Incorporates security best practices from years of experience in solution design,
software development & system integration for telco-grade unified communication & collaboration as well
as IP/SIP platorms
Permission-required, role-based system
access
Unless otherwise exempted, login is required for users to access and use
system resource & content
Role-based access each with different duty-relevant & need based privilege assignment
Utilizes Advanced Encryption Standard (AES) for storage encryption
Proven security design
HTTPS protocol for signaling message data transfer
DTLS protocol for streaming data transfer
Spring Framework to control web access
Dynamic tokens to authenticate access end points. Tokens change periodically
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok