{"id":38387,"date":"2016-09-16T00:00:00","date_gmt":"2016-09-16T00:00:00","guid":{"rendered":"https:\/\/newrcblog.wpengine.com\/ucaas-security\/"},"modified":"2025-03-13T08:48:03","modified_gmt":"2025-03-13T15:48:03","slug":"ucaas-security","status":"publish","type":"post","link":"\/us\/en\/blog\/ucaas-security\/","title":{"rendered":"Bringing cloud communications into your comfort zone: 7 key security considerations you should ask a UCaaS vendor"},"content":{"rendered":"<p>By now, most IT professionals know the benefits of the cloud. They also share many of the same security concerns\u2014because moving critical IT functions and corporate data beyond the physical data center typically means moving beyond their comfort zone.<\/p>\n<p>Likewise, when you consider moving your business communications to the <a href=\"https:\/\/www.ringcentral.com\/office\/how-it-works.html?BMID=BLOGNEW\" target=\"_blank\" rel=\"noopener noreferrer\">cloud<\/a>, you need to make security a key consideration. However, according to the National Institute of Standards and Technology <a href=\"https:\/\/www.nist.gov\/publications\/security-considerations-voice-over-ip-systems\" target=\"_blank\" rel=\"noopener noreferrer\">(NIST)<\/a>, \u201cbecause of the integration of voice and data into a single network, establishing a secure VoIP and data network is a complex process that requires greater effort than that required for data-only networks. \u201d<\/p>\n<p>In practice, assuring the security of an integrated voice and data network like <a href=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/2016\/07\/business-communications-and-collaboration-without-boundaries-or-barriers-5-key-considerations-to-selecting-a-ucaas-provider\/?BMID=BLOGNEW\" target=\"_blank\" rel=\"noopener noreferrer\">cloud-based unified communications as a service (UCaaS)<\/a> takes a robust, hardened infrastructure housing the core technology. These physical protections need to be combined with deep expertise in not only IP telephony and UC but also numerous security disciplines, including regulatory compliance and cyber security.<\/p>\n<p>RingCentral is proud to have been named a leader\u2014for the second consecutive year\u2014by Gartner in its <a href=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/2016\/08\/ringcentral-recognized-gartner-leader-magic-quadrant-unified-communications-service-worldwide\/?BMID=BLOGNEW\" target=\"_blank\" rel=\"noopener noreferrer\">Magic Quadrant for UCaaS worldwide<\/a>. And as a recognized leader, our goal is to enable organizations to gain the benefits of moving business communications to the cloud without sacrificing the <a href=\"https:\/\/www.ringcentral.com\/technology\/reliability.html?BMID=BLOGNEW\" target=\"_blank\" rel=\"noopener noreferrer\">reliability<\/a>, security, or <a href=\"https:\/\/www.ringcentral.com\/technology\/qos.html?BMID=BLOGNEW\" target=\"_blank\" rel=\"noopener noreferrer\">quality of service<\/a> they expect.<\/p>\n<p>We do this by controlling our own global network, which includes implementing a comprehensive security framework that assures not only the safety of customers\u2019 critical data and voice communications, but also adheres to strict government and industry privacy compliance regulations. Our comprehensive approach to <a href=\"https:\/\/www.ringcentral.com\/technology\/security.html?BMID=BLOGNEW\" target=\"_blank\" rel=\"noopener noreferrer\">cloud security<\/a> essentially maps to what we feel are the seven key things you should look for when considering a cloud UCaaS provider.<\/p>\n<p><strong>Seven key security considerations for cloud UCaaS<\/strong><\/p>\n<p><strong>1) Secure data center<\/strong>: All technology infrastructure should be housed in facilities with strong physical protections, redundant power, and tested disaster recovery procedures. The highest levels of security and reliability should be backed by independent certifications.<\/p>\n<p>However, this is not the case with all vendors. <a href=\"https:\/\/www.ringcentral.com\/office\/product-how-it-works.html?BMID=BLOGNEW\" target=\"_blank\" rel=\"noopener noreferrer\">A credible cloud service provider<\/a> should be able to show you evidence of verification and frequent validation by independent auditors. Without this type of comprehensive and certified security in place, your organization will risk loss of valuable competitive information or the significant consequences of non-compliance with state, federal, and industry privacy regulations.