Ensure internal and cross-company communications remain secure and compliant with Symphony's unique customer-owned key infrastructure and Admin Portal.
State-of-the-art encryption with customer-owned keys keeps your data safe, whether communicating within an organization or across enterprises.
Establish information barriers, create expression filters, assign entitlements, monitor rooms, and export content into regulatory record archives via Symphony’s Admin Portal.
At Symphony, we understand the importance of an independent opinion, especially for something as important as security & compliance.
Symphony holds a number of independent certifications over our security and privacy controls, and bases its security program on NIST and ISO standards.
View our GDPR Whitepaper for information about Symphony’s strategy for complying with the EU General Data Protection Regulation.
Now that continuous attacks against critical information have become the norm, securing collaboration environments should become standard.
Richard Steinnon, IT-Harvest
Security is at the core of our collaboration platform.
We architected security into Symphony from the ground-up. We pioneered end-to-end encryption in our enterprise-class cloud-based collaboration service to keep your data secure in the cloud. We encrypt your content as soon as the user presses send, and never decrypt it until it reaches the intended recipients. With the Symphony Enterprise offer, we give you full physical and exclusive control of encryption keys – thereby ensuring that neither Symphony nor hackers can decrypt your content.
We have rigorous security policies that are informed by ISO 27001. Our dedicated security team and independent third parties evaluate and test the security of our service. We conduct thorough vulnerability scanning and harden our systems with penetration testing. Certifications such as SOC 3 Type II and SOC 2 Type II demonstrate our robust security controls.
Our enterprise-class Administration and Compliance Portal provides granular controls for deploying and managing security capabilities such as Single Sign-On, Mobile Device Management (MDM), two-factor authentication and more. Symphony interoperates with third-party MDM solutions. The Administration and Compliance Portal also provides capabilities to export content for archiving and e-discovery.
With Symphony, you get end-to-end security that is architected into the service from the ground-up, not painted on as an afterthought.
Competing cloud-based collaboration platforms have gaps in encryption. They encrypt data at rest and in motion. But this is not end-to-end encryption. Your data is repeatedly decrypted in the cloud, which exposes the data to service providers and potentially to hackers. Once decrypted, your data can be scraped, shared, used or hacked.
Bring-Your-Own-Key solutions are inadequate – you lack exclusive possession of keys, and your data can be decrypted in the cloud.
The Symphony Enterprise offer provides end-to-end encryption which helps alleviate these issues:
No. Symphony has developed a unique encrypted search solution that ensures your data remains encrypted for executing search queries.
Yes. Symphony’s end-to-end encryption model works for our desktop, browser and mobile clients.
The information that your company’s employees post in Symphony generally belongs to your company. Your administrators can export data for archiving at any time with the Content Export feature available in Symphony Administration and Compliance Portal.
Yes. Symphony has SOC 2 Type II and SOC 3 Type II certifications.