TERMII

termii-logo

Termii is an online platform that helps teams secure repeat customers by sending personalized emails and SMS through multiple.Termii helps African businesses communicate with customers across SMS, email, voice, and instant messaging channels. The company was founded in 2014 and is based in Lagos, Nigeria.

#SimilarOrganizations #People #Financial #Website #More

TERMII

Social Links:

Industry:
Digital Marketing Digital Media Email Marketing Marketing Automation Messaging SMS

Founded:
2014-04-18

Address:
New Lagos, Lagos, Nigeria

Country:
Nigeria

Website Url:
http://www.termii.com

Total Employee:
11+

Status:
Active

Contact:
+2348109477743

Email Addresses:
[email protected]

Total Funding:
5.24 M USD

Technology used in webpage:
IPhone / Mobile Compatible Viewport Meta Domain Not Resolving Google Font API Google Tag Manager Amazon HSTS IPv6 ReCAPTCHA Organization Schema


Similar Organizations

albert-technologies-logo

Albert Technologies

Albert is an artificial intelligence marketing platform for the enterprise, driving fully autonomous digital marketing campaigns.

ortto-logo

Ortto

Switch ON better marketing for your business. The Best Marketing and Customer Data Platform for Ecommerce

referrizer-logo

Referrizer

Referrizer helps small local businesses generate new customers and keep existing ones loyal.

resonate-logo

Resonate

The Resonate platform translates deep insights about people's values, preferences, and beliefs into more relevant marketing and advertising.

vero-logo

Vero

Message your customers using your data. Create a messaging experience that is a true extension of your product.

zaius-logo

Zaius

Zaius is a customer data platform designed to empower marketers to grow revenue from existing customers.

zenreach-logo

Zenreach

Zenreach connects your online marketing with in-store results for digital marketing that performs 4x better.


Current Advisors List

dimeji-joseph_image

Dimeji Joseph Advisor (Communications &Management) @ Termii
Advisor

tunde-onakoya_image

Tunde Onakoya Advisor (Legal) @ Termii
Advisor

Current Employees Featured

emmanuel-gbolade_image

Emmanuel Gbolade
Emmanuel Gbolade Chief Executive Officer @ Termii
Chief Executive Officer
2014-04-18

ayomide-awe_image

Ayomide Awe
Ayomide Awe Co-founder @ Termii
Co-founder

atinuke-idowu_image

Atinuke Idowu
Atinuke Idowu Head Sales & Finance @ Termii
Head Sales & Finance

atinuke-idowu_image

Atinuke Idowu
Atinuke Idowu Financial Officer @ Termii
Financial Officer
2014-04-18

ifedolapo-ogunjubee_image

Ifedolapo Ogunjubee
Ifedolapo Ogunjubee Head Of Marketing & Business Development @ Termii
Head Of Marketing & Business Development

Founder


atinuke-idowu_image

Atinuke Idowu

ayomide-awe_image

Ayomide Awe

emmanuel-gbolade_image

Emmanuel Gbolade

Investors List

eamon-jubbawy_image

Eamon Jubbawy

Eamon Jubbawy investment in Seed Round - Termii

noa-capital-52f9_image

NOA Capital

NOA Capital investment in Seed Round - Termii

uncovered-fund_image

UNCOVERED FUND

UNCOVERED FUND investment in Seed Round - Termii

aubrey-hruby_image

Aubrey Hruby

Aubrey Hruby investment in Seed Round - Termii

ventures-platform_image

Ventures Platform

Ventures Platform investment in Seed Round - Termii

rally-cap-ventures_image

RaliCap

RaliCap investment in Seed Round - Termii

vastly-valuable-ventures_image

Vastly Valuable Ventures

Vastly Valuable Ventures investment in Seed Round - Termii

adamantium-fund_image

Adamantium Fund

Adamantium Fund investment in Seed Round - Termii

launch-africa_image

Launch Africa

Launch Africa investment in Seed Round - Termii

probability-ventures_image

Probability Ventures

Probability Ventures investment in Seed Round - Termii

Official Site Inspections

http://www.termii.com Semrush global rank: 526.84 K Semrush visits lastest month: 63.54 K

  • Host name: 64.225.127.30
  • IP address: 64.225.127.30
  • Location: New York United States
  • Latitude: 40.7157
  • Longitude: -74
  • Metro Code: 501
  • Timezone: America/New_York
  • Postal: 10013

Loading ...