<\/p>\n<p>RingCentral houses the <a href=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/2016\/06\/how-to-migrate-to-ucaas-with-the-help-of-early-adopters\/?BMID=BLOGNEW\" target=\"_blank\" rel=\"noopener noreferrer\">critical UCaaS technology infrastructure<\/a> and customer data in hardened, Tier 1 data centers located on both US coasts. Each is supported by redundant power and protected by an array of security equipment, techniques, and procedures to control, monitor, and record access to the facility. These facilities inter-work with international data centers to provide our global network. Security includes encrypted data transfer, comprehensive digital tracking with clear audit trails, and secure file storage. These facilities are monitored 24\/7 and certified SSAE 16 (SOC 2 and SOC 3) compliant. All systems are audited on a monthly basis, and audit reports are available to customers.<\/p>\n<p>Additionally, our hardened data centers are managed by highly trained, on-site engineering specialists, including experts in various aspects of security and regulatory compliance with privacy regulations such as the PCI DSS and the California Security Breach Information Act (SB-1386).<\/p>\n<p><strong>2) Secure voice<\/strong>: Eavesdropping on phone calls offers a lucrative target for hackers as it can compromise everything from competitive business information to protected patient or personal financial data. Optimally, all voice traffic within your corporate phone system should be encrypted to prevent eavesdropping on voice calls.<\/p>\n<p>Intercepting voice conversations carried over legacy phone systems is quite difficult. It requires either physically accessing phone lines or compromising the Public Switched Telephone Network (PSTN) nodes or the on-site PBXs. But with IP telephony\u2014whether <a href=\"https:\/\/www.ringcentral.com\/office\/features\/virtual-pbx\/overview.html?BMID=BLOGNEW\" target=\"_blank\" rel=\"noopener noreferrer\">cloud VoIP or an on-premise IP-PBX system<\/a>\u2014calls travel as data packets over the internet, making them susceptible to all the attacks that occur on public networks.<\/p>\n<p>RingCentral addresses these vulnerabilities by safeguarding voice communications with an advanced Secure Voice technology that prevents eavesdropping on calls or tampering with audio streams between all endpoints\u2014desk phones, as well as computers and mobile phones running a RingCentral <a href=\"https:\/\/www.ringcentral.com\/office\/features\/rcmobile\/overview.html?BMID=BLOGNEW\" target=\"_blank\" rel=\"noopener noreferrer\">mobile<\/a> or <a href=\"https:\/\/www.ringcentral.com\/office\/features\/desktop-apps\/overview.html?BMID=BLOGNEW\" target=\"_blank\" rel=\"noopener noreferrer\">softphone app<\/a>. RingCentral is among the first in the industry to use two enterprise-grade security protocols to provide additional security for <a href=\"https:\/\/www.ringcentral.com\/what-is-a-voip-phone.html\">IP phone<\/a> calls\u2014TLS authentication and SRTP encryption.<\/p>\n<p><strong>3) Data encryption<\/strong>: To ensure the safety of confidential information, all data\u2014from competitive proposals to patient private information to smartphone screens shots\u2014should be encrypted in transit and at rest. In addition, numerous state, federal, and industry regulations regarding customer and patient privacy mandate encryption of data and auditable record-keeping and reporting.<\/p>\n<p>The <a href=\"https:\/\/www.ringcentral.com\/whyringcentral\/company\/pressreleases\/pressreleases-2015\/ringcentral-announces-hipaa-compliant-solution-for-health-care-c.html?BMID=BLOGNEW\" target=\"_blank\" rel=\"noopener noreferrer\">HIPAA-compliant RingCentral solution<\/a> ensures that customer calls and messages are secure with encryption in transit and at rest. It includes everything from physical protections at data centers to encrypted storage to comprehensive digital tracking with clear audit trails.<\/p>\n<p><strong>4) User<\/strong><strong>\u00a0access controls and management<\/strong>: To ensure only authorized users access cloud communications accounts and services, the vendor should implement at a minimum strong password policies and ideally two-factor authentication as well as single sign-on (SSO) to avoid log-in fatigue.<\/p>\n<p>While SSO is convenient for users, it presents new security challenges. For example, if a user\u2019s primary password is compromised, attackers may be able to gain access to multiple resources.