{"id":49053,"date":"2021-08-30T16:42:19","date_gmt":"2021-08-30T23:42:19","guid":{"rendered":"\/us\/en\/blog\/?p=49053"},"modified":"2022-12-30T08:00:27","modified_gmt":"2022-12-30T16:00:27","slug":"how-we-build-enterprise-grade-security-into-every-part-of-ringcentral-mvp","status":"publish","type":"post","link":"\/us\/en\/blog\/how-we-build-enterprise-grade-security-into-every-part-of-ringcentral-mvp\/","title":{"rendered":"How we build enterprise-grade security into every part of RingCentral MVP"},"content":{"rendered":"<p><b>Highlights:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">As teams continue to work from anywhere, their communications should enable them to freely ideate and collaborate without compromising their security.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">We build security into every layer of <\/span><a href=\"https:\/\/www.ringcentral.com\/office\/how-it-works.html\"><b>RingCentral MVP<\/b><\/a><span style=\"font-weight: 400;\">\u2122\u2014from single sign-on to end-to-end encryption and data retention.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Read more about how we protect your data in our blog: <\/span><a href=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/ringcentrals-stance-on-protecting-your-data\/\"><b>RingCentral\u2019s stance on protecting your data<\/b><\/a><span style=\"font-weight: 400;\">.<\/span><\/li>\n<\/ul>\n<hr \/>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">When most of our jobs turned remote last year, cloud communications kept businesses going. Workers sent more chat messages, joined more video meetings, and made more phone calls than ever before. And the silver lining is, it worked. The massive shift to remote was a success\u2014and it\u2019s here to stay.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Which brings us to the future. We know that teams will increasingly work from anywhere and teams become more distributed. We also know that our communication tools should enable workers to stay connected, work together, and achieve their very best.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\t\t\t<\/p>\n<div class=\"rc-bottom-cta rc-bottom-cta__landscape\" style=\"background-image: url(\/us\/en\/blog\/wp-content\/themes\/ringcentral\/assets\/images\/temp\/rc-bottom-cta-bg.png);\">\n<div class=\"bottom-cta-img\">\n\t\t\t\t\t<img decoding=\"async\" width=\"1478\" height=\"1114\" src=\"\/us\/en\/blog\/wp-content\/uploads\/2021\/08\/RingCentral-stance-on-protecting-your-data.png\" class=\"responsive-image\" alt=\"...\" \/>\t\t\t\t<\/div>\n<div class=\"bottom-cta-copy\">\n<div class=\"rc-bottom-cta__text\" style=\"\">\n<h3\n\t\t\t\t\t\t\t\tclass=\"rc-bottom-cta__title headline-copy\"\n\t\t\t\t\t\t\t\tstyle=\"\"\n\t\t\t\t\t\t><strong>RingCentral&#8217;s stance on protecting your data<\/strong><\/h3>\n<\/p><\/div>\n<div class=\"rc-bottom-cta__btn-wrapper\" style=\"\">\n\t\t\t\t\t\t<a\n\t\t\t\t\t\t\t\tclass=\"btn btn-primary btn-lg rc-bottom-cta__link\"\n\t\t\t\t\t\t\t\ttitle=\"View the blog\"\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/ringcentrals-stance-on-protecting-your-data\/\"\n\t\t\t\t\t\t\t\tdata-dl-name=\"View the blog\"\n\t\t\t\t\t\t\t\tdata-dl-element=\"button\"\n\t\t\t\t\t\t\t\tdata-dl-additional-info=\"bottom cta banner\"\n\t\t\t\t\t\t\t\tdata-no-auto-dl=\"true\"\n\t\t\t\t\t\t\t\tstyle=\"\"\n\t\t\t\t\t\t\t\tonmouseover=\"\"\n\t\t\t\t\t\t\t\tonmouseout=\"this.style.backgroundColor='';this.style.borderColor='';this.style.color='';\"\n\t\t\t\t\t\t>View the blog<\/a>\n\t\t\t\t\t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<p>\t<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As more workers collaborate from anywhere, their technologies have the progressively difficult task of keeping their data protected\u2014wherever workers are. From the messages they send to the contents of their video meetings, teams should be able to <\/span><b>freely collaborate without compromising their security<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><\/p>\n<div class=\"quote-text-break-point\">\n<p class=\"qute-text\">\u201cThe Covid-19 pandemic and the rapid move to all-remote work has changed how we work. Instead of impromptu conversations in the hallway, we are using collaboration platforms to help us update status, exchange ideas, and stay in touch. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">All of these communications, and data, are, and should be, accessible only to your employees. At RingCentral, we provide secure communications to support your collaboration needs.