sb-as logo
Story image

Polycom bumps up information security; becomes ISO certified

19 Apr 2017

Polycom has bumped up its information security practices and achieved the ISO/IEC 27001:2013 certification for its Information Security Management System (ISMS).

The company’s senior manager for corporate communications posted an interview with CISO Lucia Milica Turpin, outlining how the new certification will impact customer and its own security.

According to Polycom, the ISO/IEC 27001 is an accepted international standard for information security best practices. It also helps organisations implement a systematic and proactive approach to managing security risks.

Turpin says the certification is important to both the company and its customers. 

“It will assist us in providing assurance to existing and potential clients that Polycom has established and implemented best-practice information security processes (covering people, processes, and technology) to safeguard the company’s internal/confidential data, intellectual property, and customer information,” Turpin says.

Polycom went through the compliance audit, which included a thorough review and tests of the Polycom ISMS. The system holds ‘important’ employee and customer data.

According to the company, the tests validated administrative, technical and physical security controls that help to maintain security.

In the blog post, Turpin says that the certification reinforces Polycom’s commitment to security and provides assurance. 

“Understanding the cybersecurity threats, it is important for providers of Unified Communications and Collaboration Solutions and Services to assure their customers that their data is adequately protected,” Turpin says.

“In addition, this certification is an important foundation for adopting other security standards and frameworks as we go to market with existing and new unified communication and collaboration solutions.”

Story image
Shlayer malware proves Apple devices aren't as secure as you think
"Apple never talks about malware publicly, and loves to give the impression that its systems are secure. Unfortunately, the opposite has been proven to be the case with great regularity."More
Story image
75% of IT execs 'worried' about being targeted in cyber-attack
A new report from ConnectWise has shed light on the widespread concern about cyber-attacks, with 91% of SMB executives considering a move to an MSP if it provided the 'right' solution.More
Story image
Jamf extends Microsoft collaboration with iOS Device Compliance
Organisations will soon be able to use Jamf for Apple ecosystem management while using Azure Active Directory and Microsoft Endpoint manager to maintain conditional access.More
Story image
CrowdStrike integrates with ServiceNow program to bolster incident response
As part of the move, users can now integrate device data from the CrowdStrike Falcon platform into their incident response process, allowing for the improvement of both the security and IT operation outcomes.More
Story image
Kaspersky finds red tape biggest barrier against cybersecurity initiatives
The most common obstacles that inhibit or delay the implementation of industrial cybersecurity projects include the inability to stop production (34%), and bureaucratic steps, such as a lengthy approval process (31%) and having too many decision-makers (23%). More
Story image
Average cost of insider attack $2 million - Bitglass
A report has found 61% of companies had an insider attack in past year.More