Compliance

Data in
Transit threat

The growing incidence of security failures and the loss of personal data has generated a raft of more stringent and comprehensive compliance regulations.

When compliance is discussed, most people think of protecting names, address and credit card details in static databases. This is important, but it is equally important to protect data-in-transit. Data-in-transit includes voice and video calls and Instant Messages. The European Union Agency for Network and Information Security (ENISA) specifically include calls and IM within their definition of data processing.

There is little point in investing in security technology to protect back-end databases if your IP based phone system lacks the protection to prevent unauthorised call monitoring.

Unicus™ from UM Labs provides the essential security needed to protect data-in-transit and assist in ensuring that your data processing meets the growing number of data protection compliance regulations. One of the key technologies is the ability to encrypt that data.

Meeting the complete set of compliance requirements is not straight forward. Some regulations such as Europe’s GDPR and The California Consumer Privacy Act of 2018 from the USA call for encryption, while others such a MIFID II require the recording of communications. Organisations may also need to implement call recording to meet internal audit requirements. Call recording and encryption cannot be combined without adding additional layers of complexity. Complexity is always the enemy of good security.

Unicus™ solves this problem by managing the key exchange needed to set an encrypted call and enabling calls matching an established recording policy to be recorded for compliance and auditing purposes. The recording policy and the recordings themselves remain under the control of the organisation using Unicus™.

This approach enables Unicus™ to bridge both sets of compliance requirements.

Compliance
Key Points

Let's talk

We are are pioneers & leaders of security software services for real-time communications using any cloud computing. If you need robust security protection, let’s start a conversation.

 
SNITCH Attack Intelligence   +++  7,270 attacks from 199.195.252.118, location United States    +++  345 attacks from 72.251.232.180, location United States    +++  276 attacks from 162.142.125.10, location United States    +++  New attack source, United States, 205.209.104.4     +++  New attack source, France, 92.205.185.12     +++  New attack source, United States, 96.44.142.10     +++  New attack source, United States, 193.39.184.237     +++  New attack source, United States, 198.235.24.28  
2-6 Boundary Row,
South Bank,
London
SE1 8HP

© UM Labs 2021. All Rights Reserved.  Privacy Policy | Cookie Policy

Designed and developed by mtc