\u201d <\/p>\n<p class=\"quote-text-author\">\u2014Heather Hinton, Chief Information Security Officer<\/p>\n<\/p><\/div>\n<p>\t<\/span><\/p>\n<p><span style=\"font-weight: 400;\">At RingCentral, we understand that security is a number one priority for companies\u2014and that\u2019s why protecting your data is also one of our top priorities. Our products and features have the highest levels of protection baked right in, so there\u2019s no tradeoff between great collaboration capabilities and enterprise-grade security.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here\u2019s a rundown of our holistic approach to the security of our flagship product <\/span><a href=\"https:\/\/www.ringcentral.com\/office\/how-it-works.html\"><b>RingCentral MVP<\/b><\/a><span style=\"font-weight: 400;\">:<\/span><\/p>\n<h3><b>The 4 building blocks of RingCentral MVP security\u00a0<\/b><\/h3>\n<ol>\n<li><a href=\"#identity\"><strong> Identity access management (IAM)<\/strong><\/a><\/li>\n<li><a href=\"#secure\"><strong> Secure meetings<\/strong><\/a><\/li>\n<li><a href=\"#data\"><strong> Data protection<\/strong><\/a><\/li>\n<li><a href=\"#compliance\"><strong> Compliance and auditing<\/strong><\/a><\/li>\n<\/ol>\n<h2><b><a id=\"identity\"><\/a>1. Identity access management<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Supporting secure use of our RingCentral MVP platform starts by making sure that only authorized individuals have access.\u00a0<\/span><\/p>\n<p><b>RingCentral Single Sign-on<\/b><span style=\"font-weight: 400;\"> integrates easily with any identity provider supporting SAML 2.0 (Security Assertion Markup Language 2.0), including PingFederate, Okta, or your homegrown identity provider.\u00a0<\/span><\/p>\n<p><img decoding=\"async\" class=\"size-full wp-image-49055 aligncenter\" src=\"\/us\/en\/blog\/wp-content\/uploads\/2021\/08\/MVP-Single-Sign-on.png\" alt=\"\" width=\"521\" height=\"393\" \/><\/p>\n<p><span style=\"font-weight: 400;\">We also support Google\u2019s SAML Implementation for Single Sign-On (SAML SSO) and Google login (OAuth 2.0). This allows you to retain control over your user\u2019s authentication credentials and process, providing them with easy access to RingCentral and you with peace of mind.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We also make user provisioning easy. RingCentral supports Active Directory Integration, allowing users to easily log in to the RingCentral system using Okta and their current Active Directory credentials.\u00a0<\/span><\/p>\n<h2><b><a id=\"secure\"><\/a>2. Secure meetings\u00a0<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Video meetings are a big part of your work\u2014but they also present malicious parties an opportunity to access confidential information. For example, a host might accidentally expose information to a broader audience than intended, such as external guests.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We have multiple security measures built into our video meetings:<\/span><\/p>\n<p><b>Disable recording\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Sometimes you want what happens in a meeting to stay in the meeting. RingCentral\u2019s disable recording feature allows admins to restrict meeting hosts and participants from recording the session.<\/span><\/p>\n<p><b>Enforce password\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Restrict meeting participation to authorized individuals only by requiring a password to join. Passwords can be set at the individual meeting level or can be enabled at the user or account level for all meetings and webinars.<\/span><\/p>\n<p><b>Mute\/remove participant\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Meeting hosts retain full control over meeting participation and have the ability to mute or remove participants.<\/span><\/p>\n<p><b>Waiting rooms\u00a0<\/b><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\"><img decoding=\"async\" class=\"alignnone size-large wp-image-44263\" src=\"\/us\/en\/blog\/wp-content\/uploads\/2020\/10\/Waiting-room-1024x589.png\" alt=\"RingCentral Video meeting hosts can now secure their meetings and prevent unwanted guests from entering with Waiting Rooms\" width=\"1024\" height=\"589\" \/><\/span><\/p>\n<p><span style=\"font-weight: 400;\">Hosts have the ability to control who enters their meetings and when. When the <\/span><a href=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/how-ringcentral-videos-new-waiting-rooms-keep-your-meetings-secure\/\"><span style=\"font-weight: 400;\">waiting room<\/span><\/a><span style=\"font-weight: 400;\"> is enabled, participants first enter a waiting room where they hold until the host admits them.