Built-in Security
for Your Business Communications

We safeguard your PBX system and communications with multi-layer defense, access protection, encryption, and industry-grade privacy measures.

Product Security

Core Security Capabilities

From foundational safeguards to dynamic data encryption, P-Series enforces rigorous security policies and offers comprehensive administrative controls to help you defend against attacks, misuse, and data loss.

Single sign-on (SSO)

Two-factor authentication (2FA)

Enforced strong password policy

Restrict to authenticated users

User roles and permission management

Session timer to logout inactivity

Event notifications & operation logs

Fail2ban

Enforced auto/static defense

Restrict IP allow/block list

Restrict country access

Global anti-hacking IP blocklist

HTTPS/TLS certificates

OAuth 2.0

Spam blocking (IP auto defense)

Block phone numbers

Call routing based on business hours

Call recording file encryption

Enable voicemail PIN

Outbound Call Frequency Restriction

Analytics portal

Restrict country code dialing

Restrict outbound call permission

Restrict outbound call frequency

End-to-end encryption for Linkus registeration

TLS encryption/SRTP secure voice

Single sign-on (SSO)

Host password

Participant password

Enforced end meeting when host logout

Enable host turn on/off video for all participants

Host remove participants

Host mute participants

TLS/SSL encryption/SRTP secure voice

TLS/SRTP encryption secure voice

HTTPS/TLS certificates

MD5 digest authentication

Encrypted SIP authentication credentials

DTLS and WSS support

STIR/SHAKEN signing and verification

Encrypted call recordings and phone number masking

End-to-end encryption for Linkus client registration

Compliance and Privacy Certificates: GDPR, ISO27001, RoHS, FC, CE, ISO9001

Compliance and Privacy

Meet Global Standards for Compliance & Data Security

At Yeastar, we take a multi-dimensional approach to put the safety of your data first. Our 3rd-party certifications and adherence to global compliance regulations speak to our commitment.

Reliable System Architecture

Enterprise-grade UCaaS Infrastructure

Yeastar UCaaS service infrastructure is built on top of AWS services with the highest level of certifications including ISO 27001 and SOC2. We understand the importance of reliability and aspire to a 99.99% uptime.

Yeastar YCM UCaaS Service Architecture

99.99 SLA Uptime

99.99% Uptime

Never miss a beat with carrier-grade severs redundant across global data centers.

N+1 High Availability

N+1 High Availability

Every data center is prepared with active-active SBC high availability & load balancing.

Hot Standby Failover

Hot Standby Failover

Full dual-server redundancy for each PBX instance with real-time mirroring & failover.

24/7 Monitoring

24/7 Monitoring

Our engineers monitor the network at all times. Issues are immediately flagged and solved.

Frequently Asked Questions

What security compliance or certifications does Yeastar have?

.

Yeastar’s infrastructure and processes align with multiple
international standards and best practices, including ISO27001,
SOC-related controls, data protection regulations, and privacy
requirements. P-Series is designed with security-by-design
principles to help organizations meet compliance obligations.

How does the PBX prevent unauthorized access?

.

Yeastar P-Series includes multiple layers of access protection, such
as strong password policies, IP/Geo-based access control, role
management, and secure authentication.

Does the PBX support failover or redundancy for high availability?

.

Yes. Yeastar supports high-availability options such as hot standby
failover, redundant infrastructure, and real-time system mirroring
(availability may vary by deployment). These measures ensure
business continuity in case of hardware failures or unexpected
service interruptions.

What security policies does Yeastar follow for P-Series PBX?

.

Yeastar applies a rigorous set of security policies covering system
access, password enforcement, encryption, network protection, and
data handling.

We follow industry best practices and align with international
standards, including GDPR requirements for data protection and
privacy.

Is data encrypted on Yeastar PBX?

.

Yes. Yeastar supports encryption for signaling and media
transmission using industry-standard protocols such as TLS and SRTP.
This ensures that voice traffic and sensitive information remain
protected against interception or tampering.

Does Yeastar offer security-related training or certification?

.

Yes. Yeastar provides professional training for administrators,
partners, and IT teams through the Yeastar Certified Security
Specialist (YCSS) program.

The course covers PBX security fundamentals, best practices,
configuration guidelines, and threat prevention.

👉 Learn more or enroll here.

The Business Phone System You Can Trust

More Features, Greater Performance, Less IT Management