Security by Design
Security is a foundational principle of the platform. Controls are embedded from architecture through to operations to support carriers, service providers and CPaaS platforms operating in regulated telecom environments. The platform is designed to protect the confidentiality, integrity and availability of number inventory data while supporting scalable global deployments.
Platform Security Architecture
The platform is architected as a secure orchestration layer integrating with carrier and supplier systems through controlled interfaces. Security controls are applied consistently to govern access, data handling and operational activity. The architecture supports data segregation, controlled access and secure integration within complex enterprise environments.
Access Control and Governance
Access is governed through role-based controls, ensuring users can only perform actions aligned with their responsibilities. Granular permissions support separation of duties across operational, regulatory and commercial teams. All access and lifecycle actions are logged to provide a clear, auditable record of activity.
Data Protection and Integrity
Industry-standard security practices protect data throughout its lifecycle. Data is encrypted in transit and at rest, with controls to prevent unauthorised access, modification or disclosure. Structured data models and validation controls ensure the integrity and consistency of number inventory records across integrated systems.
Auditability and Compliance Support
Comprehensive audit trails are maintained across number lifecycle events, user actions and system interactions. These capabilities support regulatory reporting, internal governance and operational review, enabling organisations to demonstrate compliance across applicable jurisdictions.
Operational Security
The platform is operated using security-focused practices aligned to enterprise and carrier-grade requirements. This includes controlled change management, continuous monitoring and proactive management of operational risk to support service continuity.
Shared Responsibility Model
Security operates under a shared responsibility model. The platform provider is responsible for platform, infrastructure and core service security, while customers retain control over user access, internal processes and the secure use of integrated systems. This approach provides clear accountability across operational boundaries.
Security in Practice
Security requirements are addressed throughout deployment and ongoing operation. As part of onboarding and integration, requirements are reviewed to ensure alignment with customer policies, regulatory obligations and operational expectations.
Learn More
For further details on platform architecture, integration models and governance controls, refer to the Platform and Solutions sections or contact the team to discuss specific security requirements.