Ercom has been developing its leadership in the communications, data and devices security industry for 30 years.
This position is based on complementary technological expertise in telecom/cloud, cryptography and software infrastructures, and shared values: Innovation, expertise, commitment and privacy.
Our products and expertise are recognized in France and abroad by major players, customers, partners and certification organizations.
IP, VoIP, IMS, 3G, 4G,
IoT, cloud, containerization,
storage, database, blockchain
Key management / PKI
Android, iOS, Windows, MacOS
C/C++, JAVA, Python, GO
ERCOM recruits constantly new talent. We cultivate excellence, creativity and result.
To stay ahead, we develop agility; we foster collaboration, initiative and risk-taking; we accept mistakes
We nurture technological excellence to maintain our pioneering position with future technologies
Our teams are passionate about product design and dedicated to our client’s success
Because privacy is inscribed in our DNA, we apply the highest level of confidentiality to matters our clients entrust us with
Orano has selected Cryptopass solution to secure in a efficient and simple way profesionnal mobile communications of its employees. The end-to-end encryption level, the consideration of data protection constraints, the SaaS model based on a sovereign cloud, were decisive points in the choice of the Cryptopass solution.
Cryptobox meets our desire to control the security of our information system while benefiting from tools adapted to remote collaborative work.
Integrates Cryptosmart, Cryptobox and Cryptopass in its Cyberdefense offers. Orange Cyberdefense provided major implementations for the French Ministry of Defense, the Office of the President of the Republic, and the Ministry of Foreign Affairs.
Ercom joined this organization in its early stages and actively participates in its actions to promote the excellence of French SMEs in the cybersecurity industry.
Integrates Cryptosmart and Cryptobox in its custom cybersecurity service offering, ranging from identifying threats to implementing security management centers and maintaining safe conditions.