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Participants can be admitted individually, or all at the same time, and the waiting room can be enabled for all participants, external participants only, or users who are not signed in.<\/span><\/p>\n<p><b>Disable video\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Meeting hosts have the ability to restrict video usage during a meeting. This includes the ability to block or allow video enabling. If blocked, video is disabled and participants are unable to turn on their cameras. If allowed, video is disabled but individuals may choose to turn on their cameras.<\/span><\/p>\n<p><b>Restrict screen sharing\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Screen sharing during a meeting can be limited to the host or moderator only, and participants\u2019 ability to share screens can be turned off.<\/span><\/p>\n<p><b>Authenticated users only<\/b><b>\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Restrict meeting participation to authenticated users only, including signed-in coworkers and signed-in RingCentral users.\u00a0<\/span><\/p>\n<p><b>Lock personal rooms\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Meetings in a user\u2019s personal room can be locked once all participants have joined, preventing an authorized participant from joining using the personal room link.<\/span><\/p>\n<p><b>Virtual backgrounds\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">To keep surroundings private while still allowing video participation, users can replace their background with pre-built or customizable <\/span><a href=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/virtual-backgrounds-closed-captioning-and-more-for-your-video-meetings\/\"><span style=\"font-weight: 400;\">virtual backgrounds<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h2><b><a id=\"data\"><\/a>3. Data protection\u00a0<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Cloud-based communications involves both the transfer and storage of data\u2014and we encrypt data both when it is in transit and at rest. This means that data is converted into an unreadable form and can only be converted back with an encryption key. Data in transit is encrypted using TLS encryption and data content by AES-256 encryption.<\/span><\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-48963\" src=\"\/us\/en\/blog\/wp-content\/uploads\/2021\/08\/E2EE-2.png\" alt=\"\" width=\"930\" height=\"700\" \/><\/p>\n<p><span style=\"font-weight: 400;\">We\u2019re also excited to announce the launch of <\/span><b>Dynamic End-to-End Encryption (E2EE)<\/b><span style=\"font-weight: 400;\">, which provides an additional layer of protection for your video meetings, such that ONLY the meeting participants can access the meeting and its contents.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With Dynamic E2EE, meeting content (voice, video) leaves users\u2019 devices in a completely encrypted form and is only decrypted at the other participants\u2019 devices. This means that no one is able to eavesdrop on the meeting, from non-meeting participants, to employers, to RingCentral, or anyone else in between.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The best part? Our Dynamic E2EE can be toggled on or off at any point in a meeting. This gives users the freedom to ideate and discuss \u201coff the record\u201d without any fear of compromising sensitive information.<\/span><\/p>\n<p><a href=\"https:\/\/www.ringcentral.com\/technology\/security.html\"><i><span style=\"font-weight: 400;\">Dynamic E2EE<\/span><\/i><\/a><i><span style=\"font-weight: 400;\"> will be available on RingCentral for mobile, desktop, and web browsers. <a href=\"https:\/\/support.ringcentral.com\/app\/video\/desktop-web\/end-to-end-encryption-ringcentral-video.html\">Open beta is now available<\/a>, with general availability planned for October 2021.<\/span><\/i><\/p>\n<h2><b><a id=\"compliance\"><\/a>4. Compliance and auditing<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Many businesses need to comply with complex international, regional, and industry requirements that govern the collection and use of data. That\u2019s why admins can choose how we store their RingCentral MVP data.<\/span><\/p>\n<h3><b>Data retention<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Every day, your teams and workers send messages, join meetings, and make phone calls through RingCentral. At the same time, they also generate countless amounts of communications data, some of which might be important to you.