Security
All the flexibility without compromise!
Unlike traditional phone systems, cloud-based communications are becoming increasingly popular and beneficial. When businesses consider moving their communications to the cloud, security should be one of the top considerations.
We take the integrity of your communications seriously
Our secure architecture, policies and continuous monitoring keep your data safe from prying eyes.
Physical environment
Physical security and operational excellence are a critical component of any cloud service. Our data centers are compliant with industry best practices by being ISO-27001 and SOC-III Type 2 certified.
Communications
Our solution provides end-to-end communication encryption preventing eavesdropping and man-in-the-middle attacks.
Network infrastructure
Our infrastructure is protected by multiple layers of protection, including perimeter, server and application security. Our proactive approach to security includes intrusion detection, system log monitoring and analysis.
Access Control & Administration
Our platform is designed with role-based access preventing unauthorized access to user and system data. Additionally, transactions are logged for auditing and security control.
Hardened Security
We proactively monitor the Common Vulnerability and Exposures (CVE) system and the Common Vulnerability Scoring System (CVSS) to prioritize and apply security updates.
Security Breach Response
All reported thefts, data breaches and exposures will be investigated to promptly confirm if a theft, breach, or exposure has occurred. If a theft, breach, or exposure has occurred, the breach response process will be initiated and will follow the appropriate procedure in place.
Disaster Recovery
We recognize that disasters are not limited to adverse and or extreme weather conditions. We consider any event that could likely cause an extended delay of our service (weather, cyberattack, utility outages, configuration errors, etc.) part of our Business Continuity/Disaster Recovery plan.