Information protection, data privacy, compliance management, and more.
With UCaaS platforms accelerating innovation and sharing in productivity resources like chat, voice, and video collaboration, it’s crucial for organizations to scrutinize how their UCaaS vendor-of-choice handles security, data privacy, and compliance to mitigate the rise of serious financial and brand threats. These threats are growing at a record pace, so ensuring your UCaaS platform provides a leading approach to mitigating these risks should play a primary role in your buying considerations
This guide outlines how, with the right technical controls, a UCaaS platform can be built with security, privacy, and compliance at the center of its infrastructure investments and innovation strategy. The guide also demonstrates how RingCentral is leading the way to deliver on that mission with a UCaaS platform you can trust. RingCentral, a Gartner Magic Quadrant Leader for Unified Communications as a Service for seven years in a row, provides transparency and deep expertise to ensure your investment in your UCaaS platform is protected and secured against today’s top threats CISO Guide to Cloud Communications Security.
We maintain appropriate physical security controls on a 24-hours-per-day, 7-days-per-week basis, and to the extent that RingCentral operates or uses a data centre, we ensure that physical security controls are in alignment with industry standards such as ISO 27001 and SSAE 16 or ISAE 3402. We maintain a multi-layered network security programme that includes industry-standard firewall protection, intrusion detection systems IDS, intrusion prevention systems IPS, DDoS attack and other web threat blocking, two-factor authentication for access to RingCentral’s networks and others.
In addition, we run internal and external network vulnerability assessments against our information processing systems at least quarterly to consistently evaluate our network security programme.
RingCentral encrypts data in transit and at rest, using applicable industry-leading encryption standards and protocols. We apply two, enterprise-grade security protocols to provide additional security for IP phone calls TLS authentication and SRTP encryption.
To read full download the whitepaper:
The CISO Guide to Cloud Communications Security