Wildix Security Standards and Products Overview
This document provides information on built-in security features of the Wildix system and Wildix services description.
Updated: September 2025
Permalink: https://wildix.atlassian.net/wiki/x/vQFmBQ
Introduction
Security is a top priority for Wildix and all the security features are built-in inside the product, which means the Wildix System is Secure By Design. You can find more details about security measures in place in the document Security Policy at Wildix. Below, you can find information about security standards, hosting services description and Wildix products overview.
Security standards
1. Authentication
Solution supports SAML2 and OpenID.
Exclusive SSO authentication; no other authentication methods (login/password, etc.) are authorized to access end-user data. SSO via an external identity provider can be forced and password authentication blocked.
2. Traffic Encryption
Certificate used for identity of hosting asset is valid, using at least SHA256 key exchange mechanism and having any intermediate certificate within the certification chain valid and respecting the same above criteria.
Certificates for identity of hosting assets comply with Certificate Transparency standard (https://www.certificate-transparency.org). The certificate used on systems can be freely validated at any time as requested by clients.
The solution is accessible through HTTPS only with strong encryption protocol implementation: Vulnerable TLS 1.0 & 1.1, SSL v2 & v3 protocols are disabled. Only TLS 1.2 is allowed as a security protocol and all previous protocols are disabled by default.
Protocol downgrade attacks are mitigated using the TLS_FALLBACK_SCSV mechanism.
Cipher suites in encrypted traffic do not use: null encryption, obsolete cipher MD5, RC4, DHE, CBC and DES3. Additionally, the Wildix system can be switched between security mods in order to support outdated devices, while still using only modern ciphers.
Perfect Forward Secrecy (PFS) Support: The solution supports ECDHE or AES suites in order to enable Forward Secrecy with modern web browsers.
All cipher suite combinations that do not support Perfect Forward Secrecy (such as RSA) are banned.
Cipher suites configuration are sorted from the strongest to the lowest.
Solution supports HTTP Strict Transport Security (HSTS) for Web Servers to prevent Man-In-The-Middle Attacks.
For security and performance reasons, each Wildix system uses sub-domains.
3. Secure Cookies
Wildix makes reasonable efforts to prevent cookie/session leaks, such as centralized CSRF protection and similar proactive measures.
4. Implementation of best practices to avoid security risks
Wildix follows OWASP recommended practices, performs penetration testing and educates employees. More details can be provided after signing an NDA.
5. Mitigations Against CPU Speculative Execution Attack Methods
Mechanisms are in place to protect against CVE-2017-5754 - Meltdown, CVE-2017-5753 - Spectre 1, CVE-2017-5715 - Spectre 2 (CVE-2017-5753, CVE-2017-5715, and CVE-2017-5754). Wildix implements mitigations of both programmatic (kernel updates/modifications) and hardware (CPUs used are not affected) varieties.
Hosting services description
1. Data location:
You have possibility to choose the desired location
2. Security policy and tools:
Complex password requirements, non-vulnerable encryption methods, certificate checks, WebRTC security, GDPR Security compliance, physical database access protections, and security vulnerabilities are patched as quickly as possible in accordance with OWASP risk rating methodology
3. Intrusion Detection policy and tools:
Intrusion detection over all services managed by the PBX (SIP / RTP / DNS proxy / NTP / Web), penetration tests are performed yearly and security reports summaries are released on request after signing an NDA to existing customers.
4. Disaster Recovery Plan (DRP) description, recovery time objective (RTO) and recovery point objective (RPO):
Typical methodology is to recover and/or rollback from backup, which entails a maximum downtime period of 15 minutes. Process also makes use of site monitoring and SRE to start the procedure proactively if needed.
5. Architecture to ensure the service availability and data integrity:
Failover protection using multiple AWS server sites, or roll over from backup.
