Connect your employees to your customers across the channels they use most.
Find a cloud that’s flexible, secure, and entirely dedicated to your organization.
Rely on our team of experts to help you get the most from your investment.
Serve customers better with employee experiences that boost productivity and collaboration.
Call, meet, message, and more—all in one app.
Connect people, tasks, tools, and more in a customizable app built for immersive collaboration.
Automate and personalize business processes with prebuilt or customized apps.
Explore our complete portfolio of devices for individuals and conference rooms.
Start a monthly subscription to productivity-enhancing Avaya devices.
Deliver effortless experiences for customers and employees at every touchpoint.
Help your contact center run smoothly, no matter where your employees are.
Find an Authorized Avaya Channel Partner in your part of the world.
Build new, innovative communications solutions via Avaya’s open solution platforms.
See our partnerships with leading technology companies for unique and value-adding solutions.
Explore all of the partner types and programs available at Avaya
Sell the Avaya portfolio with benefits, incentives, lead gen, training, and marketing resources.
Transition customers to the cloud fast and on budget, supported by Avaya services and features.
Get to know Avaya through our blogs. Insights on collaboration, customer experience, AI, digital.
Watch videos by topic or just browse what’s new. Interviews, solutions, how-to’s, more.
See inspiring ways companies are using Avaya solutions to change the world of work.
Look at what's new in our world—and how it benefits yours.
Listen in on conversations with tech innovators who are transforming the experience economy.
Learn about the privacy, compliance, and security inside Avaya solutions.
Review the terms and policies associated with Avaya software and services.
Access a full range of information and assistance for your Avaya solution.
Meet Avaya experts at our events, webinars, expos, conferences and more.
Engage with us in an immersive and interactive experience—on site, virtually, or a combo.
In person or online, gain a full understanding of your Avaya solution and its capabilities.
Avaya Trust Center
Meet business-critical mandates with communications that are secure, compliant, and accredited by major regulatory bodies.
Avaya prioritizes security across its infrastructure, from data centers to digital services, enabling you to protect sensitive and private data. Extensive, proven, scalable security capabilities are built into every Avaya enterprise product and cloud solution. In addition, Avaya cloud solutions include specific capabilities for security, business continuity, and quality controls.
Avaya Portfolio Security
Keeping our customers’ data secure is a primary requirement in product development.
Avaya Cloud Security
Learn how we meet the unique needs for securing data in our cloud-based solutions.
Avaya recognizes that cloud solution security is a primary customer concern. The Avaya Cloud Public Security Playbook illustrates our:
The supported access control methods are:
Multi-tenant RBAC provides fine-grained access management of Contact Center resources. Using RBAC, a customer may segregate duties within your organization and grant only the amount of access to users and applications that they need to perform their roles. Between you the Customer and Avaya the Provider, we employ Segregation of Duties (SoD) as a security strategy and to maintain compliance regulations.
Avaya OneCloud solutions provide RBAC for granular control of users. The Admin Center uses a unique account ID across all APIs, events, and data to prevent unauthorized access to the data of a customer. These roles are pre-configured or built-in to cover different job functions related to administration and contact center operations. You can define permissions on the protected resources and map these permissions to built-in roles during installation. The built-in roles are:
Yes, however, the list of IP addresses may change over time as per Azure range assignments for various cloud components and regions. Inbound traffic through public APIs and Admin panels can be restricted at Avaya OneCloud solution level.
Avaya Cloud solutions use encryption to protect all data in transit and at rest. Data in transit uses Transport Layer Security (TLS) version 1.2+. The Cloud platform complies to Federal Information Processing Standards (FIPS) 140-2 and National Institute of Standards and Technology (NIST) standards to underpin our security protocols, standards, and encryption practices. Key Vault Technology is used to maintain trust and to ensure the security and integrity of:
We proactively identify and monitor threats utilizing User and Entity Behavior Analytics (UEBA) to detect:
Our partners, security teams, and tools continuously monitor and isolate threats in real-time via operational proactive response 24x7x365 and incident handling processes.
To maintain security and to ensure trust and integrity, we maintain security change audit logging of our entire Cloud real estate:
• Restricting change via pipeline and maintaining:
• Active audit trail
• Activity logs
• Audit reports
• Diagnostic services, logs, and metrics (such as key vault audit)
• Network Security Group (NSG) flow logs and event logs
• Cloud monitoring, Cloud network watching, and Cloud real-time scanning
• Audit data retention and archiving to meet sovereignty and regulatory processes
• Retention period for monitor logs is 365 days and we can configure with a maximum of two years
Support for Avaya Cloud solutions is based on ITIL®️ processes, including service desk, service management, incident management, problem management, and change management.
For Avaya Cloud solutions, customers receive an email with details of the updates being applied to the environment through the standard notification processes for all planned maintenance and emergency changes.
Avaya enables the export of audit trace logs to integrate a customer SIEM. RWS admin can download application configuration change logs, Product activity and resource logs aren't exportable, and the retention period is 90 days, but it is configurable.
Yes. Systems are scanned with Qualys and patched according to Avaya’s vulnerability and patch management security standard. Avaya conducts vulnerability assessment and penetration testing on a regular cadence to maintain targeted regulatory compliances. Please note: Avaya doesn’t allow our customers to conduct vulnerability assessment and penetrating testing on Avaya Cloud Public platforms.