Security Statement

At S-Net, having a reliable & secure telecom solution is our top priority. As a provider of high bandwidth fiber Internet and complete cloud phone solutions, we have to have many layers of security built into our infrastructure. These layers of security help us detect and prevent potential toll fraud, service abuse, and user-controlled service administration. Read this document to understand the full details of S-Net’s security model.

Multi-Level Security Service

Our security model is setup with multiple levels that places S-Net’s security on every aspect of our telecom solutions. We have staff working full-time to monitor the security of our managed services and to prevent fraud. Using the telecom industry’s best practices, our security program includes monitoring for anonymous calling that could become expensive toll fraud.

Some of our levels of security includes: security of the perimeter, security at the service installation level, SSL on all software & web applications, security at the T-1 data centers, and security at the cloud PBX system that the customer controls.

Customer Admin Security

All S-Net customers have administrative login’s to control and manage their cloud PBX users & settings. Customers have the ability to setup multiple admins with different permission levels to manage their phone system.

Some of the controllable admin settings include: managing user extensions, security PINs, local & International calling privileges, user permission levels, blocking inbound caller ID’s, and reviewing call history & messages.

Customer Application Security

S-Net places all customer data in logically segmented application databases specific for each customer. All customer PINs are then stored in individual source Hash (es).

Phone Transmission Security

We use SSLv3/TLSv1 in order to encrypt web-based session traffic.

Network And Infrastructure Security

S-Nets network and application perimeter is protected with firewalls and session border controllers. Administrative access requires authentication through a VPN gateway, then authenticating to a local infrastructure system. Authorized employees are given access to the production environment. Technology tiers include system logs, fraud analytics and intrusion-detection systems. Operational processes include system and service-level monitoring, system hardware, change management and regular security scans.

Physical and Environmental Security

Our hosted services undergo SSAE-16 and/or ISO 27001 audits in our data centers. We have safeguards that will act as additional security and will minimize our risk of loss and service interruptions due to natural disasters and other catastrophic situations because of our large diverse geographic locations. Our centers share hosted facilities space with some of the worlds largest financial institutions and internet companies.

Fraud Mitigation

S-Net services include multiple layers to detect and prevent toll fraud, including access control, detection controls, usage throttling, and customer-controlled settings to enable/disable international calling to approved destinations. In addition, our security department performs active monitoring to detect and notify customers of anomalous calling patterns on their account.

Disaster Recovery

S-Net’s service is designed to support failover conditions in case of emergency. Real-time replication between locations in the database with failover built into the service. We use primary and backup locations that remain online simultaneously, with a primary pod in active mode and we use a stand by mode in secondary pod. If a primary location is unavailable, the backup location will continue service. Our service is built with application redundancy infrastructure along with a geographically distributed redundancy so service can continue if one location is not available.

Subscribe To Our Newsletter

 

Stay connected with us! Subscribe to our newsletter for the most recent headlines from S-NET.

Simplify & Secure Your Business Communications

We’re Serious About Your Success

Let's Get to Business