Service availability
The availability commitment for the WILDIX services is 99.98%, disregarding any scheduled periods of unavailability for preventive maintenance notified in advance. The availability of the WILDIX services is calculated daily and it’s available here: https://statuspage.wildix.com/. It measures whether the technical interfaces are operational and not user perceptions.
Overview of Wildix Products
WMS Structure
The scheme below displays the structure of WMS (Wildix Management System):
CLASSOUND
CLASSOUND is a fully Cloud-based service that goes beyond SIP trunks in its capabilities. Using CLASSOUND, companies can enjoy the full capabilities of a communications system with global coverage, combined with the security and maintenance they’d expect from a modern enterprise-grade VoIP system.
Scheme of the CLASSOUND service:
Note: "WMS" here implies the scheme provided in the section WMS Structure.
Reliability:
100% Cloud-based
Global presence with AWS Availability Zones
99.977% CLASSOUND Service ACLASSOUND Service Availability SLSLA
Call failure rate 0,2%
Call set-up time 1.4 sec
SRV+NAPTR
SRV+NAPTRRedundancy
24/7 Monitoring
Security:
Isolated structure available only for Wildix Ecosystem
Network security
Direct connections to Local Country Networks
Global Coverage:
200+ Countries and Territories for Outbound calling
100+ Countries Local DIDs coverage
Landline and Mobile DIDs
Voice and SMS
CLASSOUND Service meets:
Local Service Registration and Authorisation requirements
General Data Protection Regulation requirements
Emergency Service regulation requirements
Voice technologies:
SIP with G.729, G.711, OPUS, T.38
TLS
SRTP - coming soon
Additional features:
Instant Virtual Porting
Bulk SMS sending
Forwarding
Bult-in Trunk setup
Failover
Filtering/Blacklists/Anti-spoofing
teams4Wildix
With Wildix, you get a Microsoft Teams PBX integration that gives you all the telephony features a growing business needs to simplify communication and deliver more to the bottom line.
Wildix offers 2 modes of Integration usage.
Mode 1. Collaboration App: it provides access to all advanced features by Wildix.
Mode 2. MS Phone System: besides the advantages of Mode 1, it allows MS Teams users to place and receive calls using Teams Dialpad (Calls tab of the MS Teams interface).
teams4Wildix service integration scheme:
teams4Wildix security:
All call legs can be secured by TLS encryption. TLS 1.2 or later is supported
Customer data held in the Microsoft security realm for both Teams and teams4Wildix
Teams users connect to the nearest Microsoft network POP
The Microsoft network carries the voice traffic for nearly the entire journey
Through teams4Wildix node optimisation, traffic will step-off the Microsoft network near to the PBX or Trunk
teams4Wildix features:
Support for Teams in the browser version and native app
Single sign-on with Microsoft 365 (Office 365)
Inbound and outbound calls (internally and externally) within Teams
Call control of any Wildix devices assigned to the user’s account, including desk phones, DECT
Embedded SIP trunk that enables long-distance calls to 200+ countries
Integrated Fax and SMS server
Robust and reliable phone system that offers all the advanced telephony features
No complicated setup and added costs; calling to and from Teams is available out of the box
x-bees / Collaboration 7
Collaboration 7 is a unified communication platform for businesses, combining chat, voice, video, presence, and AI tools to streamline teamwork and enhance company-wide collaboration and efficiency. x-bees is an AI-powered sales communication platform that unifies chat, calls, video, email, and CRM integration, helping customer-facing teams close deals faster with insights like transcriptions, summaries, and analytics, boosting sales and customer engagement.
Scheme of x-bees / Collaboration 7 service:
x-bees / Collaboration 7 features:
Unified communication with chat, voice, file sharing, presence, and video calls
AI-powered tools like call transcription
Call analytics (CDR-View 2.0)
CRM integrations
Automatic logging of calls and conferences to CRM
Mobile push notifications and real-time alerts
AI-powered tools: call transcription, sentiment analysis, annotations (x-bees)
Meeting scheduler with calendar integration (x-bees)