Security

All the benefits without compromise.

Cloud-based communications are more and more popular for their wealth of advantages over traditional phone systems.  When companies consider moving their communications to the cloud, security should be one of the top considerations

We take the integrity of your communications seriously

Our secure architecture, policies and continuous monitoring helps keep your data away from prying eyes.

Physical Environment

Physical security and operational excellence is a critical component of any cloud-based service.  Our data centers follow industry best practices and are ISO-27001 and SOC-III Type 2 certified.

Transmission

Our solution offers end-to-end communication encryptions, when both endpoints supports it, preventing eavesdropping and man-in-the-middle attacks.

Network & Infrastructure

Our infrastructure is protected with several layers of protection, including perimeter, servers, and applications security. Our proactive approach to security includes intrusion detection, system logs monitoring, and analytics.

Account Access & Administration

Our platform is designed with role-based access preventing unauthorized access to user and system data. Furthermore, transactions are lodgged for security audit and control.

Security Hardening

We proactively monitor the Common Vulnerability and Exposures (CVE) system and the Common Vulnerability Scoring System (CVSS) to prioritize and apply security updates.

Securiy Breach Response

All reported thefts, data breaches and exposures will be investigated to promptly confirm if a theft, breach, or exposure has occurred. If a theft, breach, or exposure has occurred, the breach response process will be initiated and will follow the appropriate procedure in place.

Disaster Recovery

We recognize that disasters are not limited to adverse and or extreme weather conditions. We consider any event that could likely cause an extended delay of our service (weather, cyberattack, utility outages, configuration errors, etc.) part of our Business Continuity/Disaster Recovery plan.

Specialists in Technology Transformation