<\/p>\n<p>The RingCentral Duo Access Gateway (DAG) provides strong authentication and a flexible policy engine. It authenticates users leveraging existing on-premise or cloud-based directory credentials and prompts for two-factor authentication before permitting access to RingCentral. Admins can define policies that enforce unique controls for each individual SSO application.<\/p>\n<p>Admins can also define policies that enforce unique controls for each individual SSO application. This entails checking the user, device, and network against an application\u2019s policy before allowing access to the application. For example, admins could require that <a href=\"https:\/\/www.ringcentral.com\/office\/features\/salesforce-integration\/overview.html?BMID=BLOGNEW\" target=\"_blank\" rel=\"noopener noreferrer\">Salesforce<\/a> users complete two-factor authentication at every login, but only once every seven days when accessing RingCentral.<\/p>\n<p>Other user controls include front-end settings that customers control to manage their policies and end users. These settings include: adding\/removing extensions, setting user permission levels, managing extension PINs, enabling\/disabling international calling, allowing specific international call destinations, and blocking inbound caller IDs.<\/p>\n<p><strong>5) Fraud prevention<\/strong>: Toll fraud, healthcare fraud, and credentials theft represent significant financial and legal risks for businesses. The service provider should have protections built in to the service layer and should conduct continuous monitoring for dangerous anomalies or other indicators of fraud. The provider should also offer guidance on best practices to eliminate the human factor in fraud risk.<\/p>\n<p><a href=\"https:\/\/www.ringcentral.com\/technology\/security.html?BMID=BLOGNEW\" target=\"_blank\" rel=\"noopener noreferrer\">The RingCentral platform<\/a> includes security capabilities to detect potential toll fraud and service abuse. These capabilities and settings reside in the application and infrastructure layers, within the service delivery and operations processes, and in the RingCentral security policies and governance practices.<\/p>\n<p>In addition, RingCentral has a full-time security and fraud-prevention department with a security program that is based on industry best practices. This program also provides intelligent communications fraud detection, which includes RingCentral staff monitoring customers\u2019 service for anomalous calling that may be toll fraud.<\/p>\n<p><strong>6) Account management and administration<\/strong>: To prevent data loss, the solution should have provisions to instantly revoke user rights or demote an administrator\u2019s credentials of employees who leave the company or are terminated. Whether it concerns control over Sales staff, a key employee in Finance, or virtual contact center employees, enterprise-grade security requires methods to prevent insider threats, which include enabling administrators to revoke the user rights of former employees.<\/p>\n<p>The <a href=\"https:\/\/www.ringcentral.com\/office\/phone-system-features.html?BMID=BLOGNEW\" target=\"_blank\" rel=\"noopener noreferrer\">RingCentral cloud service<\/a> includes front-end settings that customers control to manage their policies and end users. These settings include: adding\/removing extensions, setting user permission levels, managing extension PINs, enabling\/disabling international calling, allowing specific international call destinations, and blocking inbound caller IDs.<\/p>\n<p>It also gives administrators robust mobile app control. Administrators can instantly revoke the remote user\u2019s access to the cloud network\u2014and thereby to customer contacts, CRM info, and other corporate information\u2014and almost no data resides on the device itself.<\/p>\n<p><strong>7) Robust network security<\/strong>: In addition to all the defenses that organizations typically put in place at the network perimeter to safeguard data, the UCaaS vendor must now add unique protections designed to prevent attacks on the voice infrastructure.<\/p>\n<p>RingCentral deploys best-of-breed network protections that are optimized for voice and data. These defenses, together with RingCentral experts continuously monitoring systems for anomalies, help to prevent service disruption, data breaches, fraud, and service high-jacking.