About Us

Your Local Cloud
Communications Provider

Voicity is a leading UCaaS provider continually evolving to offer the best products and services in the industry such as Cloud PBX, SMS, Chat, Video Conferencing, Screen Share and Mobility features. Our infrastructure is geo-diverse with active-active redundancy and each extension is dual-registered. We have two physical data centers in NJ and FL and two cloud hubs in Virginia and Iowa: Virginia built in Google Cloud & Iowa in AWS.

Why Cloud
Communications?

Proactively protect your workforce from illness (and distraction!) by calling Voicity and learning more about how Unified Communication and VoIP platforms will keep your employees happier, healthier, and more productive throughout the year.

  • Work Flexibly
  • Unified Tools
  • Low Cost

Send online documents
with cloud fax

Reliable, HIPAA Compliant Cloud Fax

Our fax solution is designed for organizations handling highly sensitive information and operating in regulated environments. We have a number of built-in security features to keep your data safe and help keep your organization regulation-compliant.

Easy, secure, and sustainable

A comprehensive white label fax solution operating on the world’s most reliable fax-optimized network infrastructure. Offer a cloud fax solution your clients will love

Voicity Cloud Fax

$5.00/user
$5.00/number
$0.07/page

BILLED MONTHLY

Reliable Network Infrastructure

Modern End User Portal Our beautifully designed fax portal enables users to send faxes, convert file types, save contacts, and so much more. Right from our easy to use portal

Email-to-Fax

Send and receive faxes right from your email provider without having to download or install any extra software.

HIPAA Compliance & Security

Our fax solution meets or exceeds standards set by HIPAA and other common regulatory requirements.

Print-to-Fax

HTTPS Fax Adapters Our solution delivers digital faxes to traditional fax machines securely and efficiently with significantly higher success vs t.38

Data Center Physical Access Controls

At Voicity, we recognize the critical importance of security in safeguarding your data. As your trusted partner, we have implemented and work closely with industry-leading data centers to enhance your data protection. Through these partnerships, we ensure the highest level of security for your valuable information.

Why Does This Matter?

Your data is the lifeblood of your organization, containing sensitive client information, vital business insights, and your intellectual property. Our unwavering commitment to security, coupled with our strategic alliances with top-tier data centers, ensures your data is shielded from unauthorized access, breaches, and disruptions.

Data Center Locations

COLOGIX

200 Webro Rd.
Parsippany-Troy Hills
NJ 07054

CYXTERA

9310 Florida Palm Dr.
Tampa
FL 33619

Untitled design (50)

• Perimeter Security

Both Cologix and Cyxtera data center facilities are protected by robust perimeter security measures, which include fencing, gates, and the presence of trained security personnel. These measures serve as the first line of defense to prevent unauthorized access to the data center premises.

• Key Card Access

Access to the interior of the data centers is strictly controlled by a key card access system. Authorized personnel are issued key cards with unique credentials that grant them access only to approved areas.

• Biometric Authentication

In addition to key card access, biometric authentication methods, such as fingerprint or iris scans, may be implemented to further enhance security.

• Cage and Cabinet Locking

Within the data centers, server cabinets and equipment cages are securely locked to restrict physical access to authorized personnel exclusively.

• Access Logs

Detailed access logs are maintained by the access control systems, recording all entries and exits, along with date, time, and user identification. These logs are vital for security audits and investigations.

• Security Zones

The data centers may incorporate security zones that serve to further restrict access to particularly sensitive areas.

• Ballistic Glass

To enhance security measures, the data centers may employ ballistic glass, which provides additional protection against physical threats and intrusions.

• Entrance Man Traps

Man traps or airlock-style entrances may be employed as an additional layer of security. These systems ensure that only one individual can enter or exit at a time and are a common feature in highly secure data center facilities.

Monitoring and Alerting

Untitled design (52)

• Alarm System

An alarm system is in place to detect and respond to security incidents. In case of an alarm trigger, immediate actions are taken, including:

  • Contacting emergency services (911) for assistance
  • Data Center will notify Viirtue leadership

• Real-Time Monitoring

The data center is continuously monitored in real-time. Security personnel can view security camera feeds and access control system status at any time.

• Surveillance Cameras

Security cameras are strategically placed throughout the data center facility to monitor critical areas, and they may feature motion sensors for immediate recording.

• Environmental Monitoring

The data center also monitors environmental conditions, including temperature, humidity, and smoke
detection, to ensure optimal operating conditions.

• Power Redundancy

Systems like uninterruptible power supplies (UPS) and backup generators are in place to ensure continuous power availability.

• Physical Security Reviews

Regular reviews and audits are conducted to assess the effectiveness of physical security measures.

Untitled design (51)

Voicity’s Office Physical Access Controls

Even though we don't store customer data in our office, security remains our priority at Voicity. Our office is equipped with top-notch physical access controls and monitoring systems to ensure the safety of our team, the protection of internal information, and uninterrupted business operations. Our commitment to security extends across all aspects of our organization, reflecting our dedication to excellence and responsible business practices.

• Key Card Access

The office is protected by a key card access control system, where authorized personnel use key cards to gain entry. This system ensures that only individuals with valid credentials can access the office premises.

• Security Cameras

Security cameras are strategically positioned throughout the office, including entry points, common areas, and sensitive locations. These cameras feature motion sensors and provide realtime surveillance

• Motion Sensors

The security cameras are equipped with motion sensors, which activate them when motion is detected. This feature allows for the immediate capture of video footage in response to any movement, enhancing security.

• Access Logs

The access control system maintains detailed access logs, recording each entry and exit, along with date, time, and cardholder identity. Access logs are essential for security audits and investigations.

Monitoring and Alerting

Untitled design (52)

• Alarm System

In case of security breaches or emergencies, an alarm system is in place. This alarm system triggers immediate responses, including:

  • Contacting emergency services (911) to request assistance.
  • Voicity leadership members are notified of security incidents through automated alerts, such as phone calls, text messages, or dedicated alerting systems.

• Real-Time Monitoring

The office's security system operates in real-time, enabling continuous monitoring of security cameras and access control.