Skip to content

If you ask our customers why they use Spectralink IP-DECT products, you will probably get similar answers: 

  • Spectralink DECT supports the way you prefer to communicate.  With the highest level of unified communications interoperability on the market – Choose from MS Teams  , Cisco UCM and Cisco BroadWorks hosted platforms, RingCentral, Zoom  and more.  
  • Spectralink IP-DECT products are reliable. We have 30+ years of proven reliable infrastructure performance and new S Series handsets with rugged designs that are built to last the longest.  
  • Spectralink IP-DECT products are easy to set up and manage. AMIE® simplifies provisioning and provides complete visibility and control of system performance across all sites from a centralized dashboard.  

But what about security?  It’s critical aspect of a communication solution, but it’s not always the first thing that comes to mind when customers are asked about the best part of our solution. Why is that? When data is as secure as it is with Spectralink’s IP-DECT solutions, it’s easy to take that security for granted. To us, that’s an enormous compliment. If you don’t even have to think about security, we know we’ve done our jobs. 

Still, security is an important topic to consider in any technology deployment.  

Secure DECT Solutions Help Prevent Threats 

With Spectralink DECT, you don’t have to worry about the security of your solution. DECT (Digital Enhanced Cordless Telecommunications) has the highest standard of security for communication solutions. Spectralink is proud to meet these security standards:  

  • DECT Standard Authentication Algorithm (DSAA2) is an improvement to the original DECT standard authentication algorithm adding strong AES 128 bit encryption. DSAA2 is called DECT security Step B 
  • DECT Standard Authentication Algorithm (DSAA) was introduced by the DECT Forum to enhance DECT security with authentication and 64-bit encryption key and is called DECT security Step A. It ensures that when a DECT device connects to your DECT frequency, it’s authenticated. If a device cannot be authenticated, the device is blocked to prevent hacking.  
  • Spectralink S Series DECT handsets, 7000 Series DECT handsets and Spectralink IP-DECT infrastructure support Step A security 
  • DECT Standard Cipher (DSC) encrypts communications between handsets, servers, and base stations. The cipher key is updated every 60 seconds to foil any attempts to crack the ciphering code. DSC was introduced with DECT security Step A. 
  • Transport Layer Security TLS 1.3 improves how your data is encrypted and ensures a secure and private connection. Spectralink IP-DECT supports TLS 1.3.  

You’ll find the vast majority of our Spectralink IP-DECT products are Certified by the DECT forum, check it out here.   

Here are two examples of the types of thefts, hacks, and accidents our DECT products prevent every day. 

  1. Protection of Sensitive Communications  

Healthcare environments depend on highly secure and reliable communication systems.  Spectralink IP-DECT contributes to the confidentiality, integrity, and availability of communications in a variety of healthcare scenarios. 

Sensitive patient information is protected by ensuring that only authenticated devices can connect to the healthcare organization’s IP-DECT system. Unauthorized devices are blocked, preventing potential security breaches. For an extra layer of security, DECT voice calls are encrypted during transmission, ensuring that no-one eavesdrops on patient related conversations and patient data remains confidential.  

  1. Securely Share Data within Your Network

The retail industry is a frequent target for hackers because employees deal with customer data on a daily basis—from addresses to credit card numbers. This data may be shared throughout your network, among departments, and between stores to enable a seamless customer experience.  

Spectralink DECT servers and base stations are certified to protect this valuable customer data. The infrastructure operates on a dedicated frequency to protect against radio interferences from Wi-Fi and Bluetooth and can also be made invisible to unauthorized devices – so your system and data are hidden from hackers. 

Learn More 

Visit our website to learn more about securing your organization, your communications, and your customers.