Create A Phone System With 99.999% Uptime
Use HAAst™ (High Availability for Asterisk) to
combine any two Asterisk® servers into a single cluster. Detect PBX
performance degradation, network route problems, hardware failures, and more.
Synchronize data between peers including files, directories, MySQL databases, and
tables. Failover from one peer to another in seconds.
Try the High Availability Asterisk Solution Chosen by ITSP's/VoIP Providers
Companies like ITSP's and VoIP providers
operating banks of clustered Asterisk servers are embracing HAAst for its
simplicity, lower cost, superior capabilities, and record of Asterisk uptime.
One large German ITSP replaced
a complex collection of virtual machines, Heartbeat/Pacemaker, SER, NFS shares, and synchronization
scripts with HAAst after their homegrown solution proved too complex to reliably
operate and too expensive to maintain. After several high profile outages this
ITSP like many others embraced HAAst, and can now focus on growing their business
not maintaining their infrastructure.
Protect Your Phone System Against Fraud And Intrusion
Use SecAst™ (Security for Asterisk) to
monitor all attempts to access your Asterisk® PBX, detect breached credentials, identify
unusual dialing patterns, discover suspicious activity, and spot excessive calling frequency.
Allow or deny access to your PBX by continent / country / region / city, by account,
or by source IP address.
Deliver Vehicle Telematics To Your Call Center
Use TeleData™ to extract telematics data
in realtime wirelessly from customers' vehicles, and deliver it inside (using SIP headers) or
outside (using XML/JSON/API) the call path to create powerful call center capabilities
and offer new services to clients.
Create Custom Software Quickly And Professionally
Let Telium be your software development partner to create
new applications or enhance existing systems with new features and functionality.
We offer a wealth of experience combined with the tools and techniques to
bring your ideas to life quickly and professionally. Deep expertise in
telephony, VoIP, and telematics allows Telium to deliver complex solutions
Secure Your Telephony Environment
Let Telium conduct a comprehensive security audit
and compare your telephony environment against best practices and standards
for VoIP and related technologies. Analyses and recommendations can span policies, procedures,
configuration of components,logging and tracking, appropriate security layering,
etc. Telium can also conduct root cause analysis, determining points of
entry following an intrusion, determine degree of exposure / breached data,