Secure. Compliant. Government-Ready.
Data breaches and surveillance threats loom large; organizations especially governments and large enterprises need more than convenience in their communication platforms. They need control, compliance, and uncompromising security.
That’s exactly what Convay delivers.
Convay is a secure, enterprise-grade collaboration suite combining real-time video conferencing, decentralized messaging, and encrypted file sharing designed for both cloud and on-premise deployment.
Whether you’re managing a nationwide consultation, hosting a classified briefing, or conducting routine check-ins across departments, Convay ensures your conversations, files, and data remain protected at every layer.
Convay’s security architecture is rooted in the most trusted global standards and protocols:
- Zero Trust Architecture: No user or device is trusted by default
- AES-256 Encryption: Military-grade encryption for data at rest
- DTLS + SRTP & TLS 1.3: Strong encryption for data in transit
- End-to-End Encryption (E2EE): Secure chat and one-on-one calls
- Multi-Factor Authentication (MFA): Added identity protection
- Role-Based Access Control (RBAC): Granular permissions for meetings, chat, and storage
- Secure Key Management: Support for HSMs and enterprise KMS
- Full Compliance: Aligns with ISO 27001, NIST 800-53, and national digital sovereignty policies
Convay was developed in Bangladesh, hosted on the Government Cloud infrastructure, and operated under strict national control. No foreign entities have access to user data, keys, or infrastructure. This ensures:
- Data remains within national borders
- Full control by government-certified teams
- AI models, logs, and storage are sovereign and audit-ready
- Software components are locally built and supported
It’s a communication platform that not only supports national innovation but also protects national interest.
Whether you’re in a video meeting, sharing a file, or chatting 1:1 Convay applies end-to-end protection:
🔹 Video Conferencing
- Encrypted media via DTLS-SRTP
- Token-based room access (JWT/OAuth)
- Country and domain locks
- Automatic reassignment of host privileges
- Secure signaling over HTTPS/WSS
- Insertable Streams for browser-based E2EE
🔹 Chat & Messaging
- Matrix-based E2EE with device verification
- Cross-signing, SAS verification, and room encryption settings
- Restricted join rules and member-based history visibility
- Separate protocols for 1:1 (Olm) and group (Megolm) chats
🔹 File Storage
- AES-256-GCM file encryption with per-file unique keys
- DLP policies, virus scanning, and secure link sharing
- WORM mode for audit compliance
- View-only access, password protection, and obfuscated URLs
- Workspace-level retention and access policies
Convay has mapped out threat vectors across every subsystem from chat servers to CI/CD pipelines and implements proactive defenses such as:
- Enforced lobby mode
- Media packet replay protection
- Admin API firewalling
- XSS protection via CSP headers
- Session hijack prevention using HttpOnly cookies
- Rate-limiting, CAPTCHA, and hashed credential storage
- Role-based audit log access
- Token scoping and device-level fingerprinting
- Antivirus screening with ClamAV + YARA integration
All changes, access, and actions are audited and tamper-logged, maintaining full traceability.
Security isn’t static. Convay’s patching policy includes:
- Critical vulnerability fixes within 24–72 hours
- Monthly updates for medium/high-risk issues
- Quarterly maintenance for low-risk vulnerabilities
- Third-party library updates (e.g., OpenSSL, log4j) tracked actively
- Pen-testing every 6–12 months with external security auditors
Built for Governments. Trusted by Enterprises.
Convay is trusted by organizations that cannot afford security gaps:
- Ministries & Government Agencies
- State-owned Enterprises & Finance Bodies
- NGOs & Education Networks
- Health, Legal, and Defense Sectors
Whether you’re safeguarding sensitive deliberations or hosting public-facing town halls, Convay helps you collaborate with confidence.
Summary at a Glance
- AES-256 & DTLS-SRTP encryption
Protects data both at rest and in transit using military-grade encryption protocols. - Zero Trust access, MFA, and RBAC
Ensures only verified users gain access, with granular control across meetings and data. - On-premise and Government Cloud deployment
Host Convay within national infrastructure or on your own servers with full compliance. - Secure chat, video, and file operations
All communications, meetings, and documents are protected with end-to-end encryption. - Threat modeling with real-time mitigations
Proactive defense mechanisms guard against insider threats, abuse, and external attacks. - Locally developed, operated, and supported
Built and maintained in Bangladesh, ensuring full digital sovereignty and national control. - Frequent security audits and patch releases
Continuous testing and timely updates to defend against evolving threats.
Ready to Collaborate Without Compromise?
Convay is more than a tool — it’s a secure infrastructure for digital sovereignty, built to handle the unique challenges of national-scale communication.
Let’s make your collaboration safer, smarter, and sovereign.
Convay: where secure meetings begin.