<\/p>\n<p>In addition, an advanced suite of intrusion prevention technologies protects against malformed packets and fuzzing techniques, which can be used to confuse or overwhelm border controllers resulting in service disruption, system restart interruption, and endpoint resets. Advanced RingCentral border session management is immune to many of the forms of attack that have disrupted the services of other VoIP and UCaaS vendors.<\/p>\n<p>RingCentral security also protects against spoofed messages by validating the value of \u2018Call-ID,\u2019 \u2018Tag,\u2019 and \u2018branch\u2019 while processing control NOTIFY messages.<\/p>\n<p>Finally, <a href=\"https:\/\/www.ringcentral.com\/office\/unified-communications.html?BMID=BLOGNEW\" target=\"_blank\" rel=\"noopener noreferrer\">RingCentral<\/a> security also overcomes the typical set of firewall traversal problems in VoIP systems with network address translation (NAT) support for static IP configuration and \u201cKeep-Alive\u201d SIP signaling. This maintains user addressability without providing attackers the opportunity to infiltrate further.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By now, most IT professionals know the benefits of the cloud. They also share many of the same security concerns\u2014because moving critical IT functions and corporate data beyond the physical data center typically means moving beyond their comfort zone. Likewise, when you consider moving your business communications to the cloud, you need to make security &#8230;<\/p>\n","protected":false},"author":29,"featured_media":38388,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[43334,23732],"tags":[4606,12297,12298,2010,1783,11687,658,2577,1855,689,3779,948,12299,2561,12300,12301,12302,12303,12304,3298,6185,7565,12305,12306,2392,1829,12307,1095,11536,4880,12308,245,9641,12309,12310,12311,1364,296,12312,12313,5862,1640,12314,12315,8941,11433,12316,12317,12008,106],"class_list":["post-38387","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it","category-security","tag-ucaas","tag-7-key-security-considerations-you-should-ask-a-ucaas-vendor","tag-account-management-and-administration","tag-business-communication","tag-business-communications","tag-business-communications-and-collaboration-without-boundaries-or-barriers-5-key-considerations-to-selecting-a-ucaas-provider","tag-cloud","tag-cloud-communication","tag-cloud-communications","tag-cloud-phone","tag-cloud-phone-solution","tag-cloud-phone-system","tag-cloud-reliability","tag-cloud-security","tag-cloud-ucaas","tag-cloud-ucaas-provider","tag-cloud-based-unified-communications-as-a-service","tag-credible-cloud-provider","tag-credible-cloud-service-provider","tag-customer-data","tag-cyber-security","tag-data-encryption","tag-duo-access-gateway","tag-encrypted-data-transfer","tag-enterprise","tag-file-storage","tag-fraud-prevention","tag-gartner","tag-how-to-migrate-to-ucaas-with-the-help-of-early-adopters","tag-ip-telephony","tag-is-the-cloud-secure","tag-it","tag-magic-quadrant","tag-magic-quadrant-for-ucaas-worldwide","tag-national-institute-of-standards-and-technology","tag-nist","tag-ring-central","tag-ringcentral","tag-ringcentral-business-solution","tag-secure-data-center","tag-secure-voice","tag-security","tag-seven-key-security-considerations-for-cloud-ucaas","tag-tier-1-data-centers","tag-uc","tag-ucaas-technology","tag-ucaas-technology-infrastructure","tag-user-access-controls-and-management","tag-voice-integration","tag-voip"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v19.3 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Bringing cloud communications into your comfort zone: 7 key security considerations you should ask a UCaaS vendor | RingCentral Blog<\/title>\n<meta name=\"description\" content=\"By now, most IT professionals know the benefits of the cloud. They also share many of the same security concerns\u2014because moving critical IT functions and\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/ucaas-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bringing cloud communications into your comfort zone: 7 key security considerations you should ask a UCaaS vendor\" \/>\n<meta property=\"og:description\" content=\"By now, most IT professionals know the benefits of the cloud. They also share many of the same security concerns\u2014because moving critical IT functions and\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/ucaas-security\/\" \/>\n<meta