If you ask our customers why they use Spectralink DECT products, you will probably get similar answers:
- Our DECT products are flexible—with the highest level of unified communications interoperability on the market. In addition, they are always ready for the way you prefer to communicate – whether with Skype for Business, Cisco UCM, Cisco Broadsoft or another platform of your choice.
- Our DECT products are easy to set up and manage. Right now, we’re working on a platform that will give you complete visibility and control of communication across all your sites – no matter where you are.
However, what users rarely mention is just how secure our products are. Why? When your data is as secure as it is with Spectralink’s DECT solutions, it’s easy to take that security for granted. To us, that’s an enormous complement. If you don’t even have to think about security, we know we’ve done our jobs.
Still, security is an important topic to consider in any technology deployment. If you’re considering in-building wireless handsets for your business, keep reading to learn how DECT technology protects organisations in a wide variety of industries from security threats.
DECT Security Helps Prevent Threats
With DECT solutions, you don’t have to worry about the security of your handsets—we’ve taken care of that for you. DECT (Digital Enhanced Cordless Telecommunications) security is the highest standard of security in communications. Spectralink is proud to meet these standards through our use of three secure technologies:
- The first technology is DECT Standard Authentication Algorithm (DSAA). This ensures that when a device connects to your DECT frequency, it’s authenticated. If a device cannot be authenticated, the device is blocked.
- The second technology is DECT Standard Cipher (DSC). This encrypts communications between handsets, servers, and base stations.
- Finally, Spectralink is now certified to DECT Security Step A – the DECT forum approved standards for authenticated, encrypted, secure communication using a encryption key that gets renewed every 120 seconds. So even if a hacker tries to access your frequency, they have only a very small window of opportunity. It keeps them out before they can get in.
You’ll find the vast majority of our Spectralink DECT handset, every IP server, and every IP DECT Base Station (like Wi-Fi has access points – DECT has Base Stations) is DECT security certified.
The following are just a few practical examples of the types of thefts, hacks, and accidents our DECT products prevent every day.
1. Protect Enterprise Customer Data from Theft
The security of DECT phones protects sensitive customer data from theft. For example, in the finance industry, customers and clients are on the phone most of the day, sharing their private financial details and personal data. If even something as simple as their phone number leaked, it could ruin your organization’s credibility with that client.
For example, let’s say an employee leaves a handset on their desk to go to a meeting. While they are away, someone takes the handset, accesses the phone records and client list, and steals financial secrets from your organisation.
Unlike other handsets, this scenario is not possible with Spectralink’s DECT products. When you set down one of our DECT handsets, it locks automatically, requiring a secure PIN next time you or anyone else wants to use it (except to make an emergency call). Everything on that handset – sensitive organisation and customer data – is protected.
2. Securely Share Data within Your Network
In the retail industry, employees throughout the store and across store locations deal with customer data—from home addresses to credit card numbers—all day long. This data may be shared throughout your network, among departments, and maybe even between stores to enable a seamless and positive customer experience. Customer data is valuable, not just to your business but also to hackers—from whom retail establishments are a frequent target.
Spectralink base stations and servers are DECT certified to protect your valuable customer data. Our equipment operates on their own dedicated frequency spectrum and thus are protected from radio interferences from wi-fi and Bluetooth. Furthermore, once configured, the Spectralink base stations and servers can be blocked – making them invisible to unauthorised devices – and your system and data are hidden from opportunists or hackers.
If you use cloud-based UC platforms, you can see our competitors rush to raise their own security standards, like Transport Layer Security (TLS) 1.2 – now a mandatory requirement to connect. Meanwhile, we can say that we have been there already – for years – and have recently upgraded our portfolio to TLS 1.3 – the highest security level in the industry.
3. Keep Your Employees Safe
Finally, in manufacturing, communication and collaboration are critical. Equally important is the physical safety of employees throughout the factory, distribution centre, or warehouse. For example, employees that work with heavy equipment and machinery—and those that work alone during off hours—need to feel safe and secure in case of accidents – and businesses need to provide “Duty of Care” for these lone workers.
To solve this challenge, Spectralink’s DECT handsets use a built-in accelerometer to detect physical trauma. For example, if a worker falls or is hurt and their handset falls with them, the movement can trigger an alert and share the handset location with an available colleague, or to a connected application server —so you can quickly get an alert, identify what happened, and send help where it’s needed most.
Visit our website to learn more about securing your organisation, your communications, and your customers.
- Enterprise Mobility Total Cost of Ownership (TCO): 5 Things to Consider - August 12, 2020
- Smart, Swift, Safe: Mobility Solutions Revolutionize Manufacturing - July 30, 2020
- Transform Your IP-DECT System with UCaaS Integration - July 20, 2020