Use best-in-class solutions for Call Centers by Office24by7.
Streamline communication between your team members.
Get access to the industry-best call patching services.
Gather feedback from your users with our incredible surveys.
Start using the best tools for OTP authentication tools
Encourage your customers to engage with bigger carts.
Generate more leads with the best tools by Office24by7.
Use our pool of tools to boost results from digital marketing.
Leverage the best tools for Omnichannel with Office24by7.
Leverage inbound marketing for growing conversion rates
Office24by7 empowers your websites to generate more leads.
Start boosting inside sales results by streamlining the ops.
Efficient field operations for your team with better communication.
Use best-in-class tools by Office24by7 to close more deals.
Use the best-in-class CRM suite by Office24by7 efficiently
Boost collaboration within your team by using our tools.
Leverage technology to collect and manage debt effectively.
Collect customer feedback and delight them with being proactive.
We at Office24by7 understand the importance of our responsibility to protect and secure your data.
In order to ensure your data and to fulfill the responsibility, we have a system in place in all our
The detailed account of systems has been mentioned hereunder, to give you a glimpse of measures we have
Office24by7 premises in Hyderabad and other cities are in an appropriate physical security.
observed that only authorized personnel have access to office buildings. Full-scale biometric
process of multiple levels configured for employees to gain access. Some of the key and critical
related to servers and all are manned by the security of physical and biometric and have access to
authorized individuals only.
All the documents are stored in foolproof cabinets and accessible to authorized personnel.
premises equipped with CCTV and continuously monitored by authorized security persons. All the visitors
checked and monitored when I the building.
Office24by7 office has uninterrupted power supply 24×7 and additional alternative power
in place to run the function smoothly in case the power supply is disrupted.
All Office24by7 Applications and services are hosted on Amazon Web Services. The databases
applications infrastructure servers are maintained and managed by cloud service providers.
Our approach to security is multi-dimensional where engineering, architecture, deployment
Quality Assurance are taken care to ensure high standards.
Our Applications is protected by Amazon Web Services firewall, which can counter any kind of
regular DDoS attacks any other network breaches. Web Application Firewall constitutes the second layer
protects users, spam and offending IPs.
It is to be noted that the security on any cloud-based products is a responsibility of both
owning company and business associate or partners who own the accounts on the cloud. Hence the
should be accessed by valid-users only. Our products, besides password policies, come with a standard to
secure business data on cloud including the Sales Groups, permission templates, Role-based Access and
Whitelisting of IPs.
We at, Office24by7 use multi-secured model to host al our applications. Our programs are
accurate and bring only the data belonging to the logged in account only. Under no circumstance, a
gets the other customers data. Access to our staff to the applications is also regulated, monitored and
periodical audits are undertaken to ensure safety.
Security testing is a part of our software development cycle, where testing is given equal
importance in the development process. A complete security review is compulsory for application
process at Office24by7.
Our production environment is subjected to a strict and systematic process. From the
to the testing environment, assessing the changes to staging for the production and subsequent
the protocol is strictly adhered to. Entire production deployment is taken care of the development team
and no one else can access the production environs.
A dedicated team monitors 24by7 for the possible attacks and suspicious activities over the
We also conduct third-party audits on a regular basis to asses and certify the state of security of our
Applications and Services.
Offcie24by7 gives high priority to customer data safety and security. We take the managing
all our applications and customer data very seriously.
Our development team doesn’t have any access to production server data. All the changes in
content, infrastructure, and application are documented compulsorily according to a data change process.
The data protection and integrity are taken very seriously at the Office24by7. All the data
encrypted by a standard ASE-256 bit, and the keys are managed by AWS Key Management Service. Other
data is encrypted by a standard FIPS- 140-2 over a fully secured connection for all accounts hosted with
Development and testing are carried out in different environments, and the access to
environs and systems is monitored strictly, based on the necessity to know, appropriate to information
classification with inbuilt segregation and a quarterly review.
We strictly ensure that your data is deleted clearly when your account with us is
detailed have been listed on our terms of service clearly.
At Office24by7 office network is secured by industry-grade superior firewalls and antivirus
same is followed for the network where updates are developed and managed to alert about the intrusions,
threats of incidents. Firewall logs are saved and reviewed on regular basis. Remote access facility is
allowed only through the office network, particularly to the production unit. Remote user’s logins are
audited and reviewed periodically too. Production system access is strictly regulated based on the
multi-factor authentication process.
All our centers where data is stored are hosted in AWS are ISO 27001, SSAE-16 and HIPAA
For Office24by7, customer data protection is of paramount importance, hence we take it
seriously. If anyone
finds any data issues, or shortcomings in the security and safety of data or privacy of Office users,
write to security@Office24by7.com with the details, so we can work to get better of that.
We request you not to share or publish with the third parties any unresolved
of a detailed report, our concerned team attempt to do the following:
Acknowledge the report and respond in a timely manner.
Investigate the issue thoroughly, and give an estimated time frame to solve the
At times, we may ask you to guide us in accurately identifying the issues to figure the
resolve the issues.
After fixing the vulnerability, we inform you
We not only appreciate the help to identify, we would also acknowledge the contributions, if
the threat is resolved.
This program, by default, is in the mode of “Public Nondisclosure”, which means:
“Public disclosure of the Program is not allowed. The vulnerabilities found in the program
released in the public, doing so will be liable for legal penalties.”
We may terminate or modify this program’s terms at any time. The changes we make to this
applied retrospectively. Office24by7 employees and their family members are not eligible for benefits
We encourage people outside our group helps us detecting the security issues and vulnerabilities
platform according to the laid down following guidelines:
Please do write to security@Office24by7.com with the details of vulnerabilities and potentials
in our product
if the following criteria is met. We will revert to you in no less than 48 hours.
Please don’t do security testing in the existing customer accounts.
Doing any tests shouldn’t violate any privacy policies and disrupt production servers. Also,
ensure to not to
delete or modify unauthenticated user data or degrade the experience.
If the vulnerability you found is valid, we would be glad to acknowledge the same in our hall of
exclude the following test cases while conducting your tests:
Denial of Service attacks and Distributed Denial of Service attacks
Rate limiting, brute force attack
Missing HTTP security headers and cookie flags on insensitive cookies
Clickjacking / UI Redressing attack
Self-XSS and XSS that affects only outdated browsers
Host header and banner grabbing issues
Automated tool scan reports. Example: Web, SSL/TLS Scan, Nmap scan results etc.,
Login/logout/low-business impact CSRF
Unrestricted file uploads
Open redirects – unless they can be used for actively stealing tokens
User enumeration such as User email, User ID etc.,
Session fixation and session timeout
Phishing / Spam (including issues related to SPF/DKIM/DMARC)
We sincerely thank the following individuals for their voluntary and responsible disclosures of security
vulnerabilities in office24by7 platform. This helped us to plug the issues and serve our customers
Industry-best Office Automation Crafted with incredible expertise and powered with