1.800.379.7729 | Support: 3 | Sales: 2 | Partner: 1
Read our latest insights and information about intelligent communications, business productivity, and more, on the Intermedia blog.
Discover how mobile tech benefits patient care, enhances efficiency, and supports digital transformation.
Rob Oscanyan
Intermedia
With Intermedia Unite®, a full office communications suite goes wherever you go.
Recognized for excellence in cloud communications and customer support for the 9th year in a row.
Log in to Partner Portal
"A white-label VoIP app gives you a fast, cost-effective way to expand your business offering while keeping full control over your brand…"
Mark Sher
"AI-driven integration is helping us deliver a more seamless customer experience across unified communications and contact center."
Robert Handel
Senior Vice President of Cloud Strategy, LDI
Intermedia greatly appreciates well-intentioned and ethical security researchers for their help in making our products more robust and bringing secure services to our customers. As such, we welcome security community members to investigate the security of our systems for potential vulnerabilities and are committed to thoroughly review and resolve valid submissions. If you think that you have found a security vulnerability in any of applications or services, operated by Intermedia, please let us know. Before reporting though, we encourage you to carefully read the contents of this page and follow the rules and recommendations listed. Note that we are only able to review technical vulnerability reports. Non-security bugs, queries about problems with your account and abuse reports should be instead directed to our Customer Support.
Generally, any Intermedia-owned application or service, that handles reasonably sensitive user data, is in scope. This includes almost every web service, hosted under the following subdomains:
as well as current version of official Intermedia mobile and desktop applications:
Some of our customers may have their services or infrastructure hosted under Intermedia domains. We cannot authorize you to test such systems, as we do not own them, nor would we be able to provide you protection under Safe Harbor. If in doubt regarding any particular asset – ask us first!
In order to make our collaboration effective, safe and convenient for both parties, we encourage you to:
Currently we are not able to provide any monetary rewards. We would however like to express our deepest gratitude to the researchers who take their time and effort to investigate and report security vulnerabilities in accordance with this Program.
Any design or implementation issue that affects confidentiality or integrity of user data is likely to be qualifying. We are particularly interested in the following categories of security bugs:
Please note that we only accept technical vulnerabilities. Do not try to bypass physical security controls in any of Intermedia offices, perform spamming or social engineering attacks against Intermedia customers, partners, vendors, or employees, and do otherwise questionable things.
We will unlikely review and respond to the submissions of the following types:
If you have found a vulnerability, please contact us at [email protected].
In order to make the review process smooth and effective, please include all the technical details required to identify and reproduce the issue, as long as your estimation of the impact. The report should normally include:
Any activities conducted in good faith in a manner consistent with this Program will be considered authorized conduct, and we will not initiate legal action against you for such activities. If legal action is initiated by a third party against you in connection with activities conducted under this Program, we will take steps to make it known that your actions were conducted in compliance with this Program.
Intermedia reserves the right to discontinue or change the terms of this Program at any time without notice. Intermedia further reserves the right of final decision on the interpretation of the terms of this Program.