Clarity Voice VoIP Network

Safe. Secure. Scalable.

Protecting your communications against fraud and abuse.

Security – why do I need it?

Clarity offers you added peace of mind by instituting robust security measures at every level for your architecture and processes. These include the physical, network, host, data, application, and business processes, as well as the enterprise level of your organization.

Clarity Voice.s UCaaS system ensures that customer calls and fax messages are secure with encryption in transit and at-rest, along with other features, protecting data and guarding against unauthorized access to protected health information.

BEST-IN-CLASS NETWORK SECURITY & RELIABILITY

Clarity makes it easy to run a fully secure business.

We Never Sleep

We maintain 24//365 coverage in our networking and user support center just in case you call.

No Power? No Problem

Redundant data center ensure seamless failover. If a natural disaster strikes, we have you covered coast to coast.

No Internet? No Problem

If an internet backbone issue occurs at your ISP, we’ll seamlessly transfer your calls to your mobile devices.

No Time for Downtime

Our reliable Networks with carrier-grade data centers, strive for 99.999% up-time, so you’ll never miss a beat with your customers.

Always Informed

Know our system status 24/7. You’ll know instantly if our performance is impacted by a carrier, network backbone, system maintenance or other issue at clarityvoice.com/support

Technically Certified Support

Get any problem solved fast with our technically certified USA based support team. You’ll always talk to a real human and get real answers, every time.

SECURITY & RELIABILITY ARE ALWAYS TOP PRIORITIES

We’ve made it easy to run a fully secure business.


Clarity makes it easy to run a fully secure business.

Monitoring 24/7

Our VoIP certified engineers watch our network at all times. With consistent monitoring, any network issues are immediately flagged and actively solved.

We Take Security Seriously

We’ve got you covered. HIPAA, FISMA High, FedRAMP, SOC 2 Type 2, SOC 3, ISO 27001, ISO 50001, ISO 14001, ISO9001

Seven Distinct Layers…

…of physical and data security between endpoints.

  • Data securely stored
  • Application layer security
  • Endpoint security
  • Network security
  • Perimeter and other layers of physical security
  • Policy management thru SOP’s
  • Monitoring

Fax Document & Call Recordings

  • All fax cashing is purged following successful transmission; aka we do not store any fax document.
  • Call recordings can be set to be continual or on demand.
  • All continual call recordin plans are auto purged at 30-days unless a long-term storage plan is purchased.

NEED TO KNOW EVEN MORE? WE GET YOU.

Let’s speak geek-to-geek if this doesn’t satisfy.

VOICE DATA

  • Our Multiple Data Centers are designed to be compliant
    • Data Center 1: HIPAA – PCI – FISMA High – FedRAMP – SOC2 Type 2 – SOC 3 – ISO 27001 – ISO 50001 – ISO 14001 – ISO 9001
    • Data Center 2: HIPAA, PCI-DSS, and SSAE-18 SOC2 TypeII/SOC 3 compliant
  • Data is stored securely (in the sense that we require authentication for access and access is provided only to those who need it to do their job)
  • All systems are behind firewalls
  • All Data is stored securely and behind a firewall
  • Customer data that could provide ePHI are encrypted during all transmissions (voice is configurable)
  • Encryption: All in and out data transport are secured through appropriate levels of encryption
  • All passwords are encrypted and regularly request to be reset by users
  • System access is restricted to only authorized users that maintain our systems
  • Automatic log off features are implemented on all systems
  • Recordings purged. Any customer choosing to use call recording functionality is set to purge automatically after 30-days and likewise access to these files are permission based at an individual user
  • Seven distinct layers of physical and data security between endpoints
    1. Data securely stored
    2. Application layer security
    3. Endpoint security
    4. Network security
    5. Perimeter and other layers of physical security
    6. Policy management thru SOP’s
    7. Monitoring

FAX DATA

  • Our eFax platform utilizes HTTPS technology for transmitting fax traffic internally.

  • All Fax caching is purged following successful transmission; aka we do not store any fax documents.

  • Furthermore, our fax servers are secured behind a firewall and access is restricted to our system administrators.