Secure cloud communications
We employ security best practices and policies to ensure that our network is secured physically and virtually, and that our customers' data and payment information are both private and secure.
Physical security
State-of-the-art on-premises security for all of our distributed computing and storage networks worldwide.
Network security
All data entering and leaving Plivo is encrypted with TLS/HTTPS.
Application security
Encryption and authentication for secure and efficient access of Plivo's APIs.
Data security
Backup encryption and account access limitations to mitigate risk and threats to our customer data.
Payment security
Use of leading industry transaction processing vendors to protect all transactions and payment information.
Sections
Physical on-premises security
State-of-the-art on-premises security for all of our distributed computing and storage networks worldwide.
AWS provides dedicated 24/7 state-of-the-art electronic surveillance and physical security measures at all of our server locations, including foot patrols, security logs, and perimeter inspections.
Only authorized Plivo personnel are granted access credentials to our data centers. Every access is also logged and reviewed to ensure that our systems are not breached by internal threats.
All activity on our servers are logged, and we review historical reports for system change tracking, security analysis, and compliance auditing.
Plivo uses cloud storage and compute services from Amazon Web Services (AWS). AWS is responsible for the security of the cloud, i.e. protecting the infrastructure that runs all of the services offered in the AWS Cloud. Plivo is responsible for securing the application platform deployed in AWS.
Infrastructure security & availability
Redundant, distributed infrastructure designed for maximum uptime and rapid failover.
Our infrastructure, web applications, and APIs are penetration tested annually by external independent parties, and any vulnerabilities found are fixed.
Redundant links reroute traffic over backup networks in less than two seconds in case of backbone failover.
All of our facilities offer 100% power and HVAC functionality in any given month.
We distribute workloads across multiple resources to optimize response times, maximize throughput, and avoid single points of failure.
We aim to connect to multiple carriers in each country. At a minimum, we connect to at least two local carriers in each country.
We use automated systems to deploy new code to clusters in real time to ensure smooth transitions between software updates with no downtime.
Defensive systems embedded at multiple points and layers across the infrastructure and server environment work to protect our systems from unauthorized, potentially harmful, malicious, and problematic traffic and input.
Application security
Encryption and authentication for secure and efficient access of Plivo's APIs.
To prevent unauthorized account access, each session requires the account username and a strong passphrase for access to each Plivo account. We also require phone number verification delivered through an SMS text message or a voice call.
We employ unique Authentication IDs and Authentication tokens for every user to ensure that only authorized people have access to accounts.
All web session traffic between customer applications and Plivo is encrypted using TLS (transport layer security). All data entering or leaving Plivo infrastructure is encrypted with TLS/HTTPS.
Data security & privacy
Backup encryption and account access limitations to mitigate risk and threats to our customer data.
Plivo provides logical tenant separation, encryption in transit (TLS 1.2 or greater) and encryption at rest (256-bit Advanced Encryption Standard (AES-256)).
Administrative access privileges within the production environment are restricted to authorized personnel. Only Plivo employees who require customer data access as part of their job functions are permitted to access customer data.
We perform regular backups on all Plivo customer data. All backups are stored redundantly and are encrypted using AES-256.
All laptop devices issued to Plivo employees come with encrypted storage partitions and MDM software. We have the ability to remotely wipe a device in the event of it being lost or stolen.
Payment security
Use of leading industry transaction processing vendors to protect all transactions and payment information.
We don't store any credit card information on our servers. Instead, all credit card information is encrypted using AES-256 and handled by our payment platform provider.
Our payment platform provider is PCI DSS (Payment Card Industry Data Security Standard) compliant.
Compliance & certifications
Plivo maintains the highest standards of compliance, validated through independent audits and certifications.
GDPR
Plivo systems are compliant with the data protection principles of the European Union's General Data Protection Regulation.
HIPAA / HITECH compliant
Plivo is willing to sign a Business Associate Agreement for customers who handle protected health information (PHI). We're audited annually by an independent auditor.
PCI DSS Level 1
Plivo is certified compliant with PCI DSS Level 1. We're audited annually by an independent auditor.
CSA STAR Level 1
Plivo has completed the CSA STAR Level 1 self-assessment, demonstrating transparency and adherence to cloud security controls.
View listingData privacy framework
Plivo participates in the EU–U.S. Data Privacy Framework (DPF). The DPF allows personal data to flow from the EU to certified U.S. companies without extra contractual safeguards. Participating companies must follow core privacy principles and provide redress mechanisms while limiting U.S. intelligence access.
Operational transparency
Transparent incident response and employee accountability across all operations.
We respond to priority 1 business-critical incidents around the clock, 365 days a year.
All Plivo employees are bound by Plivo's privacy policy.
Ready to make every call count?
Get $10 in free credits. No credit card required. Deploy your first agent in under 10 minutes.
Sign up for free