moveSectionUp moveSectionDown

Totally secure calls and messaging

for you and your business

in just one minute!

Sheltor is a voice, text and multimedia messaging solution that
combines both hardware and software approaches to encryption.
Sheltor is a voice, text and multimedia messaging solution that
combines both hardware and software approaches to encryption.
Security Strategy

Sheltor Security Strategy

Sheltor is a voice and IP messaging solution that uses the Internet to transfer data. Voice calls and messages are end-to-end encrypted at the hardware level using AES 256 along with any other standard simultaneously along with as three basic technologies for different areas of communication - symmetric encryption, asymmetric encryption, and public key distribution. This ensures that the conversation is accessible only to authorized parties during a communication session.

Sheltor servers, mobile and stationary devices are designed and manufactured using our own technology from proven components that guarantee the absence of hardware “bookmarks.” Encryption of messages and voice communications takes place inside proprietary chips and ensures complete secrecy.

Sheltor Pro One
mobile phone
supports LTE, Wi-Fi and Bluetooth LE.

Modular cryptography

Modular cryptography

Sheltor’s modular cryptography allows you to use one or more types of encryption, either individually or in combination (sequential encryption). Sheltor servers are secured against brute force and DDoS attacks and can be cloned to ensure continuous operation while being located all around the globe. The servers can be placed at any site at the client’s discretion to ensure full security. Nobody — not even the equipment supplier — will be able to access the data.

In the Sheltor ecosystem you can transfer and store media-rich data such as photos and videos using the untrusted cloud services like Amazon. In addition to unprecedented security, we are also focused on user-friendliness and have implemented both voice conferencing and convenient group chats. We have developed a simple and clear network administration system with the ability to connect friendly Sheltor networks to ensure secure communications between different companies.

Mobile Application

Access
Sheltor Access

Sheltor Access

Sheltor Access

Sheltor Access is a hardware VPN platform allowing for the creation of safe corporate communication channels inside a unified and secured cryptographic environment. Sheltor Access protects corporate networks and provides access to files from a remote workstations through Gate and Air terminals, as well as through the secured Sheltor Workstation.

The Sheltor Access crypto complex is designed to organize communication between local area networks and is used for protecting information while transferring data over open channels. Communication solutions are selected in the design stage based on the kind of traffic, network topology and the bandwidth required for the networks, their segments and individual users.

Sheltor Access Features

  • Hardware encoder implementation
  • Zero administration
  • High system reliability
  • Low power consumption
  • <1ms latency
  • Extended uptime
  • Automatic sharing of network management between broadband devices in case one of the devices leaves the network without loss of performance

Devices
Sheltor Workstation
Workstation

A secured PC with hardware cryptographic protection

Sheltor Broadband
Broadband

Sheltor Broadband crypto-router with high bandwidth

Sheltor Air
Air

Sheltor Air is a secured wireless access portal with worldwide coverage

Sheltor Gate
Gate

Sheltor Gate crypto-router for SOHO setups

Access
Sheltor Workstation

Sheltor Workstation

A secured PC with hardware cryptographic protection that can operate both as a thin client and a PC with a built-in hardware VPN.

Designed for secure remote access to any corporate system and instant setup of remote secured workplaces at any location. Provides access to corporate networks via a secure channel and secure local information storage.

Sheltor Workstation Features

  • User authentication through a centralized service
  • Key management through a centralized service
  • Authenticated data entry and media connections at the hardware level (without CPU involvement), OS integrity monitoring
  • Remote workstation blocking (along with all local data) through a centralized service
  • Hardware-level user data encryption
  • Hardware-level network traffic encryption
  • Isolation of the user’s OS from the outside world: interaction permitted only with trusted sites on the corporate network via an encrypted channel
  • Choice of user OS: Windows 10 or Linux (any version)
  • 4-core Intel Atom CPU
  • Secure SSD from 64 to 512GB
  • Ethernet 100/1000
  • Wi-Fi
  • HDMI
  • LTE support

Devices
Sheltor Workstation
Workstation

A secured PC with hardware cryptographic protection

Sheltor Broadband
Broadband

Sheltor Broadband crypto-router with high bandwidth

Sheltor Air
Air

Sheltor Air is a secured wireless access portal with worldwide coverage

Sheltor Gate
Gate

Sheltor Gate crypto-router for SOHO setups

Access
Sheltor Broadband

Sheltor Broadband

The Sheltor Broadband crypto-router is a necessary part of equipment bundles with high bandwidth requirements for trusted networks in order to implement centralized remote key table change via a secure channel, as well as to control and monitor network conditions. Featuring data transfer speeds no less than 1 Gbit/sec.

