{"id":52831,"date":"2022-08-02T00:00:36","date_gmt":"2022-08-02T07:00:36","guid":{"rendered":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/?p=52831"},"modified":"2024-07-26T01:46:41","modified_gmt":"2024-07-26T08:46:41","slug":"ringcentrals-approach-to-cloud-communications-security","status":"publish","type":"post","link":"\/us\/en\/blog\/ringcentrals-approach-to-cloud-communications-security\/","title":{"rendered":"RingCentral\u2019s approach to cloud communications security"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Unified communications platforms are constantly innovating and adapting to the rapidly changing ways we work. At the same time, financial and brand threats are growing at a record pace across the cloud\u2014especially as hybrid and remote work continues.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That\u2019s why businesses should always scrutinize how UCaaS vendors handle security, data privacy, and compliance. Mitigating and preventing these risks should play a key role in your buying considerations.<\/span><\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<p style=\"text-align: center;\">\u2b50 <strong>Want to learn more about UCaaS security?<\/strong> \u2b50<\/p>\n<p style=\"text-align: center;\">Here\u2019s what to look for in a UCaaS provider\u2019s security posture.<\/p>\n<p><center>\t<\/p>\n<div class=\"download-form-widget enterprise-download-form\" data-url=\"https:\/\/netstorage.ringcentral.com\/guides\/security-ciso-guide.pdf\" data-id=\"6a08673c5b82a\" id=\"6a08673c5b82a\">\n\t\t<button tabindex=\"on\"  on=\"tap:6a08673c5b82a.toggleClass(class='open')\" class=\"open-modal-download-action download-form-button\" type=\"submit\">Get the white paper<\/button><\/p>\n<div class=\"download-form-modal\">\n<div class=\"download-form-modal-body\">\n<div class=\"download-form-modal-content\">\n<div class=\"download-form-modal-title\">Security should be top-of-mind for your UCaaS provider. Make sure you know what to look for.<\/div>\n<form class=\"download-form ENTERPRISE\" method=\"post\">\n<div class=\"download-form-part\">\n\t\t\t\t\t\t\t<input class=\"download-form-input\" aria-label=\"Full Name\" aria-required=\"true\" aria-invalid=\"false\" type=\"text\" name=\"fullname\" placeholder=\"Full Name\" data-dl-events-hover=\"true\" data-dl-element=\"text\" data-dl-additional-info=\"enterprise download form\">\n\t\t\t\t\t\t<\/div>\n<div class=\"download-form-part\">\n\t\t\t\t\t\t\t<input class=\"download-form-input\" aria-label=\"Email (please enter a work email address)\" aria-required=\"true\" aria-invalid=\"false\" type=\"email\" autocomplete=\"on\" name=\"email\" placeholder=\"Email (please enter a work email address)\" data-dl-events-hover=\"true\" data-dl-element=\"email\" data-dl-additional-info=\"enterprise download form\">\n\t\t\t\t\t\t<\/div>\n<div>\n\t\t\t\t\t\t\t<input type=\"hidden\" name=\"popup_form\" value=\"1\">\n\t\t\t\t\t\t<\/div>\n<div>\n\t\t\t\t\t\t\t<input type=\"hidden\" name=\"Lead_Entry_Source__c\" value=\"RC Blog Enterprise\" class=\"download-form-input\"\/>\n\t\t\t\t\t\t<\/div>\n<div class=\"download-form-part\">\n\t\t\t\t\t\t\t<button class=\"download-form-submit\" type=\"submit\" data-dl-element=\"button\" data-no-auto-dl=\"true\" data-dl-additional-info=\"enterprise download form\" data-dl-name=\"Download now\">Download now<\/button>\n\t\t\t\t\t\t<\/div>\n<\/p><\/form>\n<p> \t\t\t\t\t<button on=\"tap:6a08673c5b82a.toggleClass(class='open')\" role=\"button\" tabindex=\"0\"  class=\"download-form-modal-close\"><\/button>\n\t\t\t\t<\/div>\n<div class=\"download-form-modal-thank\">Enjoy!<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<p>\t<\/center><\/p>\n<hr \/>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">So what should you look for when it comes to UCaaS security?\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b><a id=\"know\"><\/a>Know the security and data privacy risks<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">First, let\u2019s look at some notable stats that highlight growing security risks:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>General Data Protection Regulation (GDPR)<\/b><span style=\"font-weight: 400;\">: $1.25B in fines to businesses 2021<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Cost of Data Breaches:<\/b><span style=\"font-weight: 400;\"> $129M in 2021, an increase of 143% over 2019<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Cost of Vishing\/Smishing<\/b><span style=\"font-weight: 400;\">: $54M detected by the FBI in 2020<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Cost of Downtime Per Min:<\/b><span style=\"font-weight: 400;\"> $5,600 per min estimated by Gartner IT<\/span><\/li>\n<\/ul>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-52834\" src=\"\/us\/en\/blog\/wp-content\/uploads\/2022\/07\/GDPR-fines.png\" alt=\"\" width=\"1626\" height=\"842\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Think of it this way: Your UCaaS vendor\u2019s security infrastructure is, in essence, <\/span><b>an extension of your environment<\/b><span style=\"font-weight: 400;\">. Your vendor should be transparent about the investments they\u2019ve made to safeguard your users and data from security threats and data loss\u2014day in and day out.