Security By Design

Security By Design

  • Incorporates security best practices from years of experience in solution design, software development & system integration for telco-grade unified communication & collaboration as well as IP/SIP platorms
  • Permission-required, role-based system access
    • Unless otherwise exempted, login is required for users to access and use system resource & content
    • Role-based access each with different duty-relevant & need based privilege assignment
  • Utilizes Advanced Encryption Standard (AES) for storage encryption
  • Proven security design
    • HTTPS protocol for signaling message data transfer
    • DTLS protocol for streaming data transfer
    • Spring Framework to control web access
    • Dynamic tokens to authenticate access end points. Tokens change periodically