Devices
Sheltor Workstation
Workstation

A secured PC with hardware cryptographic protection

Sheltor Broadband
Broadband

Sheltor Broadband crypto-router with high bandwidth

Sheltor Air
Air

Sheltor Air is a secured wireless access portal with worldwide coverage

Sheltor Gate
Gate

Sheltor Gate crypto-router for SOHO setups

Access
Sheltor Air

Sheltor Air

Sheltor Air is a secured access portal to the corporate network for key employees from any location in the World with a mobile phone connec-tion. Forget about public Wi-Fi networks and unsecured connections. The device functions over any 3G/4G network in the world and is inde-pendent from specific cell providers, eliminating the need for roaming services. Sheltor Air works directly with several mobile operators in every country, providing maximum network coverage. Featuring data transfer speeds of up to 600 Mbits/sec.

Devices
Sheltor Workstation
Workstation

A secured PC with hardware cryptographic protection

Sheltor Broadband
Broadband

Sheltor Broadband crypto-router with high bandwidth

Sheltor Air
Air

Sheltor Air is a secured wireless access portal with worldwide coverage

Sheltor Gate
Gate

Sheltor Gate crypto-router for SOHO setups

Access
Sheltor Gate

Sheltor Gate

The Sheltor Gate solution is used in information and personal data processing systems with high informa-tion security requirements but low throughput, including ATMs and POS terminals, SOHO office setups, and small network branches. Featuring data transfer speeds of no less than 100 Mbits/sec.

Devices
Sheltor Workstation
Workstation

A secured PC with hardware cryptographic protection

Sheltor Broadband
Broadband

Sheltor Broadband crypto-router with high bandwidth

Sheltor Air
Air

Sheltor Air is a secured wireless access portal with worldwide coverage

Sheltor Gate
Gate

Sheltor Gate crypto-router for SOHO setups

Connect
Sheltor Connect

Sheltor Connect

Sheltor Connect

Sheltor Connect is data transfer solution with voice, messaging and multimedia support. Depend-ing on the necessary security level, Sheltor Connect solutions may include software and hardware prod-ucts. Voice and text messages are point-to-point encrypted using AES-256 hardware algorithms. Three component technologies are used for various communication scenarios: symmetric encryption, asym-metric encryption and open key distribution. Sequential real-time encryption by several algorithms significantly increases cryptographic strength.

Sheltor Connect provides secure communication both between company employees and customers. Its rich business functionality allows both communication using voice and messaging as well as document creation, transmission, and editing in a secure cloud.

Sheltor's modular cryptography allows the use of one or more encryption algorithms, either individually or sequentially. In this way, Sheltor protects data from possible vulnerabilities in the encryp-tion algorithms themselves.

Sheltor Connect Features

  • Modular cryptography with multiple sequential encryption algorithms
  • Peer-to-peer communication
  • Hardware cryptographic protection
  • Voice communication
  • Conference calls
  • Call hold
  • Chats
  • Media Sharing
  • Fast network deployment and simple administration
  • Android and iOS mobile apps
  • Applications for Windows, MacOS and Linux

Devices
Core
Core

Key distribution server

Mobile App
Mobile App

Sheltor application for Android OS

Desktop App
Desktop App

Sheltor application running Windows, MacOS and Linux

Sheltor One
One

Secured mobile phone

Sheltor Pro 360
Pro 360

Secured landline for your office

Sheltor SIP gate
SIP gate

Gateway to external telephone networks

Trust PC
Trust PC

A secured PC with hardware cryptographic protection

Sheltor Console
Console

Remote control of Sheltor Connect infrastructure

Sheltor Lib
Lib

Third-party application integration library

Sheltor Drive
Drive

Secured cloud solution

Connect
Sheltor Core

Sheltor Core

Switching server for key management and distribution. DDOS hardware protection.