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If your UCaaS vendor\u2019s security is lax, then your organization will be more vulnerable to a breach that can harm your brand value and bottom line.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With the right technical controls, a UCaaS platform can be built with security, privacy, and compliance at the center of its infrastructure investments and innovation strategy.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b><a id=\"ringcentral\"><\/a>RingCentral: A leading approach to UCaaS trust<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Security is in our DNA. With over 100 years of experience collectively, our IT security veterans take a multi-dimensional approach to the safety of your data by applying best-in-class technologies and rigorous processes.\u00a0 <\/span><\/p>\n<h3 class=\"heading h3\"><b>1. Best-in-class DevSecOps<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">From our product design to the operations of our business, we employ rigorous security and data best practices in everything we do. We provide our customers with a robust security platform by integrating security principles into the development process from the get-go.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-52835\" src=\"\/us\/en\/blog\/wp-content\/uploads\/2022\/07\/World-class-security-organization.png\" alt=\"\" width=\"1396\" height=\"732\" \/><\/p>\n<h3 class=\"heading h3\"><b>2. Secure-by-design platform<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">We tirelessly pursue a <\/span><a href=\"https:\/\/www.ringcentral.com\/trust-center.html\"><b>shared responsibility model<\/b><\/a><span style=\"font-weight: 400;\"> where we maintain third-party certifications and attestations that validate our information security policies and practices along with customer controls\u2014so you can directly manage your use case needs.<\/span><\/p>\n<h3 class=\"heading h3\"><b>3. High reliability and uptime<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Our security experts proactively monitor and optimize the platform 24\/7\/365 to ensure the availability of your service remains at the highest level possible. We stand by this commitment with an industry-leading service level agreement (SLA) of <\/span><a href=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/in-a-work-from-home-world-service-level-agreements-for-cloud-communications-take-center-stage\/\"><b>99.999% uptime<\/b><\/a><span style=\"font-weight: 400;\"> offered in over 45+ countries. And we\u2019ve consistently met that promise for <\/span><b>12 consecutive quarters<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With over 15 geographically dispersed data centers and media points of presence, we provide a global infrastructure that ensures 24\/7 business continuity for your company\u2014from anywhere.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b><a id=\"our\"><\/a>Our secure infrastructure<\/b><\/h2>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-52837\" src=\"\/us\/en\/blog\/wp-content\/uploads\/2022\/07\/Your-data-is-safe.png\" alt=\"\" width=\"1630\" height=\"802\" \/><\/p>\n<p><span style=\"font-weight: 400;\">RingCentral\u2019s security posture consists of numerous controls that reflect the best practices from established information security industry standards. Collectively, these stringent controls allow us to achieve world-class security practices for our customers.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b><a id=\"global\"><\/a>Our global data privacy and security certifications and attestations<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Our third-party attestations and certifications speak to our commitment to data security. RingCentral is built on a secure cloud platform with a robust portfolio of security and compliance certifications, including SOC 2, ISO 27001 and 27017-18, UK Cyber Essentials Plus, German C5, GDPR, and much more.\u00a0<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-52838\" src=\"\/us\/en\/blog\/wp-content\/uploads\/2022\/07\/Certifications.png\" alt=\"\" width=\"1310\" height=\"368\" \/><\/p>\n<p style=\"text-align: center;\"><i><span style=\"font-weight: 400;\">See the full list and learn more about our independent certifications <\/span><\/i><a href=\"https:\/\/www.ringcentral.com\/trust-center\/compliance.html\"><b><i>here<\/i><\/b><\/a><i><span style=\"font-weight: 400;\">.<\/span><\/i><\/p>\n<p>&nbsp;<\/p>\n<h2><b><a id=\"security\"><\/a>Security and administrative policy controls<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The RingCentral platform provides our customers with leading-edge security and policy controls that ensure a safe and secure experience for your users.<\/span><\/p>\n<figure id=\"attachment_52844\" aria-describedby=\"caption-attachment-52844\" style=\"width: 1558px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" class=\"wp-image-52844 size-full\" src=\"\/us\/en\/blog\/wp-content\/uploads\/2022\/07\/Phone.png\" alt=\"\" width=\"1558\" height=\"716\" \/><figcaption id=\"caption-attachment-52844\" class=\"wp-caption-text\">A brief snapshot of phone security controls<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">Our platform puts a comprehensive set of administrative controls across video, message, and phone at your fingertips, such as advanced call and fax blocking, requiring your meeting attendees to authenticate, limiting who can enable screen sharing, and requiring <\/span><a href=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/how-ringcentral-videos-new-waiting-rooms-keep-your-meetings-secure\/\"><b>waiting rooms<\/b><\/a><span style=\"font-weight: 400;\"> for your users to approve attendees who can join.