Security

Enterprise-grade security

Your communications are protected with industry-leading security standards. End-to-end encryption, compliance certifications, and enterprise-grade infrastructure keep your data safe.

Get started
Enterprise-grade security

End-to-End Encryption

All voice calls are protected using SRTP (Secure Real-time Transport Protocol), which provides military-grade encryption for audio streams. SRTP ensures that your voice communications are encrypted from the moment they leave your device until they reach the recipient, preventing any interception or eavesdropping during transmission.

For all data transmission, including SMS messages, API calls, and web traffic, we use TLS 1.3 encryption—the latest and most secure version of the Transport Layer Security protocol. TLS 1.3 provides perfect forward secrecy, meaning that even if encryption keys are compromised in the future, past communications remain secure. This ensures that your data cannot be decrypted retroactively, providing an additional layer of protection for sensitive information.

All data at rest is encrypted using AES-256 encryption, the same standard used by banks and government agencies. This means that even if physical storage is compromised, your data remains unreadable without the proper decryption keys, which are managed through a secure key management system with automatic rotation.

Compliance & Certifications

We maintain SOC 2 Type II certification, which demonstrates our commitment to security, availability, processing integrity, confidentiality, and privacy. This certification requires annual audits by independent third-party auditors who verify that our security controls are not only designed properly but are also operating effectively over time. SOC 2 Type II is considered the gold standard for cloud service providers and is required by many enterprise customers.

Our platform is fully GDPR compliant, meeting all requirements of the European Union's General Data Protection Regulation. This includes the right to data portability, the right to be forgotten, and comprehensive data breach notification procedures. We maintain detailed records of all data processing activities and have implemented privacy by design principles throughout our infrastructure. For healthcare organizations, our platform is HIPAA compatible, allowing you to handle protected health information (PHI) in compliance with Health Insurance Portability and Accountability Act requirements.

We also comply with PCI DSS Level 1 standards for payment processing, ensuring that all financial transactions are handled with the highest level of security. Our compliance framework is continuously updated to meet evolving regulatory requirements across different jurisdictions, helping you maintain compliance regardless of where your business operates.

Secure Authentication & Access Control

Multi-factor authentication (MFA) is available for all user accounts, requiring users to verify their identity through multiple methods before gaining access. This typically includes something you know (password), something you have (authenticator app or SMS code), and optionally something you are (biometric verification). MFA significantly reduces the risk of unauthorized access, even if passwords are compromised.

API access is secured through API keys that can be scoped to specific permissions and rotated automatically or on-demand. Each API key is cryptographically generated and can be restricted to specific IP addresses, time windows, or rate limits. We support OAuth 2.0 and JWT tokens for programmatic access, allowing you to implement secure integrations with your existing systems.

Role-based access control (RBAC) allows you to define granular permissions for different users and teams. You can create custom roles with specific permissions for viewing, creating, modifying, or deleting resources. This ensures that users only have access to the data and functions they need for their role, following the principle of least privilege. All access attempts are logged and can be monitored in real-time through our security dashboard.

Audit Logs & Security Monitoring

We maintain comprehensive audit logs for all activities across the platform, including API calls, authentication events, configuration changes, data access, and administrative actions. These logs are immutable, meaning they cannot be altered or deleted, ensuring a complete and tamper-proof record of all system activities. Logs are encrypted and stored in geographically distributed data centers with automatic backups.

Real-time security monitoring and alerting systems continuously analyze system behavior to detect anomalies, potential security threats, or unauthorized access attempts. Our security operations center (SOC) uses machine learning algorithms to identify patterns that may indicate security incidents, such as unusual login patterns, unexpected API usage, or potential data exfiltration attempts. When threats are detected, automated alerts are sent to our security team and, if configured, to your designated security contacts.

Security dashboards provide visibility into your security posture, showing metrics such as failed authentication attempts, API usage patterns, and compliance status. You can configure custom alerts for specific events, such as access from new IP addresses or unusual call volumes. All security events are correlated and analyzed to provide context and help identify potential attack vectors before they can cause damage.

Infrastructure

Built on secure infrastructure

Our platform leverages enterprise-grade security infrastructure that powers some of the world's most trusted communication services. This infrastructure is built on a globally distributed network of data centers that meet the highest standards for physical security, including biometric access controls, 24/7 security monitoring, and redundant power and cooling systems. Each data center is certified to meet SOC 2, ISO 27001, and other industry security standards.

All data is encrypted in transit using TLS 1.3 and at rest using AES-256 encryption. Our network infrastructure uses redundant systems and automatic failover mechanisms to ensure 99.99% uptime and continuous protection. We employ distributed denial-of-service (DDoS) protection at multiple layers, including network-level and application-level defenses that can automatically scale to handle even the largest attacks without impacting service availability.

Our infrastructure is designed with defense in depth, meaning multiple layers of security controls protect your data. Network segmentation isolates different components of our system, preventing lateral movement in the event of a security breach. Intrusion detection and prevention systems monitor network traffic in real-time, automatically blocking suspicious activity. Regular penetration testing and vulnerability assessments are conducted by independent security firms to identify and remediate potential weaknesses before they can be exploited.

Data backup and disaster recovery procedures ensure that your data is protected against loss. We maintain encrypted backups in geographically separate locations, with automated backup verification and regular disaster recovery drills. Our recovery time objective (RTO) and recovery point objective (RPO) are designed to minimize data loss and service interruption in the event of a catastrophic failure.

Compliance

Meet regulatory requirements

We maintain SOC 2 Type II certification, which requires annual audits by independent third-party auditors who verify that our security controls are operating effectively. This certification covers five trust service criteria: security, availability, processing integrity, confidentiality, and privacy. Our SOC 2 report is available to enterprise customers upon request and demonstrates our commitment to maintaining the highest security standards.

Our GDPR compliance ensures that we meet all requirements of the European Union's General Data Protection Regulation. This includes implementing data protection by design and by default, maintaining detailed records of processing activities, and providing tools for data subjects to exercise their rights, including the right to access, rectify, erase, and port their data. We have appointed a Data Protection Officer (DPO) and maintain a comprehensive privacy policy that clearly explains how we process personal data.

For healthcare organizations, our platform is HIPAA compatible, allowing you to handle protected health information (PHI) in compliance with Health Insurance Portability and Accountability Act requirements. We sign Business Associate Agreements (BAAs) with healthcare customers and implement additional safeguards required for HIPAA compliance, including enhanced access controls, audit logging, and data encryption. Our infrastructure supports HIPAA's requirements for administrative, physical, and technical safeguards.

We also comply with PCI DSS Level 1 standards for payment processing, ensuring that all credit card transactions are handled with the highest level of security. Our payment processing is handled through certified PCI-compliant payment processors, and we never store full credit card numbers on our servers. For international customers, we maintain compliance with local data protection regulations, including Canada's PIPEDA, Australia's Privacy Act, and other regional requirements.

Our security practices are regularly audited and verified by third-party security firms, including annual penetration testing, vulnerability assessments, and code security reviews. We participate in responsible disclosure programs and maintain a security bug bounty program to encourage security researchers to report vulnerabilities. All identified security issues are promptly addressed according to our security incident response procedures, and critical vulnerabilities are patched within 24 hours of discovery.

Enterprise Security & Compliance | Comza