Security

Security at Bandwidth Inc. is a high priority. Protecting both our network and our customers’ information is something we take seriously, and we’ve taken numerous steps to protect our customers and ourselves from anything that could jeopardize that security.

We’re constantly working to improve our security measures. To do that, we have achieved the internationally recognized ISO 27001:2013 certification for our products and services.

One of the few standards that uses a top-down, risk-based approach, ISO 27001 identifies requirements and specifications for a comprehensive Information Security Management System (ISMS) covering Bandwidth’s global business and processes, software development, people, and infrastructures that operate, innovate, and support Bandwidth’s V2 messaging, core messaging, 911, number management and voice services.

“Achieving the ISO 27001:2013 certification demonstrates to our customers Bandwidth’s commitment to information security, best practices, and the importance of the protection of our customer’s data.”
Andrew Grimmett, Sr. Director of Information Security

Network security

Our network is monitored 24×7 by our Network Operations Center (NOC). All site locations have firewalls and traffic monitoring deployed to ensure the security, stability, and reliability of the network our customers rely on.

Application security

Our APIs make it easy for businesses to embed communications, which is why we’ve built security right into our software. Our application security program proactively performs static and dynamic scanning of systems and software code. We also work with developers to provide feedback loops during the development lifecycle through our Bandwidth SSDLC.

Vendor risk management

We continuously monitor our vendors through our Bandwidth VRM (vendor risk management) program. This enables us to identify and protect data store by third-party vendors in real-time by doing data security evaluations at all times instead of at regular intervals.

Arrow and chain icon

Endpoint security

In addition to protecting our network and software, we’re committed to protecting all access points to that network and your information. All Bandwidth desktops, laptops, and mobile devices are centrally managed and fully encrypted. All end-user computers have anti-virus and anti-malware protections.

Physical security

Access to all Bandwidth offices is restricted and controlled by assigned proximity badges. Visitors must sign in, display a visitor badge, and be escorted by the sponsoring employee. Entrances and exits to all sites and offices are under video surveillance. Bandwidth hosted data centers are SOC 2 Type II or ISO 27001:2013 certified. Each data center site location provides layers of security, including biometrics, security guards, cameras and equipment secured in isolated rack/cages.

In-depth security

Bandwidth has a dedicated information security team that oversees Bandwidth’s security program. Bandwidth recognizes information must be managed, controlled and protected as it has a significant impact on our products and customers.

U.S. Security Controls Overview

Bandwidth has a dedicated information security team that oversees Bandwidth’s security program. Bandwidth recognizes information must be managed, controlled and protected as it has a significant impact on our products and customers. Bandwidth’s Information Security program achieved ISO 27001:2013 certification and SOC 2 Type II to protect assets against unauthorized use, disclosure, alteration, and destruction.

Global Security Controls Overview

Bandwidth has a dedicated information security team that oversees Bandwidth’s security program. Bandwidth recognizes information must be managed, controlled and protected as it has a significant impact on our products and customers. Bandwidth’s Information Security program centers on ISO 27001 and 27002 to protect assets against unauthorized use, disclosure, alteration, and destruction.

Prioritize security with Bandwidth

The above security statements apply to Bandwidth Inc. only.