Ensure internal and cross-company communications remain secure and compliant with Symphony's unique customer-owned key infrastructure and Admin Portal.
State-of-the-art encryption with customer-owned keys keeps your data safe, whether communicating within an organization or across enterprises.
Establish information barriers, create expression filters, assign entitlements, monitor rooms, and export content into regulatory record archives via Symphony’s Admin Portal.
At Symphony, we understand the importance of an independent opinion, especially for something as important as security & compliance.
Symphony holds a number of independent certifications over our security and privacy controls, and bases its security program on NIST and ISO standards.
Security is at the core of our collaboration platform.
We architected security into Symphony from the ground-up. We pioneered end-to-end encryption in our enterprise-class cloud-based collaboration service to keep your data secure in the cloud. We encrypt your content as soon as the user presses send, and never decrypt it until it reaches the intended recipients. With the Symphony Enterprise offer, we give you full physical and exclusive control of encryption keys – thereby ensuring that neither Symphony nor hackers can decrypt your content.
We have rigorous security policies that are informed by ISO 27001. Our dedicated security team and independent third parties evaluate and test the security of our service. We conduct thorough vulnerability scanning and harden our systems with penetration testing. Certifications such as SOC 3 and SOC 2 Type II demonstrate our robust security controls.
Our enterprise-class Administration and Compliance Portal provides granular controls for deploying and managing security capabilities such as Single Sign-On, Mobile Device Management (MDM), two-factor authentication and more. Symphony interoperates with third-party MDM solutions. The Administration and Compliance Portal also provides capabilities to export content for archiving and e-discovery.
With Symphony, you get end-to-end security that is architected into the service from the ground-up, not painted on as an afterthought.
Competing cloud-based collaboration platforms have gaps in encryption. They encrypt data at rest and in motion. But this is not end-to-end encryption. Your data is repeatedly decrypted in the cloud, which exposes the data to service providers and potentially to hackers. Once decrypted, your data can be scraped, shared, used or hacked.
The Symphony Enterprise offer provides end-to-end encryption which helps alleviate these issues:
Some other collaboration tool providers equate BYOK and customer-controlled key management solutions with end-to-end encryption. But this is not the real story, and still leaves a large security concern. BYOK solutions provide customers the ability to use their keys for encryption. However, the customers are required to load the keys to the cloud. The solution provider uses the keys to decrypt messages and files on cloud servers at runtime for processing. This typically exposes the messages and files in clear text in the cloud, making them more prone to hacking.
Symphony offers true end-to-end encryption in that our enterprise customers have full, physical and exclusive access to keys. We do not decrypt objects on cloud servers. The keys are not only created by the customers but remain entirely in the hands of the customers. So, even if the cloud service is breached, the keys remain safe because they aren't even in the cloud.
No. Symphony has developed a unique encrypted search solution that ensures your data remains encrypted for executing search queries.
Yes. Symphony’s end-to-end encryption model works for our desktop, browser and mobile clients.
The information that your company’s employees post in Symphony generally belongs to your company. Your administrators can export data for archiving at any time with the Content Export feature available in Symphony Administration and Compliance Portal.
Yes. Symphony has SOC 2 Type II and SOC 3 certifications.