Security

The security, integrity, and availability of your data are our top priorities.

We know how vital it is to your business success. To ensure you never have to worry, we use a multi-layered approach to protect and monitor all your information.

  • We strive to follow industry best practices when it comes to security and compliance using frameworks and guidelines such as OWASP, NIST, CIS, and CSA.

  • Data protection: Your data is protected in rest by AES256 encryption and in transfer using TLS 1.2

  • Our SOC, security operations center, is staffed 24/7 and is a centralized unit that deals with security issues on an organizational and technical level. Tasks include but not limited to: Weekly Vulnerability scans, Log analysis, anomaly detection, pattern deviation, threat hunting, firewall rule monitoring, deviation in port openings, and impossible logins.

  • Security penetrations tests are performed at least annually by a third party.

  • Continuous improvements are carried out by conduction security architecture review, threat intelligence & threat monitoring.

  • Security Awareness training​ – Mandatory yearly training for all users​ and additional specific training for operations, support and security staff.

  • Crisis Management and Incident Management Training for staff are done with both tabletop exercises and different types of gamification.

Personal data Sinch receives in connection with your submission will be retained and protected under the company’s privacy policies and any applicable laws.

A Sinch representative will acknowledge receipt as soon as possible, typically within 48 hours.

Contact details: security@sinch.com

Submit any vulnerability information following these guidelines:

  • Do not engage in any activity that can potentially cause harm to Sinch, our customers, or our employees.

  • Do not engage in any activity that can potentially stop or degrade Sinch services, products, systems, or assets.

  • Do not engage in any activity that violates (a) federal or state laws or regulations or (b) the laws or regulations of any country where (i) Sinch data, services, assets or systems reside, (ii) Sinch data traffic is routed or (iii) the researcher is conducting research activity.

  • Do not store, share, compromise or destroy Sinch or customer data. If Personally Identifiable Information (PII) is encountered, you should immediately halt your activity and contact Sinch.

  • Do not initiate a fraudulent financial transaction.

  • Provide Sinch reasonable time to fix any reported issue, before such information is shared with a third party or disclosed publicly.

Image for Certifications

Certifications

Sinch cloud communications platform for messaging, voice, and video and Sinch Operator Software is certified under the framework established by an Information Security Management System conforming to ISO/IEC 27001 – 2022. Certificate No: 00214

Sinch believes certification is key to displaying our best practice in Information Security Management and our commitment to building customer trust.

What is ISO 27001?

The ISO 27001 certificate is the most globally recognized information security standard defined by the International Organization for Standardization (ISO). As the top certification for Information Security.

Management Systems (ISMS), it prescribes a systematic approach to managing sensitive company information so that it remains secure. It includes people, processes, and IT systems by applying a risk management process.

What does this mean for you as a customer?

We take the security of your information seriously and have implemented sophisticated security measures to safeguard it. We want our customers to rely on and fully trust our technology and services.

Getting ISO 27001 certified is a testament to the fact that Sinch prioritizes data security. But it also ensures that we:


  • Protect customer data rigorously

  • Assess, minimize, and eliminate risks and vulnerabilities

  • Work continuously with our security maturity

  • Achieve operational excellence regarding our IT, HR, and information processes

Continuous improvement

Our mission to security doesn’t end here. Information security is an ongoing process and we will keep working hard to maintain and exceed our standards to protect both company and customer data. Yearly audits will be performed by an external auditor to attest to our continuous compliance as we continue to develop and grow our business.

Business Continuity

Sinch has a business continuity plan in place that is tested and updated at least annually. The business continuity plan is available upon request.

Benefits we have already realized in the process:

Sinch now has the freedom to operate without the use of its global office network. Through our business continuity planning, we have freed ourselves from the physical office and can securely offer Sinch services to our clients in the event of natural disasters or pandemics.