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But we don\u2019t keep that data forever. In fact, how long we store certain account data depends on the form of communication (which can be found in our <\/span><a href=\"https:\/\/support.ringcentral.com\/article\/2178.html?language=en_US\"><b>data retention policy<\/b><\/a><span style=\"font-weight: 400;\">). For example, call recordings are saved for 90 days (unless specified by an admin), while outbound faxes are saved for 30 days.<\/span><\/p>\n<p><img decoding=\"async\" class=\"alignnone size-large wp-image-49057\" src=\"\/us\/en\/blog\/wp-content\/uploads\/2021\/08\/Data-retention-1024x445.png\" alt=\"\" width=\"1024\" height=\"445\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Messages are stored indefinitely by default, unless specified by the admin. Admins can choose how long their company\u2019s team messages are stored, including forever. They can also choose to have messages deleted after a certain period of time, after which messages are wiped forever.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You can find our data retention policy <\/span><a href=\"https:\/\/support.ringcentral.com\/article\/2178.html#GeneralAccountDataRetention\"><b>here<\/b><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h3><b>Archiving<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Want to keep your data for longer than we store them? Developers have the ability to archive all of their RingCentral usage data, including video meeting recordings, call logs, call recordings, SMS text messages, fax, and voicemails.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There are multiple ways developers can archive their data, but we suggest using the <\/span><a href=\"https:\/\/www.ringcentral.com\/apps\/ringcentral-archiver\"><b>RingCentral Archive<\/b><span style=\"font-weight: 400;\">r<\/span><\/a><span style=\"font-weight: 400;\"> app. RingCentral Archiver integrates your RingCentral account with your preferred cloud storage provider such as Box, Smarsh, Dropbox, Google Drive, or an SFTP server. But most importantly, it\u2019s built to make backing up your data simple and automatic.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Businesses in highly regulated industries can use <\/span><a href=\"https:\/\/thetalake.com\/ringcentral-teams-messaging-archiver\/\"><b>RingCentral for Theta Lake<\/b><\/a><span style=\"font-weight: 400;\">, which helps compliance and legal teams to retain, retrieve, and review fully threaded messages and files. Messages are constantly analyzed against 40+ different compliance policies and given risk scores so you\u2019re always on top of your security.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">More instructions on exporting and archiving your data can be found <\/span><a href=\"https:\/\/developers.ringcentral.com\/guide\/voice\/call-log\/archival\"><b>here<\/b><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h2><b>Protecting your teams to work from anywhere<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Companies have to make some tough decisions about their return to work, but they can rest assured that their employees\u2014and their data\u2014are fully protected, in every part of their RingCentral experience. It\u2019s all part of our mission to help teams stay connected\u2014wherever they work.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Keep an eye out for upcoming security announcements, including the <\/span><a href=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/new-innovations-in-enterprise-communications-and-hybrid-work\/\"><b>Dynamic End-to-End Encryption<\/b><\/a><span style=\"font-weight: 400;\"> open beta, coming August 30.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the meantime, learn more about end-to-end encryption below.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\t\t\t<\/p>\n<div class=\"rc-bottom-cta rc-bottom-cta__portrait\" style=\"background-color:#FF8800;flex-direction: row-reverse;\">\n<div class=\"bottom-cta-img\">\n\t\t\t\t\t<img decoding=\"async\" width=\"683\" height=\"790\" src=\"\/us\/en\/blog\/wp-content\/uploads\/2020\/10\/RC-security-WP-1.png\" class=\"responsive-image\" alt=\"Everything you ...