8x8 Jitsi as a Service: built with security in mind
Choosing the right partner is essential
Supported by 8x8’s strong security culture, highly trained security experts, and robust hacker-powered security programs, all 8x8 products, including JaaS, have security and compliance baked into them from start to finish.
8x8 employs the best practices of the Security by Design approach to proactively identify, mitigate, and protect against security threats at all times.
Stringent security specifications for the handling and storage of customer data, including fraud detection and secure endpoint provisioning.
Verification from recognized third-party certifications for security and compliance, including HIPAA, FISMA, FCC, and CSA.
Proactive monitoring and vulnerability management allows us to maintain good security hygiene and reduce the impact of exploitation.
Physical and digital infrastructure security ensures that everything from our data centers to our cloud networks and IT equipment are safeguarded.
Learn more about the security of 8x8’s Embeddable Communications and APIs.