Home > Shop > Echo PTT Encrypted Push To Talk

Echo PTT Encrypted Push To Talk

EchoPTT is a communications solution designed for your team. Basically, it is a Voice-over-IP (VoIP) application that operates in IP multicast environments – meaning there’s no server required, in a unicast environment (where a routing connection is required), or a mixed-mode environment where EchoPTT nodes operate as bridges between the local multicast network and routers.


SKU: NSI-PTT-1YLIC Categories: , ,

NSI Global Counter Intelligence are leaders in secure encrypted communication technologies. The EchoPTT platform is perfect for two or more people. Capable of operating in complex network environments and without any server infrastructure. The push-to-talk system uses military-grade security and a unique, server-less method of operation. EchoPTT supports a large range of standards-based technologies and a wide range of configuration options, helping protect the investment you’ve already made.  We have ensured that EchoPTT uses end-to-end encryption using nothing less than AES256 Encryption Technology. The system also requires mutual authentication using standard customer-issued X.509 certificates. EchoPTT also works on VPN’s.

Echo Push to Talk provides real-time team communications:

  • Local or Global Real-Time Communications.
  • Group Chats.
  • Supports Information Security Requirements with AES256 Encryption.
  • Interoperability with Military Combat Net Radios, Motorola, Cisco InstantConnect™, TrellisWare, Silvus Technologies.
  • Useable on wired or wireless networks including Wi-Fi, 5G, LTE, 3G, and SATCOM.
  • Application Deployment and Control – can be used with MDM vendors (AirWatch, MobileIron, Citrix, BlackBerry/Good).


Who is it for?

  • Organisations who have a need to communicate with groups of people, especially during Work-from-Home requirements.

EchoPTT Licence

  • 1 year, renewed yearly


  • AES256 Encryption
  • X.509 Customer-Issued Certificates
  • SHA256 and RSA handshake message authentication
  • End-to-End Encryption