Enterprise Business
  1. Help Center
  2. Enterprise Business

Security and Authentication

CINNOX empowers its users to communicate effortlessly and effectively in a unified platform by dissolving boundaries and connecting consumers globally.

As a powerful cloud-based customer service platform, CINNOX provides businesses with robust calling and messaging capabilities on their websites and APPs; and ultimately creates better engagement between service providers and their consumers.

CINNOX offers a combination of voice and chat functions, allowing you and your customers to talk and chat on a single multi-channel platform. Using CINNOX's mobile web browser or application, your agents can continue to support your customers anywhere and at any time.
Equally important to providing effective communication, CINNOX also embraces security as a serious matter to consider. Protecting your data beyond the industry standard is one of our top priorities.

We have extensive years of experience providing satisfactory services for big and small businesses; including Fortune 500 companies.

We are proud that we have not only reached but have exceeded their requirements and expectations. This is proven by the certificates we have obtained within the telecommunications field.

Below are some features of our security system.

Infrastructure

IT infrastructure is the foundation of CINNOX’s services. A robust IT service is dependant on robust IT infrastructure.

Our IT infrastructure consists of:

  • Capacity Planning
  • Availability Planning
  • Continuity Planning
  • Security Planning
  • Business Growth Planning

We build our IT infrastructure with careful technical planning and business planning to ensure it fulfils industry standards and business needs.

Our network equipment is located in multiple dedicated data centres. These data centres house switches, servers, and network equipment that distribute our services. CINNOX's Data Centers are ISO 27001 and ISO 9000 compliant.

CINNOX also uses multiple public clouds for better service. These tier-1 data centres are all applied to local compliance.

Firewall Compatibility

CINNOX uses multiple standard protocols for exchanging messages and calls. These protocols are known as firewalls.

We are using well-known ports to prevent any blockage of firewalls or proxies. Calls are starting via HTTPS (port 443) protocol SIP to exchange source and destination numbers. As soon as calls are connected, the media exchange on UDP 10000-50000 (DTLS-SRTP).

The exchange of messages is done through a WebSocket via HTTPS (port 443).

 
Client Security

Each of our customers owns a unique domain and service ID. After visitors click on the widget button, we make a unique ID for each visitor related to the same domain. An authorisation is only done once, causing your visitors to be identified the next time they visit your website. However, the integrity of the visitor is defined and is checked every time they revisit your website.

Since customer’s browsers can be used to hijack customer data, we implemented a high-security mechanism to mitigate this risk. A unique token that expires soon after once-off use is generated for the customer each time they visit your website. We use local storage to prevent session hijack.

Security capabilities:

  • Cross-region identification
  • Secure encryption
  • Secure authentication
    • Multi-factor authentication
    • Access control by IP or number for agent and visitor
    • Password policy
    • Integrate with third-party authentication systems (oAuth 2)
  • Audit log
  • Data retention
  • Customised roles and permissions
  • Private and public rooms
  • Security setting to make a change for boundaries, like Call Per Minute or Message Per Minute (Advanced Throttling System)
  • AI calls fraud detection and blocking
  • Free DDoS prevention system

Protected agent/admin area: The control panel area is protected by username and password, and it has a login attempt limitation. It is designed to allow the administrator to define the password policy (password history, password age, and lockout threshold). Administrator and agent are carefully created and can only be customised for an administrator.

The administrator can also allow or block visitors/agents' access from a specific IP or number.

Room security: After visitors or agents create a new room, the following security steps are checked:

  • Check if the visitor is spam or not
  • Create an encrypted room and notify agent on a secure channel
  • Encrypt messages and calls during the conversation
  • Prevent the sending of a lot of messages and enquiries for spamming purposes (Rate limit)
  • Data encryption in transit (Using TLSv1.3 – Grade A+ from SSL Labs’ tests)
  • Data encryption at rest with key rotation feature
  • Unique room ID with pre-defined participants

Call security: CINNOX uses the standards-based VoIP (Voice-Over-Internet-Protocol) to deliver high-quality calls.

Features:

  • High quality/reliable codec with HD to lowest bandwidth consummation (Opus) which supports other codecs as backup
  • AES-256 bit TLS1.3 encryption (with supporting TLS 1.2) – Grade A+ from SSL Labs’ tests
  • Media encryption (DTLS-SRTP)
  • Data encryption at rest to protect data
  • Fraud detection and prevention
  • Using global blacklist numbers to prevent spam
  • Using unique EID for source and destination number to prevent
  • Generating unique temporary SIP (Session Initiation Protocol) account with AES 256 bit encryption token
Admin Controls

Administrators can assign different roles to the accounts under their control.

Some security capabilities:

  • Create a staff account with a designated role
  • Customised role and permission
    • Ability to create multiple companies
    • Ability to create multiple departments
    • Ability to assign a different role to a different department
  • Suspend the account
  • Mandatory multi-factor authentication
    • Enforce staff members to enable multi-factor authentication before they can log in
  • Monitor staff members usage
  • Check and audit billing reports for each staff member
  • Read-only audit trail for every single change
    • Export feature to import to SIEM
Built-in Security Features

CINNOX has extensive years of experience in successfully defending customers from thousands of hackers. CINNOX has security features implemented in your account. You can customise these features by contacting our support staff.

These features include:

  • Login blockage after several failed attempts
  • A limit to the number of enquiries a visitor can make
  • A limit to the number of messages a visitor can send
  • Detecting fraudulent calls and rejecting them by default
  • Rejecting requests from hostel’s IP addresses
  • Multi-region spam detection 
SIEM & SOC

SIEM tools are an essential part of the data security ecosystem: they aggregate logs from multiple systems and analyse them to catch abnormal behaviour or potential cyberattacks. A key focus is to monitor and help manage user and service privileges, directory services, and other system-configuration changes and provide log auditing and review and incident response.

The benefits of SIEM in CINNOX is to identify attackers or hackers who try to access our platform. We trace the hackers from the first access until we block them on different platforms.

Session Border Controller