The New Standard in VoIP
Standard Bell's geo-redundant server architecture delivers uptime and reliability on par with legacy carrier solutions, at a much more affordable price for our customers.
Standard Bell provides fully-encrypted voice communications for modern business. You can trust our unified communications platform to implement the most advanced security available.
Unlike many phone resellers, Standard Bell has a drastically reduced service-delivery overhead, enabling us to provide the most cost-effective solutions for small businesses with budget constraints.
Standard Bell is a full-featured hosted PBX. Our system is compatible with almost any SIP compliant handset or voice software.
Our staff is 100% located in the Unites States. We provide the expertise to ensure your business can maximize its telecommunications productivity.
Standard Bell has been designed to offer a compelling core feature set while maintaining a high customer value.
SRTP encrypts the media content of your calls using a 128-bit AES stream cipher. Message authentication and forgery/replay protection is handled using an 80-bit HMAC-SHA1 algorithm.
Available on select phones, ZRTP adds a layer of security on top of SRTP which relates to key negotiation. ZRTP makes it more difficult for others to determine which encryption keys are used to secure your communications.
Similar to a VPN, MPLS allows us to establish a private network between your business and our data centers. The MPLS link is installed and maintained by your internet service provider.
256-bit TLS encryption allows us to protect call metadata (the "who and when" of your calls). This is the same level of encryption that is used for online credit card transactions.
When your order our managed CPE solution, we maintain a whitelist of authorized devices which are able to connect and make calls. Malicious devices using stolen SIP credentials will be unable to connect to our servers.
By assigning a static public IP to your voice network, we help to ensure that in the event that a malicious user steals a device or credentials from your business, they will be unable to make fraudulent calls or access your account.