Enterprise Europe Network

A Slovak innovative SME is offering a comprehensive solution for secure mobile communication and is looking for partners to cooperate via acquisition agreement or outsourcing agreement

Country of origin:
External Id: 
Last update
Expiration date


Partner keyword: 
Computer Software
Data Protection, Storage, Cryptography, Security
Mobile Communications
Network Technology, Network Security
Other commercial communications
Other telephone related
Data communication components
Other telecommunications activities
Security systems service activities


A Slovak company specialized in the secure communication provides to customers its own developed, fully scalable platforms for secure mobile communication including voice, data communication, file transfer and messaging – all with strong encryption which makes information 100 % secure. The company is looking for partners interested in secure communication solutions to cooperate via acquisition agreement with technical assistance or outsourcing agreement.



The company provides the full range of its own developed products for secure communication. The Slovak SME was founded in 1996 by a group of technical experts and in the coming years pioneered several new technologies.
The above mentioned technology is fast to implement and easy to use software solution targeted for any type of secure mobile communication such as voice calls, text messages, chats, file transfers, photos and voice conferencing. It is designed to be used by anybody who wants to protect and secure his voice calls, messages, sensitive documents, photos or any files against unauthorized usage.

The technology offers a wide variety of secure communication:
Secure contacts
- the app uses contacts which are separated from other phone contacts. After logging off the app, contacts will not be saved in the phone.

Secure voice calls
- voice communication between two participants - similar to a standard telephone call - in a special, secured (with strong encryption) mode without impact on the call quality. For secure
voice call the app automatically creates unique encrypting keys securing the connection. During the connection, all information transmitted by the technology system is encrypted by the sender
and decrypted by the receiver. Nobody, not even the communication server, is able to intercept the communications.

Secure messages
Text messaging with encrypted content, attachments and more features.

Secure file transfer
- any file with any size to be sent with encrypted content; in addition to sending standard documents and files. The client app offers to take a picture or video by using camera, record an
audio and send it as a file to any recipient in an easy and simple way, downloadable on participant demand.

Secure conference
- secure chat conferences between two or more participants with possibility of transfer encrypted instant text messages, images, audio, video and all other types of files; enables multiple chat sessions.
When user closes the application, no information remains stored in the device. This means that no forensic analysis is able to retrieve any sensitive information (like voice calls, text messages,
files and contacts) from the user’s device.

Secure file storage
- App provides secure storage for sensitive documents, photos or other files.

The core technology infrastructure is based on client-server principles and consists of following client and server software modules:
- Communication Server
- Client Application Server
- Operator Studio
- Client applications (for all operational systems – iOS, Android, BlackBerry and Windows)

Client applications are made for end users’ mobile phones, tablets and personal computers. Server modules provide mainly authorization and mutual connection between individual users.
The technology can be delivered as scalable solution which meets specific customer requirements. It is appropriate for individuals, private companies and governmental bodies.

This solution is provided and guaranteed by a well-experienced qualified company of good report in the field of mobile security. Secure mobile communication products are present in
countries throughout the world and used mainly by individuals (sales representatives, top- managers), important private companies, as well as by governmental institutions (army,
intelligence services).

These products are suited for any corporate, governmental or individual user, requiring a secure mobile communication. The company is looking for partners interested in secure communication. Partners are sought to cooperate via (more deeply specified in the Partner Sought):
- Acquisition agreement- commercial agreement with technical assistance,
- Outsourcing agreement - the specific technological services in the field of secure communication are offered by Slovak company.

Advantages & innovations

Cooperation plus value: 
- The technology client application is available for variety of devices and platforms: mobile phones, smart phones, tablets, personal computers (laptops or desktops). - The technology supports most of the latest mobile phones running on one of the following operating system: Android, iOS, BlackBerry, Windows. - The solution has intuitive and modern user interface; crystal clear sound for voice communication. It supports all the most used Internet (IP - Internet Protocol) networks. - End-to-end security Data are encrypted before sending and are decrypted after delivery to receiver. Data are never decrypted during transfer. Server never knows encryption communication keys and is not able to decrypt the content. - No permanent information No information remains stored on user’s device. It means that sensitive data will not become compromise even in case of device is lost or stolen. - NATO approved This technology is the first solution world-wide for secure mobile communication that was positioned in the NATO Information Assurance Products Cataloque (NIAPC). Since 2006 is certified by a growing number of National Security Agencies as a product for secure mobile communication up to levels restricted and confidental. The technology is designed to comply with the latest NATO and US standards in security. - It could be deployed as simple product type solution or as a complex communication solution connected to all other systems. The core technology infrastructure is based on client-server principles and consists of client applications (for all operational systems) and server software modules.

Stage of development

Cooperation stage dev stage: 
Already on the market

Partner sought

Cooperation area: 
Type of partner: any partner interested in secure communication. The partners are sought especially for acquisition or outsourcing of their technology. Field of activity of partner: no preference, all business partners interested in secure communication (individuals, private companies, governmental bodies, top management, etc.) Role of a partner: Business or research cooperation with partners interested in secure communication is expected. - Acquisition agreement- commercial agreement with technical assistance - Outsourcing agreement - the specific technological services in the field of secure communication are offered by Slovak company.

Type and size

Cooperation task: 
SME 11-50,University,Inventor,R&D Institution,SME <10,>500 MNE,251-500,SME 51-250,>500