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These provide you with best-in-class security capabilities to safeguard your organization from data loss and bad actors.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">See the full list of security and administrative controls available for the RingCentral MVP app <\/span><a href=\"https:\/\/www.ringcentral.com\/trust-center.html#security\"><b>here<\/b><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2 class=\"heading h2\"><b><a id=\"trust\"><\/a>A fundamentally different approach to global trust<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">RingCentral offers a fundamentally different approach to global trust for your unified communications platform. From our industry-leading five 9s in uptime reliability to our comprehensive information security protection and global privacy management, you don\u2019t have to worry about your data being compromised or falling short of regional regulatory standards.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Our innovations and commitment to security, data privacy, and compliance have earned RingCentral recognition as a trailblazer in the market, including seven consecutive years of being named a <\/span><a href=\"https:\/\/www.ringcentral.com\/lp\/gartner-magic-quadrant.html\"><b>Leader in the Gartner Magic Quadrant for Unified Communications as a Service (UCaaS)<\/b><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Our approach delivers \u201calways-on\u201d information security protection and data privacy management that keeps your data safe and compliant with the law. And our platform provides a comprehensive toolset for your administrators and users with a breadth of dynamic and real-time controls.<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">Want to know more about how we protect your data? Visit the <a href=\"https:\/\/www.ringcentral.com\/trust-center.html\"><strong>RingCentral Trust Center<\/strong><\/a>.<\/span><\/i><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Unified communications platforms are constantly innovating and adapting to the rapidly changing ways we work. At the same time, financial and brand threats are growing at a record pace across the cloud\u2014especially as hybrid and remote work continues. That\u2019s why businesses should always scrutinize how UCaaS vendors handle security, data privacy, and compliance. Mitigating and &#8230;<\/p>\n","protected":false},"author":1148,"featured_media":52836,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23732],"tags":[1640,29539],"class_list":["post-52831","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-security","tag-trust"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v19.3 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>RingCentral\u2019s approach to cloud communications security | RingCentral Blog<\/title>\n<meta name=\"description\" content=\"Learn how RingCentral\u2019s approach to cloud communications security, data privacy, and compliance has earned it recognition as a trailblazer in the market.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/ringcentrals-approach-to-cloud-communications-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"RingCentral\u2019s approach to cloud communications security\" \/>\n<meta property=\"og:description\" content=\"Learn how RingCentral\u2019s approach to cloud communications security, data privacy, and compliance has earned it recognition as a trailblazer in the market.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/ringcentrals-approach-to-cloud-communications-security\/\" \/>\n<meta property=\"og:site_name\" content=\"RingCentral Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ringcentral\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-02T07:00:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-26T08:46:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/wp-content\/uploads\/2022\/07\/Security.png\" \/>\n\t<meta property=\"og:image:width\" content=\"970\" \/>\n\t<meta property=\"og:image:height\" content=\"740\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Roman Tobe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ringcentral\" \/>\n<meta name=\"twitter:site\" content=\"@ringcentral\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roman Tobe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ringcentrals-approach-to-cloud-communications-security\/#article\",\"isPartOf\":{\"@id\":\"\/us\/en\/blog\/ringcentrals-approach-to-cloud-communications-security\/\"},\"author\":{\"name\":\"Roman Tobe\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/cd4eeced3d5890ae81689ec5218ec7c4\"},\"headline\":\"RingCentral\u2019s approach to cloud communications