Home

Create A Phone System With 99.999% Uptime
Create a high availability PBX for hospitals, 911 dispatch centers, and mission critical call centers
Use HAAst™ (High Availability for Asterisk) to combine any two Asterisk® servers into a single cluster. Detect PBX performance degradation, network route problems, hardware failures, and more. Synchronize data between peers including files, directories, MySQL databases, and tables. Failover from one peer to another in seconds.


Balance call loads and interconnect incompatible trunks and codecs
Balance calls across multiple PBX's, and interconnect trunks / PBX's with intelligent call routing, codec conversion, and trunk conversion
Use LoDi™ (Load Director) to balance calls across all available PBX's using sophisticated load balancing algorithms and realtime load measurement. Use Lodi as a trunk gateway (any combination of SIP, IAX2, H323, T1, E1, J1, BRI, POTS) and codec transcoder (any combination of G.711 ulaw, G.711 alaw, G.722, G.726, G.729, GSM, iLBC, LPC10, Speex) to bridge incompatible trunks / PBX's and offload downstream processing. LoDi performs intelligent routing with user-defined logic rule processing, header rewriting, and more. LoDi is an all-in-one easy to manage load balancer / gateway / router with optional high availability and perimiter security.


Try the High Availability Asterisk Solution Chosen by ITSP's/VoIP Providers
See why ITSP's/VoIP providers are replacing complex HA solutions with HAAst
Companies like ITSP's and VoIP providers operating banks of clustered Asterisk servers are embracing HAAst for its simplicity, lower cost, superior capabilities, and record of Asterisk uptime. One large German ITSP replaced a complex collection of virtual machines, Heartbeat/Pacemaker, SER, NFS shares, and synchronization scripts with HAAst after their homegrown solution proved too complex to reliably operate and too expensive to maintain. After several high profile outages this ITSP like many others embraced HAAst, and can now focus on growing their business not maintaining their infrastructure.


Protect Your Phone System Against Fraud And Intrusion
Detect breached credentials,
intrusion attempts, and suspicious activity, then lock out hackers
at the source
Use SecAst™ (Security for Asterisk) to
monitor all attempts to access your Asterisk® PBX, detect breached credentials,
detect spread-IP attacks, identify unusual dialing patterns, discover suspicious activity, and spot excessive calling frequency.
Allow or deny access to your PBX by continent / country / region / city, by account,
or by source IP address.


Deliver Vehicle Telematics To Your Call Center
Acquire realtime telematics data from your
customers' vehicles and integrate the results with your call center apps
Use TeleData™ to extract telematics data
in realtime wirelessly from customers' vehicles, and deliver it inside (using SIP headers) or
outside (using XML/JSON/API) the call path to create powerful call center capabilities
and offer new services to clients.


Create Custom Software Quickly And Professionally
Allow Telium to develop your custom applications which
integrate telephony, VoIP, and/or vehicle telematics
Let Telium be your software development partner to create
new applications or enhance existing systems with new features and functionality.
We offer a wealth of experience combined with the tools and techniques to
bring your ideas to life quickly and professionally. Deep expertise in
telephony, VoIP, and telematics allows Telium to deliver complex solutions
with ease.


Prevent Telecom Fraud and Hacking
Mitigate the costs associated with
toll fraud by restricting access to and from known risks
The risks and costs associated with telecom fraud are growing
daily, with single incident fraud costs easily exceeding $100,000 per day.
Leverage Telium's SecData™ service to block phone numbers known to
be used for fraud, and prevent PBX access from any IP addresses known to be
associated with telecom hacking and intrusion. SecData is the only product
on the market capable of detecting spread-IP attacks.


Create A Phone System With 99.999% Uptime
Use HAAst™ (High Availability for Asterisk) to combine any two Asterisk® servers into a single cluster. Detect PBX performance degradation, network route problems, hardware failures, and more. Synchronize data between peers including files, directories, MySQL databases, and tables. Failover from one peer to another in seconds.

Balance call loads and interconnect incompatible trunks and codecs
Use LoDi™ (Load Director) to balance calls across all available PBX's using sophisticated load balancing algorithms and realtime load measurement. Use Lodi as a trunk gateway (any combination of SIP, IAX2, H323, T1, E1, J1, BRI, POTS) and codec transcoder (any combination of G.711 ulaw, G.711 alaw, G.722, G.726, G.729, GSM, iLBC, LPC10, Speex) to bridge incompatible trunks / PBX's and offload downstream processing. LoDi performs intelligent routing with user-defined logic rule processing, header rewriting, and more. LoDi is an all-in-one easy to manage load balancer / gateway / router with optional high availability and perimiter security.

Try the High Availability Asterisk Solution Chosen by ITSP's/VoIP Providers
Companies like ITSP's and VoIP providers operating banks of clustered Asterisk servers are embracing HAAst for its simplicity, lower cost, superior capabilities, and record of Asterisk uptime. One large German ITSP replaced a complex collection of virtual machines, Heartbeat/Pacemaker, SER, NFS shares, and synchronization scripts with HAAst after their homegrown solution proved too complex to reliably operate and too expensive to maintain. After several high profile outages this ITSP like many others embraced HAAst, and can now focus on growing their business not maintaining their infrastructure.

Protect Your Phone System Against Fraud And Intrusion
Use SecAst™ (Security for Asterisk) to
monitor all attempts to access your Asterisk® PBX, detect breached credentials,
detect spread-IP attacks, identify unusual dialing patterns, discover suspicious activity, and spot excessive calling frequency.
Allow or deny access to your PBX by continent / country / region / city, by account,
or by source IP address.

Deliver Vehicle Telematics To Your Call Center
Use TeleData™ to extract telematics data
in realtime wirelessly from customers' vehicles, and deliver it inside (using SIP headers) or
outside (using XML/JSON/API) the call path to create powerful call center capabilities
and offer new services to clients.

Create Custom Software Quickly And Professionally
Let Telium be your software development partner to create
new applications or enhance existing systems with new features and functionality.
We offer a wealth of experience combined with the tools and techniques to
bring your ideas to life quickly and professionally. Deep expertise in
telephony, VoIP, and telematics allows Telium to deliver complex solutions
with ease.

Prevent Telecom Fraud and Hacking
The risks and costs associated with telecom fraud are growing
daily, with single incident fraud costs easily exceeding $100,000 per day.
Leverage Telium's SecData™ service to block phone numbers known to
be used for fraud, and prevent PBX access from any IP addresses known to be
associated with telecom hacking and intrusion. SecData is the only product
on the market capable of detecting spread-IP attacks.