Connect your employees to your customers across the channels they use most.
Automate and personalize business processes with prebuilt or customized apps.
Call, meet, message, and more—all in one app.
Connect people, tasks, tools, and more in a customizable app built for immersive collaboration.
Rely on our team of experts to help you get the most from your investment.
Consult with the experts to create your best customer journey.
Find a cloud that’s flexible, secure, and dedicated to your organization.
Explore our complete portfolio of devices for individuals and conference rooms.
See what’s next for your full-featured call center.
Explore your options for communications innovation.
Take collaboration, both inside and out, to the next level.
Move at your pace with Avaya’s hybrid cloud options.
Deliver effortless experiences for customers and employees at every touchpoint.
Help your contact center run smoothly, no matter where your employees are.
Find an Authorized Avaya Channel Partner in your part of the world.
Build new, innovative communications solutions via Avaya’s open solution platforms.
See our partnerships with leading technology companies for unique and value-adding solutions.
Explore all of the partner types and programs available at Avaya
Sell the Avaya portfolio with benefits, incentives, lead gen, training, and marketing resources.
Transition customers to the cloud fast and on budget, supported by Avaya services and features.
Stay up to date on Avaya's latest news and solutions.
Deliver innovative and complete solutions to your customers.
Get to know Avaya through our blogs. Insights on collaboration, customer experience, AI, digital.
Watch videos and listen to podcasts by topic or just browse what’s new. Interviews, solutions, how-to’s, more.
See inspiring ways companies are using Avaya solutions to change the world of work.
Look at what's new in our world—and how it benefits yours.
Engage with us in an immersive and interactive experience—on site, virtually, or a combo.
Listen in on conversations with tech innovators who are transforming the experience economy.
Learn about the privacy, compliance, and security inside Avaya solutions.
Review the terms and policies associated with Avaya software and services.
Access a full range of information and assistance for your Avaya solution.
For research and support, access our product documentation resources.
Meet Avaya experts at our events, webinars, expos, conferences and more.
In person or online, gain a full understanding of your Avaya solution and its capabilities.
Sign in
Avaya Trust Center
Avaya cloud solutions are designed to scale while maintaining deep security and high availability.
Our robust cloud solutions deliver unique security advantages gained from partnerships with global security intelligence, sophisticated customer-facing controls, and a secure hardened infrastructure. This multi-faceted approach gives customers extensive security coverage and a 360° view of security across their organizations.
Avaya employs vault technology to maintain trust and to ensure security and integrity.
Reliability has measurable goals and deviations are promptly corrected. Everything is change-managed to ensure systems are updated smoothly. Incidents are interrogated and corrected. We have consistently had more than 99.99% uptime and reveal all incidents and downtime on our status page.
It takes much more than a secure system and high-availability architecture to ensure we meet our obligations, both internally and externally, following a disruptive incident. As such, both our Business Continuity Plan and IT Disaster Recovery Plan outline how we respond and recover our system. Plans are reviewed and approved annually, or as significant organizational changes occur. We review the systems, facilities and third-party relationships that enable the recovery and restoration of Avaya OneCloud solutions. We review and set Recovery Point Objectives (RPOs) and Recovery Time Objectives (RTOs).
The Avaya eBonding system is an integration solution that interfaces Avaya's managed services platform with our customers’ and partners’ ITSM solutions. Avaya REST API service offerings enhance platform capabilities and provide a seamless exchange of incident and change (service request) information. For more information about our ITSM eBonding or REST API Service offerings, contact your Avaya representative.
Avaya’s incident management policy and procedures ensure our teams proactively study risk, respond quickly to mitigate potential risk, and promptly notify clients of any unauthorized access to personal data.
Avaya monitors our services for potential security and performance issues. Controls are implemented at every point of the development lifecycle using SOC2, ISO 27002 and ISO 22301 standards. We practice staging as part of our secure development process, ensuring the testing of new features and content doesn’t negatively impact the stability of production environments.
Avaya uses top tools to prioritize and respond to vulnerabilities and security incidents faster. Avaya teams manage preparation, planning/prevention, monitoring, detection/response, and refinement and compliance management.
Asset inventory
An exhaustive inventory of the data center—applications, databases, servers, cloud services, endpoints—and the protection tools in use: firewalls, antivirus/anti-malware/anti-ransomware, monitoring.
Incident response planning
An organization's incident response plan—activities, roles, and responsibilities in the event of a threat or incident—and the metrics to measure success.
Regular testing
Vulnerability assessments that identify each resource's vulnerability to potential threats. Plus, penetration tests, followed by remediation.
Continuous monitoring
24/7/365 monitoring of cloud workloads and the network for known exploits and suspicious activity. SIEM monitors and aggregates alerts and telemetry in real time and analyzes the data to identify potential threats.
Log management
Collection and analysis of log data generated by the control plane and the data plane.
Threat detection
SIEM solution with AI that learns suspicious activity.
Refinement
Recurrence prevention measures to update processes and policies, choose new cybersecurity tools, or revise the incident response plan.
Compliance management
All applications, processes and devices comply with current certified regulations.