property=\"og:site_name\" content=\"RingCentral Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ringcentral\" \/>\n<meta property=\"article:published_time\" content=\"2016-09-16T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-13T15:48:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/KID-5891_Security_considerations_blog_r1-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"RingCentral Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ringcentral\" \/>\n<meta name=\"twitter:site\" content=\"@ringcentral\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"RingCentral Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ucaas-security\/#article\",\"isPartOf\":{\"@id\":\"\/us\/en\/blog\/ucaas-security\/\"},\"author\":{\"name\":\"RingCentral Team\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/65a168321317ffd562e0d77745f1b358\"},\"headline\":\"Bringing cloud communications into your comfort zone: 7 key security considerations you should ask a UCaaS vendor\",\"datePublished\":\"2016-09-16T00:00:00+00:00\",\"dateModified\":\"2025-03-13T15:48:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"\/us\/en\/blog\/ucaas-security\/\"},\"wordCount\":1522,\"publisher\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ucaas-security\/#primaryimage\"},\"thumbnailUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/KID-5891_Security_considerations_blog_r1-1.png\",\"keywords\":[\"(UCaaS)\",\"7 Key Security Considerations You Should Ask a UCaaS Vendor\",\"Account management and administration\",\"business communication\",\"business communications\",\"Business Communications and Collaboration Without Boundaries or Barriers: 5 Key Considerations to Selecting a UCaaS Provider\",\"cloud\",\"cloud communication\",\"cloud communications\",\"cloud phone\",\"cloud phone solution\",\"cloud phone system\",\"cloud reliability\",\"cloud security\",\"cloud UCaaS\",\"cloud UCaaS provider\",\"cloud-based unified communications as a service\",\"credible cloud provider\",\"credible cloud service provider\",\"customer data\",\"cyber security\",\"data encryption\",\"Duo Access Gateway\",\"encrypted data transfer\",\"Enterprise\",\"file storage\",\"Fraud prevention\",\"Gartner\",\"How to Migrate to UCaaS with the Help of Early Adopters\",\"ip telephony\",\"is the cloud secure\",\"IT\",\"magic quadrant\",\"Magic Quadrant for UCaaS worldwide\",\"National Institute of Standards and Technology\",\"NIST\",\"Ring Central\",\"ringcentral\",\"ringcentral business solution\",\"Secure data center\",\"secure voice\",\"security\",\"Seven key security considerations for cloud UCaaS\",\"Tier 1 data centers\",\"uc\",\"UCaaS technology\",\"UCaaS technology infrastructure\",\"User access controls and management\",\"voice integration\",\"VOIP\"],\"articleSection\":[\"IT\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"\/us\/en\/blog\/ucaas-security\/\",\"url\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ucaas-security\/\",\"name\":\"Bringing cloud communications into your comfort zone: 7 key security considerations you should ask a UCaaS vendor | RingCentral Blog\",\"isPartOf\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ucaas-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ucaas-security\/#primaryimage\"},\"thumbnailUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/KID-5891_Security_considerations_blog_r1-1.png\",\"datePublished\":\"2016-09-16T00:00:00+00:00\",\"dateModified\":\"2025-03-13T15:48:03+00:00\",\"description\":\"By now, most IT professionals know the benefits of the cloud. They also share many of the same security concerns\u2014because moving critical IT functions and\",\"breadcrumb\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ucaas-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ucaas-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ucaas-security\/#primaryimage\",\"url\":\"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/KID-5891_Security_considerations_blog_r1-1.png\",\"contentUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/KID-5891_Security_considerations_blog_r1-1.png\",\"width\":700,\"height\":400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ucaas-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"\/us\/en\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Bringing cloud communications into your comfort zone: 7 key security considerations you should ask a UCaaS vendor\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website\",\"url\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/\",\"name\":\"RingCentral