\" \/>\t\t\t\t<\/div>\n<div class=\"bottom-cta-copy\">\n<div class=\"rc-bottom-cta__text\" style=\"color:ffffff;\">\n<h3\n\t\t\t\t\t\t\t\tclass=\"rc-bottom-cta__title headline-copy\"\n\t\t\t\t\t\t\t\tstyle=\"\"\n\t\t\t\t\t\t><strong>Everything you need to know about how we protect your communications data<\/strong><\/h3>\n<\/p><\/div>\n<div class=\"rc-bottom-cta__btn-wrapper\" style=\"\">\n\t\t\t\t\t\t<a\n\t\t\t\t\t\t\t\tclass=\"btn btn-primary btn-lg rc-bottom-cta__link\"\n\t\t\t\t\t\t\t\ttitle=\"View the whitepaper\"\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ringcentral.com\/cloud-communications-security.html\"\n\t\t\t\t\t\t\t\tdata-dl-name=\"View the whitepaper\"\n\t\t\t\t\t\t\t\tdata-dl-element=\"button\"\n\t\t\t\t\t\t\t\tdata-dl-additional-info=\"bottom cta banner\"\n\t\t\t\t\t\t\t\tdata-no-auto-dl=\"true\"\n\t\t\t\t\t\t\t\tstyle=\"\"\n\t\t\t\t\t\t\t\tonmouseover=\"\"\n\t\t\t\t\t\t\t\tonmouseout=\"this.style.backgroundColor='';this.style.borderColor='';this.style.color='';\"\n\t\t\t\t\t\t>View the whitepaper<\/a>\n\t\t\t\t\t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<p>\t<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Highlights: As teams continue to work from anywhere, their communications should enable them to freely ideate and collaborate without compromising their security. We build security into every layer of RingCentral MVP\u2122\u2014from single sign-on to end-to-end encryption and data retention. Read more about how we protect your data in our blog: RingCentral\u2019s stance on protecting your &#8230;<\/p>\n","protected":false},"author":29,"featured_media":49056,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23732],"tags":[37885,1640],"class_list":["post-49053","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-mvp","tag-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v19.3 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How we build enterprise-grade security into every part of RingCentral MVP | RingCentral Blog<\/title>\n<meta name=\"description\" content=\"Highlights: As teams continue to work from anywhere, their communications should enable them to freely ideate and collaborate without compromising their\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/how-we-build-enterprise-grade-security-into-every-part-of-ringcentral-mvp\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How we build enterprise-grade security into every part of RingCentral MVP\" \/>\n<meta property=\"og:description\" content=\"Highlights: As teams continue to work from anywhere, their communications should enable them to freely ideate and collaborate without compromising their\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/how-we-build-enterprise-grade-security-into-every-part-of-ringcentral-mvp\/\" \/>\n<meta property=\"og:site_name\" content=\"RingCentral Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ringcentral\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-30T23:42:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-30T16:00:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/wp-content\/uploads\/2021\/08\/Security.png\" \/>\n\t<meta property=\"og:image:width\" content=\"930\" \/>\n\t<meta property=\"og:image:height\" content=\"700\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"RingCentral Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ringcentral\" \/>\n<meta name=\"twitter:site\" content=\"@ringcentral\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"RingCentral Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/how-we-build-enterprise-grade-security-into-every-part-of-ringcentral-mvp\/#article\",\"isPartOf\":{\"@id\":\"\/us\/en\/blog\/how-we-build-enterprise-grade-security-into-every-part-of-ringcentral-mvp\/\"},\"author\":{\"name\":\"RingCentral Team\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/65a168321317ffd562e0d77745f1b358\"},\"headline\":\"How we build enterprise-grade security into every part of RingCentral MVP\",\"datePublished\":\"2021-08-30T23:42:19+00:00\",\"dateModified\":\"2022-12-30T16:00:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"\/us\/en\/blog\/how-we-build-enterprise-grade-security-into-every-part-of-ringcentral-mvp\/\"},\"wordCount\":1537,\"publisher\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/how-we-build-enterprise-grade-security-into-every-part-of-ringcentral-mvp\/#primaryimage\"},\"thumbnailUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2021\/08\/Security.png\",\"keywords\":[\"mvp\",\"security\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"\/us\/en\/blog\/how-we-build-enterprise-grade-security-into-every-part-of-ringcentral-mvp\/\",\"url\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/how-we-build-enterprise-grade-security-into-every-part-of-ringcentral-mvp\/\",\"name\":\"How we build enterprise-grade security into every part of RingCentral MVP | RingCentral Blog\",\"isPartOf\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/how-we-build-enterprise-grade-security-into-every-part-of-ringcentral-mvp\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/how-we-build-enterprise-grade-security-into-every-part-of-ringcentral-mvp\/#primaryimage\"},\"thumbnailUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2021\/08\/Security.png\",\"datePublished\":\"2021-08-30T23:42:19+00:00\",\"dateModified\":\"2022-12-30T16:00:27+00:00\",\"description\":\"Highlights: