Skip to main content

Secure cloud communications

We employ security best practices and policies to ensure that our network is secured physically and virtually, and that our customers' data and payment information are both private and secure.

Physical security

State-of-the-art on-premises security for all of our distributed computing and storage networks worldwide.

Network security

All data entering and leaving Plivo is encrypted with TLS/HTTPS.

Application security

Encryption and authentication for secure and efficient access of Plivo's APIs.

Data security

Backup encryption and account access limitations to mitigate risk and threats to our customer data.

Payment security

Use of leading industry transaction processing vendors to protect all transactions and payment information.

Physical on-premises security

State-of-the-art on-premises security for all of our distributed computing and storage networks worldwide.

24/7 surveillance

AWS provides dedicated 24/7 state-of-the-art electronic surveillance and physical security measures at all of our server locations, including foot patrols, security logs, and perimeter inspections.

Personnel authorization

Only authorized Plivo personnel are granted access credentials to our data centers. Every access is also logged and reviewed to ensure that our systems are not breached by internal threats.

Security logs

All activity on our servers are logged, and we review historical reports for system change tracking, security analysis, and compliance auditing.

Infrastructure "Security of the Cloud"

Plivo uses cloud storage and compute services from Amazon Web Services (AWS). AWS is responsible for the security of the cloud, i.e. protecting the infrastructure that runs all of the services offered in the AWS Cloud. Plivo is responsible for securing the application platform deployed in AWS.

Infrastructure security & availability

Redundant, distributed infrastructure designed for maximum uptime and rapid failover.

Annual penetration tests

Our infrastructure, web applications, and APIs are penetration tested annually by external independent parties, and any vulnerabilities found are fixed.

Full redundancy

Redundant links reroute traffic over backup networks in less than two seconds in case of backbone failover.

HVAC and power stability

All of our facilities offer 100% power and HVAC functionality in any given month.

Optimized load balancing

We distribute workloads across multiple resources to optimize response times, maximize throughput, and avoid single points of failure.

Carrier redundancy

We aim to connect to multiple carriers in each country. At a minimum, we connect to at least two local carriers in each country.

Clustered and distributed infrastructure

We use automated systems to deploy new code to clusters in real time to ensure smooth transitions between software updates with no downtime.

Network firewalls

Defensive systems embedded at multiple points and layers across the infrastructure and server environment work to protect our systems from unauthorized, potentially harmful, malicious, and problematic traffic and input.

Application security

Encryption and authentication for secure and efficient access of Plivo's APIs.

Multifactor authentication (MFA)

To prevent unauthorized account access, each session requires the account username and a strong passphrase for access to each Plivo account. We also require phone number verification delivered through an SMS text message or a voice call.

Authentication IDs and tokens

We employ unique Authentication IDs and Authentication tokens for every user to ensure that only authorized people have access to accounts.

TLS encryption

All web session traffic between customer applications and Plivo is encrypted using TLS (transport layer security). All data entering or leaving Plivo infrastructure is encrypted with TLS/HTTPS.

Data security & privacy

Backup encryption and account access limitations to mitigate risk and threats to our customer data.

Customer data protection

Plivo provides logical tenant separation, encryption in transit (TLS 1.2 or greater) and encryption at rest (256-bit Advanced Encryption Standard (AES-256)).

Limited data access

Administrative access privileges within the production environment are restricted to authorized personnel. Only Plivo employees who require customer data access as part of their job functions are permitted to access customer data.

Backup encryption

We perform regular backups on all Plivo customer data. All backups are stored redundantly and are encrypted using AES-256.

Mobile device management (MDM)

All laptop devices issued to Plivo employees come with encrypted storage partitions and MDM software. We have the ability to remotely wipe a device in the event of it being lost or stolen.

Payment security

Use of leading industry transaction processing vendors to protect all transactions and payment information.

Payment encryption

We don't store any credit card information on our servers. Instead, all credit card information is encrypted using AES-256 and handled by our payment platform provider.

PCI compliance

Our payment platform provider is PCI DSS (Payment Card Industry Data Security Standard) compliant.

Compliance & certifications

Plivo maintains the highest standards of compliance, validated through independent audits and certifications.

GDPR

GDPR

Plivo systems are compliant with the data protection principles of the European Union's General Data Protection Regulation.

SOC 2 certified

SOC 2 certified

Plivo is SOC 2 certified. Our SOC 3 report provides more details.

Read report
HIPAA / HITECH compliant

HIPAA / HITECH compliant

Plivo is willing to sign a Business Associate Agreement for customers who handle protected health information (PHI). We're audited annually by an independent auditor.

PCI DSS Level 1

PCI DSS Level 1

Plivo is certified compliant with PCI DSS Level 1. We're audited annually by an independent auditor.

CSA STAR Level 1

CSA STAR Level 1

Plivo has completed the CSA STAR Level 1 self-assessment, demonstrating transparency and adherence to cloud security controls.

View listing
Data privacy framework

Data privacy framework

Plivo participates in the EU–U.S. Data Privacy Framework (DPF). The DPF allows personal data to flow from the EU to certified U.S. companies without extra contractual safeguards. Participating companies must follow core privacy principles and provide redress mechanisms while limiting U.S. intelligence access.

Operational transparency

Transparent incident response and employee accountability across all operations.

Transparent incident response

We respond to priority 1 business-critical incidents around the clock, 365 days a year.

Privacy policy

All Plivo employees are bound by Plivo's privacy policy.

Ready to make every call count?

Get $10 in free credits. No credit card required. Deploy your first agent in under 10 minutes.

Sign up for free