Sheltor Core Features

  • The software supports signal level communication between devices, key exchange and synchronization
  • It can be deployed as a cloud solution or installed on servers of our own design with hardware protection from DDoS and brute force attacks

Devices
Core
Core

Key distribution server

Mobile App
Mobile App

Sheltor application for Android OS

Desktop App
Desktop App

Sheltor application running Windows, MacOS and Linux

Sheltor One
One

Secured mobile phone

Sheltor Pro 360
Pro 360

Secured landline for your office

Sheltor SIP gate
SIP gate

Gateway to external telephone networks

Trust PC
Trust PC

A secured PC with hardware cryptographic protection

Sheltor Console
Console

Remote control of Sheltor Connect infrastructure

Sheltor Lib
Lib

Third-party application integration library

Sheltor Drive
Drive

Secured cloud solution

Connect
Mobile App

Mobile App

Provides voice communications, messenger service, and cloud access on smartphones running Android and iOS

Mobile App Features

  • Voice calls protected by the most reliable cryptographic solutions
  • Modular cryptography allows dynamic changes to encryption algorithms and the use of several algorithms sequentially to increase cryptographic strength
  • Call hold function
  • Conferencing
  • Can quickly change voice codec to work with low-speed connections
  • Text messenger
  • Chats
  • Cloud storage of multimedia data using Sheltor Drive technology with end-to-end encryption
  • Use of several client devices per subscriber, allowing both conference calls and calls to individual devices separately

Devices
Core
Core

Key distribution server

Mobile App
Mobile App

Sheltor application for Android OS

Desktop App
Desktop App

Sheltor application running Windows, MacOS and Linux

Sheltor One
One

Secured mobile phone

Sheltor Pro 360
Pro 360

Secured landline for your office

Sheltor SIP gate
SIP gate

Gateway to external telephone networks

Trust PC
Trust PC

A secured PC with hardware cryptographic protection

Sheltor Console
Console

Remote control of Sheltor Connect infrastructure

Sheltor Lib
Lib

Third-party application integration library

Sheltor Drive
Drive

Secured cloud solution

Connect
Desktop App

Desktop App

Provides voice communications, messenger service, and cloud access on PCs running Windows, MacOS and Linux.

Devices
Core
Core

Key distribution server

Mobile App
Mobile App

Sheltor application for Android OS

Desktop App
Desktop App

Sheltor application running Windows, MacOS and Linux

Sheltor One
One

Secured mobile phone

Sheltor Pro 360
Pro 360

Secured landline for your office

Sheltor SIP gate
SIP gate

Gateway to external telephone networks

Trust PC
Trust PC

A secured PC with hardware cryptographic protection

Sheltor Console
Console

Remote control of Sheltor Connect infrastructure

Sheltor Lib
Lib

Third-party application integration library

Sheltor Drive
Drive

Secured cloud solution

Connect
Sheltor One

Sheltor One

LTE mobile phone with the highest level of protection.

Devices
Core
Core

Key distribution server

Mobile App
Mobile App

Sheltor application for Android OS

Desktop App
Desktop App

Sheltor application running Windows, MacOS and Linux

Sheltor One
One

Secured mobile phone

Sheltor Pro 360
Pro 360

Secured landline for your office

Sheltor SIP gate
SIP gate

Gateway to external telephone networks

Trust PC
Trust PC

A secured PC with hardware cryptographic protection

Sheltor Console
Console

Remote control of Sheltor Connect infrastructure

Sheltor Lib
Lib

Third-party application integration library

Sheltor Drive
Drive

Secured cloud solution

Connect
Sheltor Pro 360

Sheltor Pro 360

Landline for your office.

Sheltor Pro 360 Features

  • Ethernet port for network access
  • 4.3 inch color display for phone book and caller information
  • Easy network connection setup
  • Speakerphone

Devices
Core
Core

Key distribution server

Mobile App
Mobile App

Sheltor application for Android OS

Desktop App
Desktop App

Sheltor application running Windows, MacOS and Linux

Sheltor One
One

Secured mobile phone

Sheltor Pro 360
Pro 360

Secured landline for your office

Sheltor SIP gate
SIP gate

Gateway to external telephone networks

Trust PC
Trust PC

A secured PC with hardware cryptographic protection

Sheltor Console
Console

Remote control of Sheltor Connect infrastructure

Sheltor Lib
Lib

Third-party application integration library

Sheltor Drive
Drive

Secured cloud solution

Connect
Sheltor SIP gate

Sheltor SIP gate

This SIP gateway provides an interface with external telephone networks, such as corporate or city landlines.

