Security
Security Checklist

Calling is working to strengthen security on a daily basis to ensure the safety of your business communications.

Here, we will introduce Calling’s approach to security so that you can use it with peace of mind.

We also have a security checklist available, so please use it when deciding whether to introduce Calling.

Download

Security measures

Encrypt all communications

All communications used by Calling are encrypted using TLS encryption.

We take every possible measure to prevent data from being eavesdropped on or tampered with by malicious third parties.

Set password strength freely

When you launch a web conference room with Calling, you must set a password.

Passwords must be at least six characters long, and numbers, letters, and symbols can be used, so users can freely set the strength of their passwords.

Web conference URLs are difficult to guess

When you launch a web conference room with Calling, a room ID is automatically assigned. This room ID is generated by an algorithm, making it difficult for third parties to identify it.

Reliable cloud service

Calling uses Amazon Web Services (AWS) provided by Amazon.

AWS is a highly reliable cloud service with robust security. Cloud Security | AWS

Restricting source IP addresses

Calling can restrict source IP addresses upon request.

Click here for details.

*Calling’s appeal is that you can hold web conferences as long as you have an internet connection. Therefore, as a general rule, we do not recommend restricting source IP addresses.

24/7 monitoring

Calling has strengthened its monitoring system 24/7. We have built a system that allows for rapid recovery in the unlikely event of a failure, so you can use the service with peace of mind at any time.

Frequently asked questions
Security

What kind of security measures do you take?

Calling is operated on a highly reliable cloud service (AWS), and all communications are encrypted. In addition, you can set a password for each room, and you can freely set the strength of that password.

We have a 24/7 monitoring system in place to ensure rapid recovery in the unlikely event of a failure.

Click here to see Calling’s security efforts.

▶ About Calling security

Are there any documents regarding security measures?

We have compiled the security measures that Calling is taking in a document.
You can download the document here.

▶ Security checklist

Can I restrict the IP address from which access is made?

Calling supports IP address restrictions for access sources.
If you want to restrict the IP address from which access is made, please follow the prescribed procedure.
For details, please see here.

▶ Can I restrict the IP address from which access is made? | Support site

Is security assured?

All communications are encrypted.
In addition, you can set a password for each room, so you can limit participants.