RINGCENTRAL TRUST CENTER

Building trust in
your communications

Keep your data safe at every level of your business with
enterprise-grade security, reliability, and privacy.

The CISO Guide to Cloud Communications Security

Learn about essential cyber security, data privacy, and compliance requirements for cloud communications.
Guide cover page: an illustration of a woman sending a data encrypted file on her mobile phone via the RingCentral app

Product Security

Security Policy Controls

Our platform puts a comprehensive set of administrative controls across video, message and phone at your fingertips, such as requiring your meeting attendees to authenticate, limiting who can enable screen sharing, and requiring waiting rooms for your users to approve attendees who can join.
  • Single sign-on (SSO)
  • Require password
  • Restrict screen sharing
  • Enforce waiting room
  • Restrict meeting attendance to authenticated users
  • Allow user to enable meeting recordings
  • Enable moderator turn on/off video for all participants
  • Moderator remove participants
  • Moderator mute participants
  • Virtual background for privacy
  • Hide meeting ID
  • Control data file sharing
  • Audit trail to track changes
  • Video meeting insight
  • Enable E2EE before meeting
  • Dynamically turn on E2EE
  • TLS encryption/SRTP secure voice
  • Single sign-on (SSO)
  • Block phone numbers
  • AI-based spam blocking
  • RoboCall mitigation using STIR/SHAKEN standards
  • Number masking
  • RingOut—calling on third-party devices with your business phone number
  • Emergency response locations for E911 calls
  • RAY BAUM’S Act and Kari’s Law compliant
  • Voicemail routing based on business hours
  • Analytics portal
  • 99.999% SLA uptime
  • TLS encryption/SRTP secure voice
  • End-to-end encrypted (E2EE) calls (available in closed beta)
  • Allow/block list—external guest domains
  • Allow/block list—webmail accounts
  • Clear guest identification within 1:1 and group chats
  • Enforce policies
  • SEA FINRA 17a-4
  • End-to-end encrypted (E2EE) team chats (available in closed beta)
  • Single sign-on (SSO)
  • Enforced multi-factor authentication (MFA)
  • Device PIN enforcement
  • User management
  • Data-at-rest
  • Data-in-transit
  • TLS encryption/SRTP secure voice
  • E2EE via Message Layer Security (MLS)
  • Single sign-on (SSO)
  • Require password
  • Restrict to authenticated users
  • Session timer to logout inactivity
  • Authorized apps manager
  • VoIP country blocking
  • Centralized IT management of free and paid users
  • Audit trail to track changes
  • Enterprise mobility management via RingCentral for Intune
  • Native and 3rd party archive via RingCentral API
  • eDiscovery, content capture and DLP via Theta Lake

We keep you informed

We work with security researchers to identify vulnerabilities and keep you informed if any should exist in our products or on our websites. 
More coming soon
Megaphone illustrating how RingCentral keeps customers informed about possible security issues
More resources
A male programmer typing on his keyboard while looking at his monitor
SECURE DEVELOPMENT
Find out how RingCentral's secure development helps ensure product security
A woman checking documents on her tablet
LAW ENFORCEMENT
Access all of our legal documents in one place
A woman looking at her mobile phone
SECURITY
What to look for in a UCaaS provider

RingCentral is built on a secure cloud platform with a robust
portfolio of security and compliance certifications.

The CISO Guide to Cloud Communications Security

Learn about essential cyber security, data privacy, and compliance requirements for cloud communications.
Guide cover page: an illustration of a woman sending a data encrypted file on her mobile phone via the RingCentral app
A woman using the RingCentral app on her cellphone and laptop
A woman using the RingCentral app on her cellphone and laptop
Latest Privacy News
RingCentral RingCX Service Privacy Datasheet
Whitepaper: Privacy and Data Protection at RingCentral
whitepaper

Privacy and Data Protection
at RingCentral

Learn about data protection policies, processes, and controls established and operated by RingCentral.
Whitepaper: RingCentral as a Data Controller
whitepaper

RingCentral as a Data Controller

Learn more about how RingCentral operates as a data controller.

RingCentral privacy datasheets describe how we process personal data when providing our services

RingCentral products and services comply with data protection laws and regulations around the world.

When RingCentral transfers data we rely on a variety of transfer mechanisms and frameworks.

More resources

Two IT colleagues discussing a process in front of their desktop screens

Webpage

Subprocessor List
A man writing on his tablet

Webpage

Access all of our legal documents in one place
A woman answering a form on her mobile phone

Webpage

Data Subject Request Access Form

Transparency

We are committed to maintaining the privacy and trust of our customers by giving you full visibility. Our Transparency Report describes how we respond to customer data requests submitted by law enforcement and government agencies around the world.
Two hands shaking each other, connected around in one arm symbolizing transparency and RingCentral's commitment to maintaining customer privacy and trust

Stay connected, always

We’re dedicated to keeping you open for business, whenever and wherever you need to be.
New work patterns and natural emergencies can cause abrupt work location shifts. Stay open for business no matter where you are working—home, office, or somewhere in between. Our distributed network is fully redundant in every location we serve, providing you with a truly global infrastructure that ensures 24/7 business continuity for your company, from anywhere. 
Thanks to RingCentral, our entire corporate staff was able to shift to working from home in a day, without missing a beat.
Paul Rapier, Vice President of IT, Detroit Pistons
Detroit Pistons Logo
Set up customer care alerts
Receive real-time updates from our customer care team when anything changes on your system.
Set up customer care alerts
We continually monitor the end-to-end performance of our network to ensure KPIs such as quality metrics, completion rates, and availability remain at peak levels. Access our self-service portal 24/7 for a detailed overview.
Stay online when disaster strikes
Redundant internet connections switch active services between data centers to keep you online during outages, disasters, and cyberattacks.
Keep your business open without internet
With RingCentral Persist™ you can make sure calls, extension-to-extension dialing, and 911 emergency services for a key set of users are not interrupted.
Global data centers cover every location
No matter where you’re located, we have you covered. With over 15 global data centers and media points of presence, we back up our network around the clock.
24/7/365 end-to-end monitoring
We continuously monitor network performance for key KPIs, with alarms to instantly warn of performance drops.
RingCentral is fully redundant geographically in every location it operates. This is a key differentiator between RingCentral and its competitors.
IDC Logo
Open Mortgage Logo
RingCentral gives us a more diverse risk base and just lets us work from any location, something very important to our company.
James Howard, CTO, Open Mortgage
Let’s find the right solution
for your organization
We’ll have you up and running in no time.

Full name*

Enter a valid full name

Work email*

Enter a valid email address

Business phone number*

Enter a valid phone number

Company name*

Enter a valid company name

Number of employees*

Enter a valid number of employees

Number of employees*

Enter a valid number of employees

Required fields*
By clicking the button above, you consent to receiving calls and emails from RingCentral. Calls may be connected using automated technology.
Thank you for your interest in RingCentral
A sales advisor will contact you within 24 hours. If you'd like to speak to someone now, please call (800) 574 5290