Security, the way it should be

Cutting-edge encryption, strong mutual authentication and advanced security on the edge.

Keep your confidential communications safe with RealTyme secure collaboration suite.

Security Settings

State of the art Cryptography

Strong Mutual Authentication

RealTyme performs mutual authentication through digital signatures via the use of public key cryptography (ECDSA with SHA256/512 over the curves P-256 and P-521) between the applications and server, as well as directly between the applications.

Discover Features

End-to-End Encrypted Messaging

Realtyme messaging on mobile

RealTyme direct and group messages are encrypted individually in three layers: first, with end-to-end encryption between the applications (using the authenticated encryption mode of operation AES-256 CCM), followed by an application specific client to server encryption and finally a transport layer via standard TLS.

Discover Features
Realtyme messaging on mobile
Audio and video call security

Audio/Video Call Security

Audio and video call security

RealTyme uses the widely adapted standard WebRTC for audio and video calling. For cryptographic operations, we use the underlying mechanisms DTLS (authenticated key exchange) and sRTP (media encryption with AES-256 GCM) that are publicly available as open-source protocols.

Discover Features
Realtyme security

Empowering the Edge

Realtyme security

Data at Rest Encryption

All the data (e.g., messages, contact lists, files, call history, etc.) is stored in an encrypted way on mobile and desktop applications. The keys on the mobile devices are device-specific and can only be exported via RealTyme’s secure back-up mechanism via a specific password.

Multi-Device Security

An auxiliary device has a dedicated key material, and each action (messaging, file sharing, calling) is done for each device separately. The data exchange across devices is ensured in an end-to-end encrypted way. No permanent data storage is done on the server side for data syncing.

Application Security

RealTyme mobile applications are secured against reverse engineering through code hardening and obfuscation; applications are equipped with run-time protection, code integrity, and jailbreak/root detection.

Tailored Security

Realtyme tailored security

Advanced Security Settings

Users are given numerous options in the mobile application for advanced security settings, ranging from automatic screen lock, biometric authentication, secure back-up, screenshot detection, and automatic data deletion.

Fully Owned System

Organizations can enjoy a fully isolated RealTyme instance and control the entire cryptographic keys in full autonomy. Customer specific private PKI and HSM integrations are available for governments, defense organizations and enterprises requiring the highest level of security.

Encrypted Back-up

All the RealTyme application data is already encrypted via the data at-rest encryption mechanism; thus, the application data can be backed up securely via standard methods. The encryption keys are secured via a user-defined back-up password and archived in a separate way via RealTyme servers.

Realtyme tailored security

Solutions to meet your business Needs