We have developed the world’s most sophisticated and unbreakable encryption software. It has been tested over 20 times in the past 5 years by government cyber experts.  Some of these experts believe it capable of repelling a “quantum hack.”

With this, our mission is simple:

To bring secure privacy back into data communications stopping rogue hackers, nation states, pirates and thieves from accessing your intellectual property.


Cyber attacks target all forms of computing devices in all enterprises including entertainment, media, film, sporting, government, commercial, banking, etc. Whether for financial gain or boastful pride, the rise of this criminal activity continues to expand globally with the U.S. as the biggest target for cyber-theft, as evidenced by the recent Equifax and Yahoo breaches.

Introducing UltraSuite

Solutions for achieving complete security of data-in-motion, regardless of data type.


Delivering secure communications for voice, video, data, situational awareness, and duress alerts in most any network environment. Where a network doesn’t exist, we create one out of thin air.


Protecting servers from bad actor attack vectors anywhere in the world. Access Point servers are placed in a circumference perimeter around one or more servers–creating a security wall to protect from internet attack vectors.


A secure streaming solution protecting the media and control information from pirates and hackers intent on stealing media or intelligence.

How is UltraSuite Different?

FIPS 140-2 Encryption

Multiple layers of FIPS 140-2 encryption. One-time use FIPS 140-2 encryption keys for each communication session and function.

Licensed Specific to installation on Hardware or Virtual Machines

Software and license cannot be copied and executed on another device. This allows for the creation of a trusted node architecture where only NCoded licensed trusted nodes are able to communicate with each other.

Server Protection

Implemented in all NCoded apps prohibiting direct access to the servers unless the UltraPad Client app resides on the endpoint that is accessing the servers.

Multiple Communication Methods

Audio, chat (text), photo, location sharing, duress, Android Tactical Assault Kit (ATAK), media streaming, private http(s), Remote Procedure calls (RPC).

Point-to-Point Encryption

Content is only decrypted on the receiving trusted node endpoint, never along the path to that endpoint.

Device Tracking

If required by the sponsoring organization, depicts a geographic location of configured UltraCom smartphones and tablets.

Server Protection

Implemented in all NCoded apps prohibiting direct access to the servers unless the UltraPad Client app resides on the endpoint that is accessing the servers.

Dedicated Mobile Device Management (MDM) & Communication Servers

Dedicated infrastructure for client organization.

"We believe that data is the phenomenon of our time. It is the world’s new natural resource. It is the new basis of competitive advantage, and it is transforming every profession and industry. If all of this is true - even inevitable - then cybercrime, by definition, is the greatest threat to every profession, every industry, every company in the world."

- Ginni Romett, IBM's chairman, president, and CEO

Updates to our Privacy & Cookie Policy

We value your privacy and are committed to safeguarding your information. In line with the requirements of the upcoming EU data privacy law known as the General Data Protection Regulation (GDPR), we have updated our Privacy & Cookie Policy and Terms of Service, effective May 25, 2018.