Secure and Private VoIP Communications

We believe our VoIP platform is the most secure available and we have studied all regional and National VoIP competitors.

 National VoIP FirmsInfotel Systems
LANOne Ethernet cable. Computer plugs into Phone. All PC traffic runs through VoIP phoneWe install separate voice cabling
SWITCHCommon switch for voice and data trafficWe install a separate voice switch
SECURITY VOICE ROUTERNoYes. We apply hardware encryption before the call leaves your premise
VoIP PATHOpen Internet using standard ports. (SIP TCP 5060). VoIP traffic goes through "carrier hotels" and across several ISPsWe use secure VPN tunnels to us.Your phone call signal NEVER leaves your ISP. We are co-located with Verizon and one mile from Comcast. We call this "close cloud" , we are simply close to you Richmond
PHONE PROVISIONINGOut of box, the made in China phone reports it's unique MAC address to China provisioning server. China knows who bought the phone and redirects request to National VoIP companies config servers in the US. This process is required process for National firms self installPhones are programed in our office and installed by Infotel techs
CUSTOMER ISOLATIONHuge virtualized servers. Hack one server and you can access all customersSeparate physical blades for each customer
VOICE RECORDINGSStored on hosted servers. This was the data breach with BroadvoiceWe offer on site "tap and store" of recordings. The data never leaves your premise.

Here are just a few of the major data breaches in recent history

YearCompanyBreach (Entry) PointDamage
2014Target StoresHVAC vendor server40 million credit cards numbers compromised
2019Broadvoice Voicemail server200,000 voicemail transcripts, customer data, etc
2020Solar WindsSoftware Update server Data breach of government servers including Department of Treasury and Commerce


Old Phone Service Was Secure, Some VOIP Systems Are Not

Your old phone system used (POTS) Plain Old Telephone Service. It was the analog line standard for one hundred years since Alexander Graham Bell.  Many considered “POTS” impervious to hacking. Yet, most VoIP phone systems use unsecured Internet connections connected to your data network. VoIP provider Vonage states on this web page “.. do not use VoIP … use analog telephone lines instead as they are just harder to tap and extract the data from”

The Risk of Unsecured Voice – PCI (credit card) Example

Your sales person takes a credit card number over your new Voice over Internet (VoIP) telephone system. The system does not feature VoIP audio encryption.  Many systems fail this VoIP security requirement as PCI 3.0 was only ratified in November 2018. You are subject to these fines.

Industry Standards Security Review

  • HIPAA – requires voicemails, audio recordings and call reports to be protected. Unlike national providers, we can provide an onsite storage for the ultimate in compliance.
  • PCI –  Telephone system VoIP security rules. We encrypt all traffic. Handled!
  • FIRNA – rule 4370 recommends business continuity systems such as 4G internet backup to a failed Comcast Internet. Rule 3170 covers voice recordings.
  • NISTstandards for VoIP security to include separation of voice and data networks. A national VoIP company that self-install ships phones in a box does not comply.
  • SOX – Reflects NIST standards for data network protection.


Free Consult, Call 804-266-6600 or