Broadvoice is committed to protecting your business.
Trust Broadvoice with your critical communications.
Count on Broadvoice to deliver
reliability, security, and transparency.
Your communications platform is the central hub of your business. It’s where your employees and customers connect — it’s where business gets done. That’s why we’ve built systems and processes to deliver services that meet the highest reliability and security standards with full transparency.
Reliability
Security
Transparency
Reliability built on redundancy and
disaster recovery planning.
Broadvoice builds its platforms and systems on a solid foundation to guarantee always-on service. Plus, we continually test our plans to ensure they’re always working.
Secure Data Centers
- Our systems are hosted in Tier III/Tier IV data centers with fire suppression systems, air conditioning for cooling, and redundant power supplies.
- Broadvoice periodically reviews colocation providers to validate their adherence to security and operational standards.
Security by
design and default.
Broadvoice maintains formal information security policies and programs to minimize risks, and we adhere to the principles of security by design and security by default for a strong security foundation. We’ve made significant investments in security, including:
Vulnerability
Management
Our best-in-class vulnerability management platform continuously tests our external and internal endpoints.
Independent penetration tests are completed annually by independent auditors.
Data Encryption
At-Rest and In-Transit
Customer data is encrypted at-rest using AES-256, ensuring it cannot be read or understood.
To protect customer data in-transit, we enforce strong protocols (TLS v1.2+) and ciphers that provide authentication, message confidentiality, and integrity.
Broadvoice earned an A+ rating in data-in-transit encryption from an independent audit.
Detection
and Response
Our Security Incident and Event Management (SIEM) platform offers advanced incident prevention using proactive threat detection and in-depth real-time log analysis.
Our Network Operations Center (NOC) and Security Operations Center (SOC) analysts promptly respond to issues with our platform, systems, connectivity, and security.
Get network status updates
in real-time, anytime.
Broadvoice provides real-time operational status updates, including logs for past incidents and scheduled maintenance.
More ways Broadvoice
secures your business.
Broadvoice implements a strict access control policy based on the principle of least privilege, enforcing explicit approval workflows before access provisioning. Broadvoice enforces multifactor authentication over an approved cryptographic channel to authenticate the internal network from remote locations, and all physical and logical access is immediately revoked on termination for employees and vendors.
Broadvoice uses a reputed static code security analysis tool that integrates into our CI/CI pipelines, allowing us to detect vulnerabilities in the early stages of development. The tool continuously scans our code repositories and can immediately detect new vulnerabilities.
All Broadvoice production media is securely decommissioned and physically destroyed before leaving Broadvoice's facilities and colocation data centers.
Broadvoice evaluates vendors' compliance annually, performing application security reviews for externally-launched products, services, and significant feature additions before launch to assess whether security risks are identified and mitigated.
Broadvoice implements strong host configuration settings according to OpenSCAP and continuously monitors all hosts' compliance with Broadvoice security standards to prevent a possible data breach.
Broadvoice adheres to Open Web Application Security Project (OWASP) recommendations, particularly its Top Ten Application Security Risks.
All external data access is logged with the following information: data accessor IP address, target device (if applicable), module, and operation, and all logs are retained for at least 90 days.
All components used in the service are behind firewalls, and there are access control lists that restrict incoming connections to strictly required IPs, protocols, and ports. Broadvoice also uses a carrier-based Anti-DDoS solution that protects our systems and platforms from the most complex advanced distributed attacks.
Broadvoice applies a systematic approach to managing changes to ensure any changes to customer-impacting aspects of a service are reviewed, tested, and approved. Broadvoice also performs deployment validations and change reviews to detect unauthorized changes to its environment and tracks identified issues to resolution.
Broadvoice employees undergo compliance and information security training on the latest security topics, including phishing, ransomware, and data privacy.
Broadvoice is trusted by small and mid-market
businesses around the world.
Broadvoice has earned TrustRadius
awards for high customer ratings.
Why businesses
trust Broadvoice.
Ready for a communications provider you can trust?
Learn more about Broadvoice.