security\",\"datePublished\":\"2022-08-02T07:00:36+00:00\",\"dateModified\":\"2024-07-26T08:46:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"\/us\/en\/blog\/ringcentrals-approach-to-cloud-communications-security\/\"},\"wordCount\":891,\"publisher\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ringcentrals-approach-to-cloud-communications-security\/#primaryimage\"},\"thumbnailUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2022\/07\/Security.png\",\"keywords\":[\"security\",\"trust\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"\/us\/en\/blog\/ringcentrals-approach-to-cloud-communications-security\/\",\"url\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ringcentrals-approach-to-cloud-communications-security\/\",\"name\":\"RingCentral\u2019s approach to cloud communications security | RingCentral Blog\",\"isPartOf\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ringcentrals-approach-to-cloud-communications-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ringcentrals-approach-to-cloud-communications-security\/#primaryimage\"},\"thumbnailUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2022\/07\/Security.png\",\"datePublished\":\"2022-08-02T07:00:36+00:00\",\"dateModified\":\"2024-07-26T08:46:41+00:00\",\"description\":\"Learn how RingCentral\u2019s approach to cloud communications security, data privacy, and compliance has earned it recognition as a trailblazer in the market.\",\"breadcrumb\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ringcentrals-approach-to-cloud-communications-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ringcentrals-approach-to-cloud-communications-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ringcentrals-approach-to-cloud-communications-security\/#primaryimage\",\"url\":\"\/us\/en\/blog\/wp-content\/uploads\/2022\/07\/Security.png\",\"contentUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2022\/07\/Security.png\",\"width\":970,\"height\":740},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ringcentrals-approach-to-cloud-communications-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"RingCentral\u2019s approach to cloud communications security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website\",\"url\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/\",\"name\":\"RingCentral Blog\",\"description\":\"Intelligent Communications\",\"publisher\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization\",\"name\":\"RingCentral\",\"url\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/\",\"url\":\"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png\",\"contentUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png\",\"width\":2048,\"height\":309,\"caption\":\"RingCentral\"},\"image\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ringcentral\",\"https:\/\/x.com\/ringcentral\",\"https:\/\/www.linkedin.com\/company\/ringcentral\/\",\"https:\/\/www.instagram.com\/ringcentral\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/cd4eeced3d5890ae81689ec5218ec7c4\",\"name\":\"Roman Tobe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/39626c3167bc3f17d3bfdab2cf2c29e5286658908d1cc5d2896c1c9d7b697e20?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/39626c3167bc3f17d3bfdab2cf2c29e5286658908d1cc5d2896c1c9d7b697e20?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/39626c3167bc3f17d3bfdab2cf2c29e5286658908d1cc5d2896c1c9d7b697e20?s=96&d=mm&r=g\",\"caption\":\"Roman Tobe\"},\"description\":\"Roman Tobe is the Director of Product Marketing for RingCentral Global Trust, focused on AI, security and compliance in the unified communications space. He has guided product marketing strategy for numerous cybersecurity companies in the Bay Area.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/romantobe\/\"],\"url\":\"\/us\/en\/blog\/author\/roman-tobe\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"RingCentral\u2019s approach to cloud communications security | RingCentral Blog","description":"Learn how RingCentral\u2019s approach to cloud communications security, data privacy, and compliance has earned it recognition as a trailblazer in the market.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ringcentral.com\/us\/en\/blog\/ringcentrals-approach-to-cloud-communications-security\/","og_locale":"en_US","og_type":"article","og_title":"RingCentral\u2019s approach to cloud communications security","og_description":"Learn how RingCentral\u2019s approach to cloud communications security, data privacy, and compliance has earned it recognition as a trailblazer in the market.","og_url":"https:\/\/www.ringcentral.com\/us\/en\/blog\/ringcentrals-approach-to-cloud-communications-security\/","og_site_name":"RingCentral Blog","article_publisher":"https:\/\/www.facebook.com\/ringcentral","article_published_time":"2022-08-02T07:00:36+00:00","article_modified_time":"2024-07-26T08:46:41+00:00","og_image":[{"width":970,"height":740,"url":"https:\/\/www.ringcentral.com\/us\/en\/blog\/wp-content\/uploads\/2022\/07\/Security.png","type":"image\/png"}],"author":"Roman Tobe","twitter_card":"summary_large_image","twitter_creator":"@ringcentral","twitter_site":"@ringcentral","twitter_misc":{"Written by":"Roman Tobe","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ringcentrals-approach-to-cloud-communications-security\/#article","isPartOf":{"@id":"\/us\/en\/blog\/ringcentrals-approach-to-cloud-communications-security\/"},"author":{"name":"Roman Tobe","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/cd4eeced3d5890ae81689ec5218ec7c4"},"headline":"RingCentral\u2019s approach to cloud communications