Twilio's Communications Applications Receive ISO 27001 Certification
January 24, 2017
By Alicia Young
Web Editor
It seems like every week there is a new advancement in communications. Unfortunately, oftentimes, the easier it is to communicate, the easier it is for security breaches to occur. People can access secure files from anywhere—on their phones, at home, in public places, etc. While this is beneficial in terms of convenience, accessing secure data from anywhere opens that information up to hackers and other threats. That’s why indicators like the ISO 27001 certification exist—to help people decide which solutions are the best for them, based on the products’ security.
The ISO 27001 is one of the most widely recognized and internationally accepted information security standards. It identifies requirements for a comprehensive Information Security Management System (ISMS) and also defines how organizations should manage and handle information in a secure way. Companies that meet these guidelines are awarded the certification, and those looking at solutions provided by the company know that they can safely purchase from them.
Recently, Twilio (News - Alert) received this certification for its own ISMS, which includes people, processes and technology for creating and supporting products that enable developers to add messaging, voice, and video to Web and mobile applications. Twilio received the certification after an independent security firm vouched for its ability to take a systematic approach to managing and protecting company and customer data.
Twilio is happy to have received the certification, and feels confident that customers should trust in its offerings. “Twilio is committed to continuing to build trust through third party security assurances such as ISO 27001,” said Twilio CISO and VP of Trust, Richard Seiersen. “Though Twilio already utilizes ISO 27001 certified hosting providers, software companies building software on top of those platforms are still responsible for demonstrating security and trust. Knowing that a third party has affirmed our security management processes for both our infrastructure and the software we provide is key in furthering the confidence of our existing and prospective customers.”
Edited by Maurice Nagle
Article comments powered by