Our Client
Our Client
Our Client

Trusted by more than 3 million business users.

Compliance Programs

At 8×8, we take the lead in the cloud-based communications industry for security across a company’s entire enterprise.

8×8 cybersecurity controls are designed sufficiently and operated effectively throughout the testing periods.

View SOC 2 Type II Audit Certification

View SOC 2 Type III Audit Certification

8×8 is HIPAA compliant and provides Business Associate Agreements for Covered Entities and Business Associates.

View HIPAA Audit Certificate

8×8 is one of the first companies to be awarded by the Cyber Security Agency of Singapore, for good cybersecurity practices.

View CSA Cyber Trust Certificate

8×8’s information security management system is globally certified as compliant with the requirements of ISO 27001: 2022 (incorporating ISO 27017:2015 control set).

View ISO 27001 Audit Certificate

Industry-leading Security and Compliance

Any enterprise product or service must meet or exceed existing customer security and compliance requirements. Prior to launch, all service offerings go through rigorous software code security stress testing using static and dynamic analysis.

Security certifications

8×8’s Responsible Disclosure & Bug Bounty Programs

8×8 runs responsible disclosure and incentivized bounty programs through HackerOne to allow anyone to report vulnerabilities.

With this National Institute of Standards and Technology best-practice RDP, we have a well-defined process for finding and fixing vulnerabilities—before they could be exploited. We partner with the security’s greatest minds to keep our customer’s and partner’s data safe and secure.

Application Development

The 8×8 Software Development Life Cycle involves multiple stages of review — starting with an architectural review at the beginning of each new project, followed by continuous code checks through manual peer reviews, further assessments by security teams, and automated reviews using Static and Dynamic Application Security Testing tools.

Cryptography Measures

Data is encrypted in-transit and at-rest, utilizing strong encryption technologies, such as the Transport Layer Security (TLS) version 1.2, Short Message Peer-to-Peer (SMPP) protocol via TLS, and the 256-bit AES algorithm in Galois Counter Mode (AES-GCM).

Built-in security

8×8 provides in-product security and data protection, enabling users to integrate our solution securely. This includes:

  • Two-Factor Authentication
  • Single-Sign-On via SAML
  • Number Lookup API
  • Mobile Verification API
  • Number Masking

Comprehensive processes that meet the highest security requirements

The security, availability, and confidentiality requirements for 8×8 Communication APIs platform are managed using a combination of:

1. Documented policies and procedures
2. Management oversight
3. Security-first and privacy-first cultures
4. Technology implementations using security-by-design principles

These management practices are implemented in all areas to protect systems, data, and personnel and to ensure compliance with industry best practices and standards.

 

8×8 is committed to your security

From 8×8’s management philosophy to physical, process, employee, product, and infrastructure security — as well as business continuity — we have implemented robust security measures to ensure your messages are delivered reliably and securely.

To get started, the 8×8 Developer Hub provides step-by-step guides and API references to support your integration journey.

Learn more

Get an in-depth look at 8×8’s security practices with our security whitepaper.

Talk to an Expert

Complete this form and an 8x8 sales specialist will reach out to you shortly.

8x8 SMS API allows you to efficiently reach your customers by automating notifications, OTPs, reminders and alerts with a high delivery rate.

Thank you for your interest!

An 8x8 sales specialist will reach out to you shortly.

Any urgent enquiries and help needed?

Email [email protected]

Support Visit support site

To top
This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.