Devices
Core
Core

Key distribution server

Mobile App
Mobile App

Sheltor application for Android OS

Desktop App
Desktop App

Sheltor application running Windows, MacOS and Linux

Sheltor One
One

Secured mobile phone

Sheltor Pro 360
Pro 360

Secured landline for your office

Sheltor SIP gate
SIP gate

Gateway to external telephone networks

Trust PC
Trust PC

A secured PC with hardware cryptographic protection

Sheltor Console
Console

Remote control of Sheltor Connect infrastructure

Sheltor Lib
Lib

Third-party application integration library

Sheltor Drive
Drive

Secured cloud solution

Connect
Trust PC

Trust PC

A secured PC with hardware cryptographic protection that can operate as both a thin client and a PC with built-in hardware VPN.

Designed for secure remote access to any corporate system and instant setup of remote secured workplaces at any location. Provides access to corporate networks by secure channel and secure local information storage.

Trust PC Features

  • User authentication through a centralized service
  • Key management through a centralized service
  • Authenticated data entry or media connections at the hardware level (without CPU involvement), OS integrity monitoring
  • Remote workstation blocking (along with all local data) through a centralized service
  • Hardware level user data encryption
  • Hardware level network traffic encryption
  • Isolation of the user’s OS from the outside world - interaction is possible only with trusted sites on the corporate network via an encrypted channel
  • Choice of user OS: Windows 10 or Linux (any version)
  • 4-core Intel Atom CPU
  • Secure SSD from 64 to 512GB
  • Ethernet 100/1000
  • Wi-Fi
  • HDMI
  • LTE support

Devices
Core
Core

Key distribution server

Mobile App
Mobile App

Sheltor application for Android OS

Desktop App
Desktop App

Sheltor application running Windows, MacOS and Linux

Sheltor One
One

Secured mobile phone

Sheltor Pro 360
Pro 360

Secured landline for your office

Sheltor SIP gate
SIP gate

Gateway to external telephone networks

Trust PC
Trust PC

A secured PC with hardware cryptographic protection

Sheltor Console
Console

Remote control of Sheltor Connect infrastructure

Sheltor Lib
Lib

Third-party application integration library

Sheltor Drive
Drive

Secured cloud solution

Connect
Sheltor Console

Sheltor Console

Network monitoring and control is performed using through a remote secure access device called the Sheltor Console. During operation, the computer does not connect to open or unsecured networks. All service information is transferred using an encrypted transportation infrastructure. This hides the protected network structure and eliminates the possibility of attack from outside open networks.

Devices
Core
Core

Key distribution server

Mobile App
Mobile App

Sheltor application for Android OS

Desktop App
Desktop App

Sheltor application running Windows, MacOS and Linux

Sheltor One
One

Secured mobile phone

Sheltor Pro 360
Pro 360

Secured landline for your office

Sheltor SIP gate
SIP gate

Gateway to external telephone networks

Trust PC
Trust PC

A secured PC with hardware cryptographic protection

Sheltor Console
Console

Remote control of Sheltor Connect infrastructure

Sheltor Lib
Lib

Third-party application integration library

Sheltor Drive
Drive

Secured cloud solution

Connect
Sheltor Lib

Sheltor Lib

Library for the integrating Sheltor secure communication services into third-party applications.

Devices
Core
Core

Key distribution server

Mobile App
Mobile App

Sheltor application for Android OS

Desktop App
Desktop App

Sheltor application running Windows, MacOS and Linux

Sheltor One
One

Secured mobile phone

Sheltor Pro 360
Pro 360

Secured landline for your office

Sheltor SIP gate
SIP gate

Gateway to external telephone networks

Trust PC
Trust PC

A secured PC with hardware cryptographic protection

Sheltor Console
Console

Remote control of Sheltor Connect infrastructure

Sheltor Lib
Lib

Third-party application integration library

Sheltor Drive
Drive

Secured cloud solution

Connect
Sheltor Drive

Sheltor Drive

Sharing and storing encrypted data on unprotected cloud services or dedicated servers with support for access via the Internet using Amazon S3 and FTP technology.