Blog\",\"description\":\"Intelligent Communications\",\"publisher\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization\",\"name\":\"RingCentral\",\"url\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/\",\"url\":\"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png\",\"contentUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png\",\"width\":2048,\"height\":309,\"caption\":\"RingCentral\"},\"image\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ringcentral\",\"https:\/\/x.com\/ringcentral\",\"https:\/\/www.linkedin.com\/company\/ringcentral\/\",\"https:\/\/www.instagram.com\/ringcentral\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/65a168321317ffd562e0d77745f1b358\",\"name\":\"RingCentral Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g\",\"caption\":\"RingCentral Team\"},\"sameAs\":[\"https:\/\/www.ringcentral.com\"],\"url\":\"\/us\/en\/blog\/author\/ringcentral-team\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Bringing cloud communications into your comfort zone: 7 key security considerations you should ask a UCaaS vendor | RingCentral Blog","description":"By now, most IT professionals know the benefits of the cloud. They also share many of the same security concerns\u2014because moving critical IT functions and","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ringcentral.com\/us\/en\/blog\/ucaas-security\/","og_locale":"en_US","og_type":"article","og_title":"Bringing cloud communications into your comfort zone: 7 key security considerations you should ask a UCaaS vendor","og_description":"By now, most IT professionals know the benefits of the cloud. They also share many of the same security concerns\u2014because moving critical IT functions and","og_url":"https:\/\/www.ringcentral.com\/us\/en\/blog\/ucaas-security\/","og_site_name":"RingCentral Blog","article_publisher":"https:\/\/www.facebook.com\/ringcentral","article_published_time":"2016-09-16T00:00:00+00:00","article_modified_time":"2025-03-13T15:48:03+00:00","og_image":[{"width":700,"height":400,"url":"https:\/\/www.ringcentral.com\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/KID-5891_Security_considerations_blog_r1-1.png","type":"image\/png"}],"author":"RingCentral Team","twitter_card":"summary_large_image","twitter_creator":"@ringcentral","twitter_site":"@ringcentral","twitter_misc":{"Written by":"RingCentral Team","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ucaas-security\/#article","isPartOf":{"@id":"\/us\/en\/blog\/ucaas-security\/"},"author":{"name":"RingCentral Team","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/65a168321317ffd562e0d77745f1b358"},"headline":"Bringing cloud communications into your comfort zone: 7 key security considerations you should ask a UCaaS vendor","datePublished":"2016-09-16T00:00:00+00:00","dateModified":"2025-03-13T15:48:03+00:00","mainEntityOfPage":{"@id":"\/us\/en\/blog\/ucaas-security\/"},"wordCount":1522,"publisher":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization"},"image":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ucaas-security\/#primaryimage"},"thumbnailUrl":"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/KID-5891_Security_considerations_blog_r1-1.png","keywords":["(UCaaS)","7 Key Security Considerations You Should Ask a UCaaS Vendor","Account management and administration","business communication","business communications","Business Communications and Collaboration Without Boundaries or Barriers: 5 Key Considerations to Selecting a UCaaS Provider","cloud","cloud communication","cloud communications","cloud phone","cloud phone solution","cloud phone system","cloud reliability","cloud security","cloud UCaaS","cloud UCaaS provider","cloud-based unified communications as a service","credible cloud provider","credible cloud service provider","customer data","cyber security","data encryption","Duo Access Gateway","encrypted data transfer","Enterprise","file storage","Fraud prevention","Gartner","How to Migrate to UCaaS with the Help of Early Adopters","ip telephony","is the cloud secure","IT","magic quadrant","Magic Quadrant for UCaaS worldwide","National Institute of Standards and Technology","NIST","Ring Central","ringcentral","ringcentral business solution","Secure data center","secure voice","security","Seven key security considerations for cloud UCaaS","Tier 1 data centers","uc","UCaaS technology","UCaaS technology