ringcentral-team
RingCentral Team
March 6, 2017
Data security
Messaging
Security and Compliance

Collaboration as Antidote to Cloud UC Security Concerns

Collaboration as Antidote to Cloud UC Security Concerns

IHS just released its Unified Communication (UC) Strategies and Vendor Leadership report, which surveyed over 200 medium and large organizations in North America that use IP telephony, email, and instant messaging (IM) and plan to integrate these communication types by the end of 2018.

One of the top takeaways that really caught our attention was: “In evaluating cloud UC providers, the most important criteria are quality of service guarantees and security.” (This is reflected in the bar graph below.)

hosted uc provider selection

In other words, enterprises continue to be cautious about putting their communications into the cloud—even with ample evidence that, in many cases, service providers are better equipped to protect against security breaches.

As passionate cloud advocates, we want every business to have the peace of mind of knowing that their communications data is secure. So, how can today’s enterprises feel more confident about the level of security that cloud communications delivers, and how can vendors help?

The answer, says RingCentral CSO Michael Machado, is collaboration. Cloud security is always a shared responsibility model, and security is strongest when both customer and vendor clearly understand how that partnership works. This means, as a first step, that customers need to understand how the cloud changes the risk profile of their data and communications, and that vendors should be fully committed to walking through this assessment with them.

We sit down with our customers to have a discussion about why it’s imperative that we partner with them to ensure strong end-to-end security for their communications that we are delivering from our cloud platform.

If you are embarking on the switch to cloud, we urge you to read Michael’s article, Collaboration Key for Cloud Communications Security, to get an insider perspective on the cyber landscape, as well as guidelines for crafting a smart and collaborative security strategy for your communications.