More informations about "Termii"

What Is Zero Trust Architecture? | Microsoft Security

Zero Trust architecture (ZTA) is a security framework that authenticates every access request and proactively anticipates cyberattacks. Businesses adopt this framework to ensure only authorized users and devices can enter their networks, access business resources, and view sensitive data.See details»

What is Zero Trust Architecture (ZTA)? | CrowdStrike

A Zero Trust Architecture is a structure based on the cybersecurity principle that all users must be continuously authenticated, authorized, and validated.See details»

Zero Trust Architecture - System Design - GeeksforGeeks

Jul 23, 2025 Zero Trust Architecture (ZTA) is a security model that assumes no user, device, or network is trusted by default, whether inside or outside the organization's network. Every access request must be authenticated, authorized, and continuously validated, …See details»

What is zero trust? - IBM

Jun 20, 2024 Zero trust is a security strategy for modern multicloud networks. Instead of focusing on the network perimeter, a zero trust security model enforces security policies for each individual connection between users, devices, applications and data.See details»

Zero Trust Security: Principles, Architecture, and Best Practices

“ Zero trust (ZT) provides a collection of concepts and ideas designed to minimize uncertainty in enforcing accurate, least privilege per-request access decisions in information systems and services in the face of a network viewed as compromised. Zero trust architecture (ZTA) is an enterprise’s cybersecurity plan that utilizes zero trust concepts and encompasses component …See details»

What is Zero Trust Architecture? - Palo Alto Networks

Zero Trust Architecture, or ZTA, refers to the implementation, practical application and design that enforces Zero Trust principles in an organization’s IT infrastructure.See details»

What Is a Zero Trust Architecture? | Zscaler

Zero trust architecture is a security architecture built to reduce an organization’s attack surface, stop compromise, prevent lateral movement of threats, and block data loss based on the core tenets of the zero trust security model.See details»

What is Zero Trust Architecture? - SANS Institute

Aug 2, 2023 What is Zero Trust Architecture? This article outlines what Zero Trust is, how Zero Trust works, the five core principles of Zero Trust, and the stages of implementing Zero Trust.See details»

What is Zero Trust Architecture (ZTA)? - SentinelOne

Aug 4, 2025 What is Zero Trust Architecture (ZTA)? Explore in detail Zero Trust Architecture in this comprehensive guide, covering its principles, benefits, challenges, and best practices. Understand how it enhances cybersecurity across industries.See details»

What is Zero Trust Architecture? | Fortinet

Zero Trust Architecture is a security framework built on the principle of "never trust, always verify." It mandates strict identity verification for every person and device attempting to access resources on a private network, eliminating the concept of implicit trust.See details»

Charity Digital - Topics - What is zero trust architecture?

Mar 27, 2025 Zero-trust architecture (ZTA) is one of the evolving approaches to designing cybersecurity infrastructure. The premise is that nobody, inside or outside of an organisation, is trusted with access. Focusing on ZTA, we uncover what this strategy looks like and how it is integrated into cybersecurity systems.See details»

What is Zero Trust Architecture and Why Is It Important?

Enter Zero Trust Architecture, a game-changing approach that flips the script on how we protect our networks. Instead of assuming that everything inside the network is safe, Zero Trust requires verification from everyone trying to access resources, whether they’re inside or …See details»

What is Zero Trust? Understanding Zero Trust Security & Architecture …

Mar 5, 2025 Zero trust is a cybersecurity model that assumes every user, device, and application must be verified before accessing resources—whether inside or outside the organization’s network.See details»

What Is Zero Trust? Architecture, Principles, and Technology

What Is Zero Trust Architecture? The concept of zero trust architecture (ZTA) is that implicit trust should never be granted to accounts and devices based on the fact that a device, network, or application is located inside the network perimeter.See details»

What is Zero Trust? | Microsoft Learn

Feb 27, 2025 Zero Trust protects user accounts, devices, applications, and data wherever they're located. A Zero Trust approach should extend throughout the entire organization and serve as an integrated security philosophy and end-to-end strategy.See details»

What is zero trust architecture (ZTA)? Pillars of zero trust and …

Dec 19, 2023 In the context of cybersecurity in 2024, ZTA provides the level of protection that digitally transformed infrastructures need to avoid costly attacks and outages. ZTA is an approach to security based on the concept of "never trust, always verify."See details»

What is zero-trust architecture? | Focus Group

In the simplest terms, zero-trust architecture is a security framework that demands strict verification from everyone trying to access resources within a network, regardless of whether they are inside or outside the network perimeter. This model stands on a …See details»

What Is Zero Trust Architecture? Zero Trust Security Guide

Jan 2, 2025 Zero Trust is a modern security model founded on the design principle “Never trust, always verify.” It requires all devices and users, regardless of whether they are inside or outside an organization's network, to be authenticated, authorized, and regularly validated before being granted access.See details»

Zero Trust Architecture Explained: A Step-by-Step Approach

Mar 7, 2025 Zero Trust Architecture (ZTA), also known as Zero Trust Security Model, or Zero Trust Network Access (ZTNA), is a shift in approach to security whereby access is denied unless it is explicitly granted and the right to have access is continuously verified.See details»

The Pros and Cons of Zero Trust – Communications of the ACM

3 days ago Zero trust is a security framework that assumes no device, user, or network is inherently trustworthy. Zero trust security requires organizations to verify the identity of both machines and users and the context and behavior that appear with every access request.See details»

linkstock.net © 2022. All rights reserved