Chat with us, powered by LiveChat

Get Started for Free

Be Effective, Be Smart, Start Now.

.iriscrm.com


Contact CRMDialer Sales

We'd love to learn about your business and show you how we can help it grow!

CRMDialer Security

  • CRMDialer meets the most extensive compliance standards
  • CRMDialer utilizes Amazon's top-tier secure cloud services
  • CRMDialer's platform and infrastructure undergo routine pen-tests and are monitored continuously by dedicated teams
  • CRMDialer complies with data privacy standards outlined by our agreements

An Industry Standard

CRMDialer is the All-In-One Power Dialer CRM pioneer. CRMDialer’s platform is used by businesses spanning all industries, platforms and sizes.

PCI Compliance

CRMDialer is audited on an annual basis and holds a PCI Level 1 Service Provider designation.

Hosting and Infrastructure

Security is a top concern for organizations that leverage Software-as-a-Service (SaaS). CRMDialer’s Software-as-a-Service (SaaS) solution is provided as a hosted cloud application utilizing top-tier secure cloud services provided by Amazon. Application architecture and the data model are designed to ensure correct data segregation.

Penetration Tests and Monitoring

CRMDialer’s front and back-end applications, as well as its IT infrastructure undergo routine annual pen-tests by independent companies. This is done in addition to Amazon AWS’s own independent tests, periodic internal tests, and 27/4 monitoring of security-related events by dedicated teams.

Privacy

Data Privacy

The information that CRMDialer collects concerning each User is called User Data. In general terms, CRMDialer will collect most of the information relevant to the operation of your business, such as your: name, address, company name, credit card information, bank account information, DBAs, logos, email addresses, telephone numbers, recordings of telephone calls, User IP addresses, integration credentials, other credentials, agent names, agent addresses, agent telephone numbers, agent email addresses, agent pricing, agent CRMDialer preferences, applications, forms, customer pricing, customer names, customer addresses, customer phone numbers, customer email addresses, reporting preferences, User patterns of activity and such other information that Users may elect to input into CRMDialer.

Operations and Access Control

Service Models

CRMDialer’s typical SaaS model is set up on Amazon Web Services (AWS), with management servers located on Amazon EC2, and storage divided between Amazon RDS for secure data, and Amazon S3 for published content for fast download rates.

Monitoring & Auditing - Intrusion Prevention and Detection

CRMDialer has an extensive Security Information and Event Management system (SIEM), that collects security audit trail logs across infrastructure components in industry standard formats using an Intrusion Detection System and for analysis and control.

CRMDialer’s SIEM alerts are based on comprehensive pre-defined scenarios, including identification of suspicious signs such as failed login attempts, logins from unknown and off-premise IP addresses or logins during off-hours.

SIEM alerts are monitored 24/7 by CRMDialer’s Dev Ops team. The SIEM prioritizes all alerts, notifies CRMDialer’s Security team in real time and escalates them according to severity.

Access Control - User Management and Permissions

CRMDialer’s platform has an integrated, comprehensive role-based user management and enforcement system.

Assigning roles to users requires authorization from the relevant parties in CRMDialer, and application permissions are granularly controlled per action and screen. Default roles are built into the platform, including: administrator, manager, sales rep, referral partner, customer, etc. CRMDialer allows customers to delegate usage and administrative permissions for the components and GUI elements deployed by CRMDialer, while maintaining central management of the entire deployment cycle.

CRMDialer’s internal corporate access control is centrally and manually managed based on strict need-to know and least-privileged principles on all levels: Application (strong authentication), Network (segmentation, firewall), OS (access to servers), and Procedural (who’s authorized to review/approve code, manage changes, etc.).

All internal duties within CRMDialer are segregated based on duties between R&D (code development), Dev Ops (deployment) and Support (client services).

Conclusion


As the sales and customer support CRM market leader, backed with an uncompromising commitment to security and privacy, CRMDialer is trusted by thousands of users, including public organizations. CRMDialer makes sure to comply with legal, corporate and industry standards, maintaining and abiding by the strictest requirements, regulations and security measures at all levels – from its staff, through infrastructure and down to the finest details of its products and procedures.

CRMDialer has received the most demanding certification in the industry, and offers its customers the ability to enforce hierarchy and access permissions internally, while providing an overarching security umbrella – hosting CRMDialer’s infrastructure with the top-tier cloud provider, actively monitoring customer security 24/7, and performing periodic independent pen-tests on CRMDialer’s platform and IT infrastructure.