infrastructure","User access controls and management","voice integration","VOIP"],"articleSection":["IT","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"\/us\/en\/blog\/ucaas-security\/","url":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ucaas-security\/","name":"Bringing cloud communications into your comfort zone: 7 key security considerations you should ask a UCaaS vendor | RingCentral Blog","isPartOf":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ucaas-security\/#primaryimage"},"image":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ucaas-security\/#primaryimage"},"thumbnailUrl":"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/KID-5891_Security_considerations_blog_r1-1.png","datePublished":"2016-09-16T00:00:00+00:00","dateModified":"2025-03-13T15:48:03+00:00","description":"By now, most IT professionals know the benefits of the cloud. They also share many of the same security concerns\u2014because moving critical IT functions and","breadcrumb":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ucaas-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ucaas-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ucaas-security\/#primaryimage","url":"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/KID-5891_Security_considerations_blog_r1-1.png","contentUrl":"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/KID-5891_Security_considerations_blog_r1-1.png","width":700,"height":400},{"@type":"BreadcrumbList","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ucaas-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"\/us\/en\/blog\/"},{"@type":"ListItem","position":2,"name":"Bringing cloud communications into your comfort zone: 7 key security considerations you should ask a UCaaS vendor"}]},{"@type":"WebSite","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website","url":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/","name":"RingCentral Blog","description":"Intelligent Communications","publisher":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization","name":"RingCentral","url":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/","url":"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png","contentUrl":"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png","width":2048,"height":309,"caption":"RingCentral"},"image":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ringcentral","https:\/\/x.com\/ringcentral","https:\/\/www.linkedin.com\/company\/ringcentral\/","https:\/\/www.instagram.com\/ringcentral"]},{"@type":"Person","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/65a168321317ffd562e0d77745f1b358","name":"RingCentral Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g","caption":"RingCentral Team"},"sameAs":["https:\/\/www.ringcentral.com"],"url":"\/us\/en\/blog\/author\/ringcentral-team\/"}]}},"rc_img_url":"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/KID-5891_Security_considerations_blog_r1-1.png","rcblog_by_author":"<a href=\"\/us\/en\/blog\/author\/ringcentral-team\/amp\" data-dl-events-click=\"true\" data-dl-element=\"link\"><span class=\"image\"><img src=\"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g\" alt=\"\" width=\"30\" height=\"30\" layout=\"fixed\"><\/img><\/span><span class=\"by-author-name\">RingCentral Team<\/span><\/a>","rc_author_full_name":"RingCentral Team","rc_author_avatar":"\/us\/en\/blog\/wp-content\/uploads\/2022\/02\/ringcentral-logo-new.png","rc_author_link":"\/us\/en\/blog\/author\/ringcentral-team\/amp","rc_post_categories":"<a href=\"\/us\/en\/blog\/category\/roles\/it\/amp\">IT<\/a><a href=\"\/us\/en\/blog\/category\/security\/amp\">, Security<\/a>","amp_link":"\/us\/en\/blog\/ucaas-security\/amp","excerpt_title":"Bringing cloud communications into your comfort zone: 7 k...","_links":{"self":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/posts\/38387","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/users\/29"}],"replies":[{"embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/comments?post=38387"}],"version-history":[{"count":0,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/posts\/38387\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/media\/38388"}],"wp:attachment":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/media?parent=38387"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/categories?post=38387"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/tags?post=38387"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}