As teams continue to work from anywhere, their communications should enable them to freely ideate and collaborate without compromising their\",\"breadcrumb\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/how-we-build-enterprise-grade-security-into-every-part-of-ringcentral-mvp\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/how-we-build-enterprise-grade-security-into-every-part-of-ringcentral-mvp\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/how-we-build-enterprise-grade-security-into-every-part-of-ringcentral-mvp\/#primaryimage\",\"url\":\"\/us\/en\/blog\/wp-content\/uploads\/2021\/08\/Security.png\",\"contentUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2021\/08\/Security.png\",\"width\":930,\"height\":700},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/how-we-build-enterprise-grade-security-into-every-part-of-ringcentral-mvp\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"\/us\/en\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How we build enterprise-grade security into every part of RingCentral MVP\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website\",\"url\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/\",\"name\":\"RingCentral Blog\",\"description\":\"Intelligent Communications\",\"publisher\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization\",\"name\":\"RingCentral\",\"url\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/\",\"url\":\"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png\",\"contentUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png\",\"width\":2048,\"height\":309,\"caption\":\"RingCentral\"},\"image\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ringcentral\",\"https:\/\/x.com\/ringcentral\",\"https:\/\/www.linkedin.com\/company\/ringcentral\/\",\"https:\/\/www.instagram.com\/ringcentral\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/65a168321317ffd562e0d77745f1b358\",\"name\":\"RingCentral Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g\",\"caption\":\"RingCentral Team\"},\"sameAs\":[\"https:\/\/www.ringcentral.com\"],\"url\":\"\/us\/en\/blog\/author\/ringcentral-team\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How we build enterprise-grade security into every part of RingCentral MVP | RingCentral Blog","description":"Highlights: As teams continue to work from anywhere, their communications should enable them to freely ideate and collaborate without compromising their","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ringcentral.com\/us\/en\/blog\/how-we-build-enterprise-grade-security-into-every-part-of-ringcentral-mvp\/","og_locale":"en_US","og_type":"article","og_title":"How we build enterprise-grade security into every part of RingCentral MVP","og_description":"Highlights: As teams continue to work from anywhere, their communications should enable them to freely ideate and collaborate without compromising their","og_url":"https:\/\/www.ringcentral.com\/us\/en\/blog\/how-we-build-enterprise-grade-security-into-every-part-of-ringcentral-mvp\/","og_site_name":"RingCentral Blog","article_publisher":"https:\/\/www.facebook.com\/ringcentral","article_published_time":"2021-08-30T23:42:19+00:00","article_modified_time":"2022-12-30T16:00:27+00:00","og_image":[{"width":930,"height":700,"url":"https:\/\/www.ringcentral.com\/us\/en\/blog\/wp-content\/uploads\/2021\/08\/Security.png","type":"image\/png"}],"author":"RingCentral Team","twitter_card":"summary_large_image","twitter_creator":"@ringcentral","twitter_site":"@ringcentral","twitter_misc":{"Written by":"RingCentral Team","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/how-we-build-enterprise-grade-security-into-every-part-of-ringcentral-mvp\/#article","isPartOf":{"@id":"\/us\/en\/blog\/how-we-build-enterprise-grade-security-into-every-part-of-ringcentral-mvp\/"},"author":{"name":"RingCentral Team","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/65a168321317ffd562e0d77745f1b358"},"headline":"How we build enterprise-grade security into every part of RingCentral MVP","datePublished":"2021-08-30T23:42:19+00:00","dateModified":"2022-12-30T16:00:27+00:00","mainEntityOfPage":{"@id":"\/us\/en\/blog\/how-we-build-enterprise-grade-security-into-every-part-of-ringcentral-mvp\/"},"wordCount":1537,"publisher":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization"},"image":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/how-we-build-enterprise-grade-security-into-every-part-of-ringcentral-mvp\/#primaryimage"},"thumbnailUrl":"\/us\/en\/blog\/wp-content\/uploads\/2021\/08\/Security.png","keywords":["mvp","security"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"\/us\/en\/blog\/how-we-build-enterprise-grade-security-into-every-part-of-ringcentral-mvp\/","url":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/how-we-build-enterprise-grade-security-into-every-part-of-ringcentral-mvp\/","name":"How