Tags: #CiscoCalling, #RemoteWork, #stayconnected, #UnifiedCommunications, #WFH, #WorkFromHome, Cisco Blogs, CiscoWebex, cloud communications, collaboration technology, home office, Stay Connected, work from home
As the adoption of cloud communications solutions continues to grow, organizations have recognized that all products are not developed, managed, or secured in the same ways. They are rightly asking tough questions about the security, privacy, transparency and reliability of vendors and their solutions.
At Cisco, we are proud of our answers to these questions and the standards we have set around security, privacy, transparency and reliability. These standards are at the core of Webex Calling and the Webex collaboration platform.
“From a security compliance perspective, we pretty much get audited by anything you can imagine. There are so many cloud services I can’t use as a law firm because of the restrictions I have for compliance. But we can use Webex for everything.”
– Andy Jurczyk, CIO of the law firm Seyfrath Shaw
“As an FCC registered Service Provider, the security and reliability of the Altus offer set are paramount. Our customers have chosen Webex Calling time and time again in part because they know that security, privacy, and reliability form the foundation of the product and that it’s a zero compromises situation when it comes to security with Cisco Webex.”
– Brian Jones, CEO of Altus Technology
Cloud-based telephony must provide multiple levels of security for all tasks and users, ranging from office-based employees to remote executives, and fully mobile users. Security and privacy are in our DNA here at Cisco, our organization has come to be defined by these core values:
Secure by default – Webex Calling has security built-in as a key foundational element. It is never the user’s responsibility to opt-out of sharing their data or change settings in order to be protected. As an enterprise-class software development organization we implement a secure software development lifecycle (SDL) that ensures the right checks and balances are in place to deliver secure, quality solutions for our customers. Quality is measured not just by whether a product works, but how it works, and how it is secure. Cisco’s SDL is focused on making sure we develop products with security built-in as a key foundational element, not an after-thought.
Transparent – Whenever vulnerabilities arise, it’s critical they are immediately addressed and proactively disclosed as soon as possible, when safe to do so. Cisco’s practice of disclosing security vulnerabilities – including those we find during our own penetration testing – is baked into our approach. This level of transparency is achieved by having an independent Security and Trust Organization that exists separate from the product engineering organization.
Private – Webex Calling was built with respect for the privacy of your data in mind. Cisco takes user’s privacy very seriously. In fact, privacy is at the core of the Webex Calling solution. This is why our privacy governance ensures we publish a Webex Calling Privacy Data Sheet and a Webex Calling Privacy Data Map on our Trust Center . We are fully transparent on where data flows and have a robust program on data access. Furthermore, we tell you exactly where your data is going to be and will tell you if that ever changes.
Reliable – Webex Calling was designed from the ground up with reliability for our customers in mind. The Cisco Webex collaboration platform provides twelve dedicated geographically redundant data centers on four continents to support Webex Calling services. This ensures that no matter what is taking place around the globe our customers can be confident that their critical business communications will remain up and running.
Prioritizing security, privacy, transparency, and reliability needs to be at the core of your decision-making criteria when choosing a cloud communications vendor.
Tune in to the upcoming Enabling Secure Cloud Calling and Collaboration webinar on May 21st to learn about how the communications security landscape has changed and what you can do to prepare your organization.