Story image

Polycom bumps up information security; becomes ISO certified

19 Apr 2017

Polycom has bumped up its information security practices and achieved the ISO/IEC 27001:2013 certification for its Information Security Management System (ISMS).

The company’s senior manager for corporate communications posted an interview with CISO Lucia Milica Turpin, outlining how the new certification will impact customer and its own security.

According to Polycom, the ISO/IEC 27001 is an accepted international standard for information security best practices. It also helps organisations implement a systematic and proactive approach to managing security risks.

Turpin says the certification is important to both the company and its customers. 

“It will assist us in providing assurance to existing and potential clients that Polycom has established and implemented best-practice information security processes (covering people, processes, and technology) to safeguard the company’s internal/confidential data, intellectual property, and customer information,” Turpin says.

Polycom went through the compliance audit, which included a thorough review and tests of the Polycom ISMS. The system holds ‘important’ employee and customer data.

According to the company, the tests validated administrative, technical and physical security controls that help to maintain security.

In the blog post, Turpin says that the certification reinforces Polycom’s commitment to security and provides assurance. 

“Understanding the cybersecurity threats, it is important for providers of Unified Communications and Collaboration Solutions and Services to assure their customers that their data is adequately protected,” Turpin says.

“In addition, this certification is an important foundation for adopting other security standards and frameworks as we go to market with existing and new unified communication and collaboration solutions.”

Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.
How blockchain could help stop video piracy in its tracks
An Australian video tech firm has successfully tested a blockchain trial that could end up being a welcome relief for video creators and the fight against video piracy.
IBM X-Force Red & Qualys introduce automated patching
IBM X-Force Red and Qualys are declaring a war on unpatched systems, and they believe automation is the answer.
Micro Focus acquires Interset to improve predictive analytics
Interset utilises user and entity behavioural analytics (UEBA) and machine learning to give security professionals what they need to execute threat detection analysis.
Raising the stakes: McAfee’s predictions for cybersecurity
Security teams and solutions will have to contend with synergistic threats, increasingly backed by artificial intelligence to avoid detection.
Exclusive: Ping Identity on security risk mitigation
“Effective security controls are measured and defined by the direct mitigation of inherent and residual risk.”