TERMII
Termii is an online platform that helps teams secure repeat customers by sending personalized emails and SMS through multiple.Termii helps African businesses communicate with customers across SMS, email, voice, and instant messaging channels. The company was founded in 2014 and is based in Lagos, Nigeria.
TERMII
Industry:
Digital Marketing Digital Media Email Marketing Marketing Automation Messaging SMS
Founded:
2014-04-18
Address:
New Lagos, Lagos, Nigeria
Country:
Nigeria
Website Url:
http://www.termii.com
Total Employee:
11+
Status:
Active
Contact:
+2348109477743
Email Addresses:
[email protected]
Total Funding:
5.24 M USD
Technology used in webpage:
IPhone / Mobile Compatible Viewport Meta Domain Not Resolving Google Font API Google Tag Manager Amazon HSTS IPv6 ReCAPTCHA Organization Schema
Similar Organizations
Albert Technologies
Albert is an artificial intelligence marketing platform for the enterprise, driving fully autonomous digital marketing campaigns.
Ortto
Switch ON better marketing for your business. The Best Marketing and Customer Data Platform for Ecommerce
Referrizer
Referrizer helps small local businesses generate new customers and keep existing ones loyal.
Resonate
The Resonate platform translates deep insights about people's values, preferences, and beliefs into more relevant marketing and advertising.
Vero
Message your customers using your data. Create a messaging experience that is a true extension of your product.
Zaius
Zaius is a customer data platform designed to empower marketers to grow revenue from existing customers.
Zenreach
Zenreach connects your online marketing with in-store results for digital marketing that performs 4x better.
Current Advisors List
Current Employees Featured
Founder
Investors List
Eamon Jubbawy
Eamon Jubbawy investment in Seed Round - Termii
NOA Capital
NOA Capital investment in Seed Round - Termii
UNCOVERED FUND
UNCOVERED FUND investment in Seed Round - Termii
Aubrey Hruby
Aubrey Hruby investment in Seed Round - Termii
Ventures Platform
Ventures Platform investment in Seed Round - Termii
RaliCap
RaliCap investment in Seed Round - Termii
Vastly Valuable Ventures
Vastly Valuable Ventures investment in Seed Round - Termii
Adamantium Fund
Adamantium Fund investment in Seed Round - Termii
Launch Africa
Launch Africa investment in Seed Round - Termii
Probability Ventures
Probability Ventures investment in Seed Round - Termii
Official Site Inspections
http://www.termii.com Semrush global rank: 526.84 K Semrush visits lastest month: 63.54 K
- Host name: 64.225.127.30
- IP address: 64.225.127.30
- Location: New York United States
- Latitude: 40.7157
- Longitude: -74
- Metro Code: 501
- Timezone: America/New_York
- Postal: 10013

More informations about "Termii"
What Is Zero Trust Architecture? | Microsoft Security
Zero Trust architecture (ZTA) is a security framework that authenticates every access request and proactively anticipates cyberattacks. Businesses adopt this framework to ensure only authorized users and devices can enter their networks, access business resources, and view sensitive data.See details»
What is Zero Trust Architecture (ZTA)? | CrowdStrike
A Zero Trust Architecture is a structure based on the cybersecurity principle that all users must be continuously authenticated, authorized, and validated.See details»
Zero Trust Architecture - System Design - GeeksforGeeks
Jul 23, 2025 Zero Trust Architecture (ZTA) is a security model that assumes no user, device, or network is trusted by default, whether inside or outside the organization's network. Every access request must be authenticated, authorized, and continuously validated, …See details»
What is zero trust? - IBM
Jun 20, 2024 Zero trust is a security strategy for modern multicloud networks. Instead of focusing on the network perimeter, a zero trust security model enforces security policies for each individual connection between users, devices, applications and data.See details»
Zero Trust Security: Principles, Architecture, and Best Practices
“ Zero trust (ZT) provides a collection of concepts and ideas designed to minimize uncertainty in enforcing accurate, least privilege per-request access decisions in information systems and services in the face of a network viewed as compromised. Zero trust architecture (ZTA) is an enterprise’s cybersecurity plan that utilizes zero trust concepts and encompasses component …See details»
What is Zero Trust Architecture? - Palo Alto Networks
Zero Trust Architecture, or ZTA, refers to the implementation, practical application and design that enforces Zero Trust principles in an organization’s IT infrastructure.See details»