Devices
Core
Core

Key distribution server

Mobile App
Mobile App

Sheltor application for Android OS

Desktop App
Desktop App

Sheltor application running Windows, MacOS and Linux

Sheltor One
One

Secured mobile phone

Sheltor Pro 360
Pro 360

Secured landline for your office

Sheltor SIP gate
SIP gate

Gateway to external telephone networks

Trust PC
Trust PC

A secured PC with hardware cryptographic protection

Sheltor Console
Console

Remote control of Sheltor Connect infrastructure

Sheltor Lib
Lib

Third-party application integration library

Sheltor Drive
Drive

Secured cloud solution

Diode
Sheltor Diode

Sheltor Diode

Sheltor Diode

The Sheltor Diode crypto complex is designed to organize communication between local area networks and is used for protecting information while transferring data over open channels. Communication solutions are selected in the design stage based on the kind of traffic, network topology and bandwidth required for the networks, their segments and individual users.

Sheltor Gate Diode is intended for guaranteed unidirectional transfer of data from open networks to confidential networks, which may be used for classified information transfer at the state secret level. In addition, the data diode can be used to transfer information between networks to ensure the integrity and availability of the transmission network in the absence of confidentiality requirements. In the first case, unidirectional transfer of data to restricted-access networks avoids leakage of confidential information. In the second case, Diode provides protection to the transmitting network from the possibility of external influence.

Sheltor Diode Features

  • Hardware encryption device implementation
  • Zero administration
  • High system reliability
  • Low power consumption

Devices
Sheltor 1G/10G
1G/10G

High-speed unidirectional gateway (information diode)

Sheltor Dongle
Dongle

Unidirectional transfer complex for USB media

Sheltor Flow
Flow

Integrated Unidirectional Gateway for Files and Mail

Diode
Sheltor 1G/10G

Sheltor 1G/10G

The Sheltor 1G/10G high-speed gateway is intended for unidirectional transfer of data from open networks to confidential networks, suitable for classified information transfer at the state secret level. Two network segments can be connected through the information diode if integrity and/or availability must be ensured. In the first case, the guarantee of unidirectional data transmission prevents information leakage from the confidential network. In the second case, undesirable external impact on important infrastructure located in the transmitting network segment can be avoided.

Devices
Sheltor 1G/10G
1G/10G

High-speed unidirectional gateway (information diode)

Sheltor Dongle
Dongle

Unidirectional transfer complex for USB media

Sheltor Flow
Flow

Integrated Unidirectional Gateway for Files and Mail

Diode
Sheltor Dongle

Sheltor Dongle

The Sheltor Dongle unidirectional transfer complex is designed to connect removable USB media in read-only mode (without write capabilities) to personal computers (PC) that process information at state secret levels (including “top secret” levels).

Devices
Sheltor 1G/10G
1G/10G

High-speed unidirectional gateway (information diode)

Sheltor Dongle
Dongle

Unidirectional transfer complex for USB media

Sheltor Flow
Flow

Integrated Unidirectional Gateway for Files and Mail

Diode
Sheltor Flow

Sheltor Flow

Sheltor Flow is designed to guarantee unidirectional transfer of files and mail messages from networks that process information with a lower level of confidentiality (including those connected to the Internet), as well as files from outside USBdrives to networks that process higher-privacy information. In addition, the gateway can connect two network segments that do not have confidentiality requirements to ensure protection of the network transmitting information from external factors. Sheltor Flow consists of two blocks interconnected by a simplex multimode optical cable, each of which is located in the respective networks that transmitting information and appointments.

Devices
Sheltor 1G/10G
1G/10G

High-speed unidirectional gateway (information diode)

Sheltor Dongle
Dongle

Unidirectional transfer complex for USB media

Sheltor Flow
Flow

Integrated Unidirectional Gateway for Files and Mail

Contacts
Contacts

Contacts us

Agiou Prokopiou, 13, Egkomi, 2406, Nicosia, Cyprus

gmap