we build enterprise-grade security into every part of RingCentral MVP | RingCentral Blog","isPartOf":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/how-we-build-enterprise-grade-security-into-every-part-of-ringcentral-mvp\/#primaryimage"},"image":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/how-we-build-enterprise-grade-security-into-every-part-of-ringcentral-mvp\/#primaryimage"},"thumbnailUrl":"\/us\/en\/blog\/wp-content\/uploads\/2021\/08\/Security.png","datePublished":"2021-08-30T23:42:19+00:00","dateModified":"2022-12-30T16:00:27+00:00","description":"Highlights: As teams continue to work from anywhere, their communications should enable them to freely ideate and collaborate without compromising their","breadcrumb":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/how-we-build-enterprise-grade-security-into-every-part-of-ringcentral-mvp\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/how-we-build-enterprise-grade-security-into-every-part-of-ringcentral-mvp\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/how-we-build-enterprise-grade-security-into-every-part-of-ringcentral-mvp\/#primaryimage","url":"\/us\/en\/blog\/wp-content\/uploads\/2021\/08\/Security.png","contentUrl":"\/us\/en\/blog\/wp-content\/uploads\/2021\/08\/Security.png","width":930,"height":700},{"@type":"BreadcrumbList","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/how-we-build-enterprise-grade-security-into-every-part-of-ringcentral-mvp\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"\/us\/en\/blog\/"},{"@type":"ListItem","position":2,"name":"How we build enterprise-grade security into every part of RingCentral MVP"}]},{"@type":"WebSite","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website","url":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/","name":"RingCentral Blog","description":"Intelligent Communications","publisher":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization","name":"RingCentral","url":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/","url":"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png","contentUrl":"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png","width":2048,"height":309,"caption":"RingCentral"},"image":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ringcentral","https:\/\/x.com\/ringcentral","https:\/\/www.linkedin.com\/company\/ringcentral\/","https:\/\/www.instagram.com\/ringcentral"]},{"@type":"Person","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/65a168321317ffd562e0d77745f1b358","name":"RingCentral Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g","caption":"RingCentral Team"},"sameAs":["https:\/\/www.ringcentral.com"],"url":"\/us\/en\/blog\/author\/ringcentral-team\/"}]}},"rc_img_url":"\/us\/en\/blog\/wp-content\/uploads\/2021\/08\/Security.png","rcblog_by_author":"<a href=\"\/us\/en\/blog\/author\/ringcentral-team\/amp\" data-dl-events-click=\"true\" data-dl-element=\"link\"><span class=\"image\"><img src=\"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g\" alt=\"\" width=\"30\" height=\"30\" layout=\"fixed\"><\/img><\/span><span class=\"by-author-name\">RingCentral Team<\/span><\/a>","rc_author_full_name":"RingCentral Team","rc_author_avatar":"\/us\/en\/blog\/wp-content\/uploads\/2022\/02\/ringcentral-logo-new.png","rc_author_link":"\/us\/en\/blog\/author\/ringcentral-team\/amp","rc_post_categories":"<a href=\"\/us\/en\/blog\/category\/security\/amp\">Security<\/a>","amp_link":"\/us\/en\/blog\/how-we-build-enterprise-grade-security-into-every-part-of-ringcentral-mvp\/amp","excerpt_title":"How we build enterprise-grade security into every part of...","_links":{"self":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/posts\/49053","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/users\/29"}],"replies":[{"embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/comments?post=49053"}],"version-history":[{"count":0,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/posts\/49053\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/media\/49056"}],"wp:attachment":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/media?parent=49053"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/categories?post=49053"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/tags?post=49053"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}