connect to the Internet via a private fiber optic connection ring directly through tier 1 providers.

Highly Available

Highly Available

  • Encrypted multiple hard drives
  • Expandable storage
  • Cluster organization
  • Redundant power supply
  • Encrypted multiple hard drives
  • Expandable storage
  • Cluster organization
  • Redundant power supply

Arranged in cluster formation, our servers guarantee never-failing performance. This organization allows our machines to create hot redundancy i.e. multiple servers with the same function (mail, for example) mirror each other and distribute the workload among themselves. Also, we ensure high availability with multiple hard drives and infinitely scalable storage area.

Scalable

Scalable

  • Modular approach
  • Add servers and storage on demand
  • Multiple data centers
  • Predictive analysis
  • Modular approach
  • Add servers and storage on demand
  • Multiple data centers
  • Predictive analysis

Our modular approach allows us to add more servers and slip in more blades with storage, when we need higher availability. Also, our three data centers add additional backup to ensure high performance. Moreover, prediction analysis helps us avoid service and network failures.

Dedicated

Dedicated

  • Dedicated Servers
  • Secure Mail
  • Secure Voice
  • Secure Chat
  • Dedicated Servers
  • Secure Mail
  • Secure Voice
  • Secure Chat

Our dedicated email, chat, and voice servers can handle a considerable amount of traffic for a high delivery rate, as well as an always-on availability of our services. The idea behind having dedicated servers is that one server handles requests, say, only for email; it is dedicated to serving only email traffic, nothing else.

Our Data Centers

Multiple Secure Data Centers

We have three data centers, one of which is in Sofia, Bulgaria. As a security precaution, we will keep the location of the other two private. To enhance security, all locations feature a Building Management System (BMS), access control, and 24/7 video surveillance and on-site security.

Moreover, to make Secure Group’s services reliable and accessible at all times, the physical locations feature a class A main electrical feed with 3,4 MW backup generators and cooling Modules N+1 Redundant Chillers.

Undisclosed Locations

As a company dedicated to securing the communications and data of its users, Secure Group must protect its infrastructure and keep the location of the other two data centers private.

Bulletproof security

  • BMS system for real-time parameters monitoring
  • Class A main electrical feed with 3,4 MW backup generators
  • Cooling Modules N+1 Redundant Chillers