Messages, video and phone with end-to-end encryption

Messages, video and phone with end-to-end encryption

Share post

Ring Central wants to offer more communication security and fewer compliance risks with end-to-end encryption (E2EE) in its products. E2EE was already integrated in video communication. Now also for message and telephone to be GDPR compliant.

RingCentral introduces End-to-End Encryption (E2EE) support to RingCentral MVP, which in the future will include not only video but also message and phone. E2EE technology prevents unauthorized third parties from gaining access to users' communication content. For security-conscious companies, the solution offers an even higher level of security and data protection for confidential communication as well as protection against malicious access.

🔎 End-to-end encryption from RingCentral for telephony, but also for video and messages (Image: RingCentral),

Security instead of high GDPR fines

GDPR fines related to communication security gaps and compliance risks increased from USD 179 million in 2020 to USD 1,2 billion in 2021, according to the current GDPR Fines and Data Breach Report by DLA Piper – an increase of 570 percent. The cost of corporate data breaches alone exceeded $2021 million in 151, according to the FBI's Internet Crime Report.

Until now, companies that wanted to keep their calls and chat messages confidential and end-to-end encrypted had to use multiple tools from different third parties. In many cases, monitoring essential compliance requirements was a challenge.

Main elements of the E2EE solution

RingCentral's new E2EE capabilities make chat, calling, and video meetings more private and secure across the organization, with additional options for privacy and security. Other benefits of the new solution include:

  • Extended support for groups beyond 1:1 calls or messages. RingCentral fully supports video, message and phone in terms of security and privacy. The technology is based on Messaging Layer Security (MLS), is scalable and applicable to all users registered with a RingCentral account - regardless of whether they communicate with each other within a company or with external guests. To date, this represents the most comprehensive deployment of end-to-end encryption for enterprise communications.
  • Multimodal and available on desktop, mobile and web browser. E2EE is available on various end devices and web browsers to ensure that users can work with the solution from anywhere and that guests can also use E2EE without the app.
  • E2EE can be switched on at any time. No matter whether it is an ongoing, planned or spontaneous conversation - E2EE can be switched on at any time and allows participants to easily and securely switch their devices during the conversation.
  • Privacy from start to finish. To ensure maximum flexibility and compliance, IT administrators can turn E2EE features on and off at any time. In addition, the administrators have the option of using cryptographic methods to access and export message data if required. Over the coming year, RingCentral, in collaboration with select partners, will also enable its users to capture and monitor content for E2EE-protected chat, voice and video communications.
More at RingCentral.com

 


About RingCentral

RingCentral, Inc. is the leading provider of Unified Communications as a Service (UCaas) for businesses based on its powerful global Message Video Phone ™ (MVP ™) platform. As a provider of cloud communication and contact center solutions, RingCentral is more flexible and less expensive than older local PBX and video conferencing systems. The platform enables modern, mobile employees to work together and communicate with one another using any mode, any device and any location. RingCentral's portfolio includes three key products: including RingCentral MVP ™, a UCaaS platform with team messaging, video conferencing and cloud telephony; RingCentral Video ™, a video conferencing solution with team messaging; as well as the RingCentral cloud contact center solutions.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more