security","datePublished":"2022-08-02T07:00:36+00:00","dateModified":"2024-07-26T08:46:41+00:00","mainEntityOfPage":{"@id":"\/us\/en\/blog\/ringcentrals-approach-to-cloud-communications-security\/"},"wordCount":891,"publisher":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization"},"image":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ringcentrals-approach-to-cloud-communications-security\/#primaryimage"},"thumbnailUrl":"\/us\/en\/blog\/wp-content\/uploads\/2022\/07\/Security.png","keywords":["security","trust"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"\/us\/en\/blog\/ringcentrals-approach-to-cloud-communications-security\/","url":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ringcentrals-approach-to-cloud-communications-security\/","name":"RingCentral\u2019s approach to cloud communications security | RingCentral Blog","isPartOf":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ringcentrals-approach-to-cloud-communications-security\/#primaryimage"},"image":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ringcentrals-approach-to-cloud-communications-security\/#primaryimage"},"thumbnailUrl":"\/us\/en\/blog\/wp-content\/uploads\/2022\/07\/Security.png","datePublished":"2022-08-02T07:00:36+00:00","dateModified":"2024-07-26T08:46:41+00:00","description":"Learn how RingCentral\u2019s approach to cloud communications security, data privacy, and compliance has earned it recognition as a trailblazer in the market.","breadcrumb":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ringcentrals-approach-to-cloud-communications-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ringcentrals-approach-to-cloud-communications-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ringcentrals-approach-to-cloud-communications-security\/#primaryimage","url":"\/us\/en\/blog\/wp-content\/uploads\/2022\/07\/Security.png","contentUrl":"\/us\/en\/blog\/wp-content\/uploads\/2022\/07\/Security.png","width":970,"height":740},{"@type":"BreadcrumbList","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ringcentrals-approach-to-cloud-communications-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/"},{"@type":"ListItem","position":2,"name":"RingCentral\u2019s approach to cloud communications security"}]},{"@type":"WebSite","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website","url":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/","name":"RingCentral Blog","description":"Intelligent Communications","publisher":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization","name":"RingCentral","url":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/","url":"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png","contentUrl":"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png","width":2048,"height":309,"caption":"RingCentral"},"image":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ringcentral","https:\/\/x.com\/ringcentral","https:\/\/www.linkedin.com\/company\/ringcentral\/","https:\/\/www.instagram.com\/ringcentral"]},{"@type":"Person","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/cd4eeced3d5890ae81689ec5218ec7c4","name":"Roman Tobe","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/39626c3167bc3f17d3bfdab2cf2c29e5286658908d1cc5d2896c1c9d7b697e20?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/39626c3167bc3f17d3bfdab2cf2c29e5286658908d1cc5d2896c1c9d7b697e20?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/39626c3167bc3f17d3bfdab2cf2c29e5286658908d1cc5d2896c1c9d7b697e20?s=96&d=mm&r=g","caption":"Roman Tobe"},"description":"Roman Tobe is the Director of Product Marketing for RingCentral Global Trust, focused on AI, security and compliance in the unified communications space. He has guided product marketing strategy for numerous cybersecurity companies in the Bay Area.","sameAs":["https:\/\/www.linkedin.com\/in\/romantobe\/"],"url":"\/us\/en\/blog\/author\/roman-tobe\/"}]}},"rc_img_url":"\/us\/en\/blog\/wp-content\/uploads\/2022\/07\/Security.png","rcblog_by_author":"<a href=\"\/us\/en\/blog\/author\/roman-tobe\/amp\" data-dl-events-click=\"true\" data-dl-element=\"link\"><span class=\"image\"><img src=\"https:\/\/secure.gravatar.com\/avatar\/39626c3167bc3f17d3bfdab2cf2c29e5286658908d1cc5d2896c1c9d7b697e20?s=96&d=mm&r=g\" alt=\"\" width=\"30\" height=\"30\" layout=\"fixed\"><\/img><\/span><span class=\"by-author-name\">Roman Tobe<\/span><\/a>","rc_author_full_name":"Roman Tobe","rc_author_avatar":"\/us\/en\/blog\/wp-content\/uploads\/2022\/07\/roman-tobe.jpg","rc_author_link":"\/us\/en\/blog\/author\/roman-tobe\/amp","rc_post_categories":"<a href=\"\/us\/en\/blog\/category\/security\/amp\">Security<\/a>","amp_link":"\/us\/en\/blog\/ringcentrals-approach-to-cloud-communications-security\/amp","excerpt_title":"RingCentral\u2019s approach to cloud communications security","_links":{"self":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/posts\/52831","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/users\/1148"}],"replies":[{"embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/comments?post=52831"}],"version-history":[{"count":0,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/posts\/52831\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/media\/52836"}],"wp:attachment":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/media?parent=52831"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/categories?post=52831"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/tags?post=52831"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}