What Is a Zero Trust Architecture? | Zscaler
Zero trust architecture is a security architecture built to reduce an organization’s attack surface, stop compromise, prevent lateral movement of threats, and block data loss based on the core tenets of the zero trust security model.See details»
What is Zero Trust Architecture? - SANS Institute
Aug 2, 2023 What is Zero Trust Architecture? This article outlines what Zero Trust is, how Zero Trust works, the five core principles of Zero Trust, and the stages of implementing Zero Trust.See details»
What is Zero Trust Architecture (ZTA)? - SentinelOne
Aug 4, 2025 What is Zero Trust Architecture (ZTA)? Explore in detail Zero Trust Architecture in this comprehensive guide, covering its principles, benefits, challenges, and best practices. Understand how it enhances cybersecurity across industries.See details»
What is Zero Trust Architecture? | Fortinet
Zero Trust Architecture is a security framework built on the principle of "never trust, always verify." It mandates strict identity verification for every person and device attempting to access resources on a private network, eliminating the concept of implicit trust.See details»
Charity Digital - Topics - What is zero trust architecture?
Mar 27, 2025 Zero-trust architecture (ZTA) is one of the evolving approaches to designing cybersecurity infrastructure. The premise is that nobody, inside or outside of an organisation, is trusted with access. Focusing on ZTA, we uncover what this strategy looks like and how it is integrated into cybersecurity systems.See details»
What is Zero Trust Architecture and Why Is It Important?
Enter Zero Trust Architecture, a game-changing approach that flips the script on how we protect our networks. Instead of assuming that everything inside the network is safe, Zero Trust requires verification from everyone trying to access resources, whether they’re inside or …See details»
What is Zero Trust? Understanding Zero Trust Security & Architecture …
Mar 5, 2025 Zero trust is a cybersecurity model that assumes every user, device, and application must be verified before accessing resources—whether inside or outside the organization’s network.See details»
What Is Zero Trust? Architecture, Principles, and Technology
What Is Zero Trust Architecture? The concept of zero trust architecture (ZTA) is that implicit trust should never be granted to accounts and devices based on the fact that a device, network, or application is located inside the network perimeter.See details»
What is Zero Trust? | Microsoft Learn
Feb 27, 2025 Zero Trust protects user accounts, devices, applications, and data wherever they're located. A Zero Trust approach should extend throughout the entire organization and serve as an integrated security philosophy and end-to-end strategy.See details»
What is zero trust architecture (ZTA)? Pillars of zero trust and …
Dec 19, 2023 In the context of cybersecurity in 2024, ZTA provides the level of protection that digitally transformed infrastructures need to avoid costly attacks and outages. ZTA is an approach to security based on the concept of "never trust, always verify."See details»
What is zero-trust architecture? | Focus Group
In the simplest terms, zero-trust architecture is a security framework that demands strict verification from everyone trying to access resources within a network, regardless of whether they are inside or outside the network perimeter. This model stands on a …See details»
What Is Zero Trust Architecture? Zero Trust Security Guide
Jan 2, 2025 Zero Trust is a modern security model founded on the design principle “Never trust, always verify.” It requires all devices and users, regardless of whether they are inside or outside an organization's network, to be authenticated, authorized, and regularly validated before being granted access.See details»
Zero Trust Architecture Explained: A Step-by-Step Approach
Mar 7, 2025 Zero Trust Architecture (ZTA), also known as Zero Trust Security Model, or Zero Trust Network Access (ZTNA), is a shift in approach to security whereby access is denied unless it is explicitly granted and the right to have access is continuously verified.See details»
The Pros and Cons of Zero Trust – Communications of the ACM
3 days ago Zero trust is a security framework that assumes no device, user, or network is inherently trustworthy. Zero trust security requires organizations to verify the identity of both machines and users and the context and behavior that appear with every access request.See details»