Our Products & Services
Getting Started
First Time Setup
Getting Started With Jobs
Getting Started with Accounts
Getting Started with Inventory
Getting Started with Ticketing
Setting Sonar up for Billing
Baseline Configuration
How To: Using Sonar's Customer Portal
User Specific Resources
Accounts
Account Groups: Overview & Example Use Cases
Account List View: Overview
Account Management View: Overview
Account Overview Customization
Account Statuses: Overview & Example Use Cases
Account Types: Overview & Example Use Cases
Anchor & Linked Serviceable Addresses: Overview and Best Practices
CPUC Fixed Broadband Deployment by Address
Child Accounts: Best Practices & How Tos
Creating a New Account
Disconnecting an Account
FCC Broadband Data Collection (BDC) Filings: How Sonar Can Help
FCC Data Exports: General Overview and Usage
Future Serviceable Addresses: Overview
Lead Intake Form Processing
Notes & Tasks: Best Practices & Use Cases
Scheduled Events: Overview & Use Cases
Serviceable Addresses: Overview and Usage
Specify Account ID upon Creation
Using Sonar's FCC Broadband Label Generation Tool
Billing
ACH Batching: Overview
Accounts in Vacation Mode
Avalara: Overview & Setup
Batch Payments & Deposit Slips: Overview
Billing Calculator
Billing Defaults
Billing Settings
Building Packages
Building a Data Service
Canadian ACH tool
Changing Service Pricing in Sonar: Best Practices
Considerations When Using Avalara with Voice Services
Creating Discounts for Services and Packages
Delinquency Billing Best Practices
Delinquency Exclusions: Overview and Use Cases
Email Invoice Batch: Overview
General Ledger Codes: Overview
General Transactions: Best Practices
How Sonar Prorates Billing
How to Take Bank Account Payments
How to: Adding a Service to an Account
Invoice Templates: Overview
Leveraging PayPal as a Payment Method in Sonar
Manual Transactions
Multi-Month Billing & Multi-Month Services
Print to Mail
Printed Invoice Batches: Overview
Services: Overview
Setting Up Payment Methods and Taking Payments
Setting up Bank Account & Credit Card Processors
Taxes Setup
Usage Based Billing Policies: Overview and Usage
Usage Based Billing Policy Free Periods: Overview and Usage
Using Tax Exemptions - How To
Communication
Call Logs: General Best Practices
Communication Tools: Overview
Email Variables & Conditions
Message Categories: Overview & Use Cases
Phone Number Types: Overview and Use Cases
Saved Messages: Overview
Setting up an Outbound Email Domain
Trigger Explanations
Triggered Messages: Setup
Using Outbound SMS
Using the Mass Message Tool
Companies
How to: Setting Up a Company in Sonar
Managing Multiple Companies in Sonar: Best Practices
Rebranding your Sonar Instance
Financial
Contract Templates
Invoice Attachment Use Cases & PDF Examples
Invoice Messages: Overview & Use Cases
Invoices in Sonar: Examples, Creation & Contents
Integrations
Calix SMx Integration: Overview
CrowdFiber Integration
External Marketing Providers
GPS Tracking Providers: Overview
GoCardless Integration: Overview & Setup
How to Connect Cambium to your Sonar Instance
How to Connect Preseem to your Sonar System
How to: Using Webhooks in Sonar
RemoteWinBox - Integration with Sonar
The Sonar Field Tech App
Tower Coverage Integration: Overview
Vetro FiberMap Integration: Overview
Webhooks in Sonar: Basic PHP Example
iCalendar Integration
Inventory
Inventory List View: Overview
Inventory Model Management: General Overview
Setup of Inventory: Manufacturers, Categories, and Assignees
Tracking and Using Consumable Inventory
Jobs
Applying Task Templates to Jobs
Edit Job Options
Example Jobs & Templates
Geofences: Overview
Job Types: Best Practices
Jobs and Scheduling: Overview
Scheduling How-to: Creating and Booking a Job
Scheduling Week View: Overview
Setting Up Schedules General Overview
Mapping
Misc.
Combining Custom Fields & Task Templates for Information Storage
Custom Fields Overview & Use Cases
Custom Links: Overview
Task Templates Overview & Use Cases
Monitoring
Building Alerting Rotations
Building a Monitoring Template
Poller Troubleshooting
Pollers: General Overview, Deployment Strategy, Build Out & Setup
Networking
Assigning RADIUS Addresses
Assigning an IP Address Using Sonar's IPAM: How to
Automating IP Assignments, Data Rates, and Network Access in Sonar
Building Address Lists
Building RADIUS Groups
Building a Device Mapper
Cable Modem Provisioning
Controlling Customer Speeds with Sonar: General Overview
DHCP Delivery
Data Usage Available Methods
Finding your OIDs
How Sonar Communicates - Egress IPs Explained
IP Assignments & Sonar
IPAM: Basic Setup
IPAM: Overview
LTE Integration
MikroTik as an Inline Device: Integration With Sonar
MikroTik: Controlling Access
MikroTik: Controlling Speeds
MikroTik: Setting Up a Sonar Controlled DHCP Server
Netflow Integration: Overview
Network Dashboard: Overview
Network Sites: Management View Overview
PacketLogic: Integration With Sonar
Pulse, Polling, and PHP
RADIUS: Build-Out & Integration with Sonar
RADIUS: Building Reply Attributes
Setting Up CoA Proxy
Sonar Flow
Sonar IP Addressing
Using Multiple Network Devices in Sonar
Purchase Orders
Release Notes
Reporting
Enhanced Business Intelligence - Tips & Tricks for Advanced Users
How To Enhance Your Reporting With Custom Field Data
Report Licenses
Sonar's Business Intelligence: Overview
Understanding Sonar Reports
Security
Application Firewall: General Overview and Best Practices
Auth0: Overview
Multi-Factor Authentication: Overview
Password Policy In Depth
Removing a Terminated Employee In Sonar
Role Creation using GraphiQL
User Role Creation & Best Practices
Users: Overview
Sonar Billing
sonarPay
sonarPay Chargebacks & Disputes: Overview
sonarPay Disbursements: Overview
sonarPay Overview
sonarPay Reversals, Voids, & Refunds: Overview
sonarPay: Token Migration Process
System
A Deeper Dive into the New Sonar API
API Calls Using Third Party Applications: Personal Access Tokens
Browser Compatibility and Minimum Hardware Requirements for Sonar
Consuming the Sonar API
Controlling Your Landing Page: Personal Preferences
Customizing Your Customer Portal
Date/Time Picker: Overview
Dynamic Time Zones in Sonar
Filtering: Overview
Frequently Used Terms
Getting Your Data into Sonar
How To Use GraphiQL to Understand the Sonar API
How Your Data is Backed Up
How to Best Use Global Search
Interacting with Files via the API
Introducing the New Sidebar
Mutations in the Sonar API
Notification Preferences
REST API Wrappers for V1 Compatibility
SMS Notifications
Sonar's Rich Text Editor
System Settings: Overview
The New Sonar API
Troubleshooting the Customer Portal
Upgrading your Ubuntu OS - Customer Portal Upgrades
User Profile: Your Personal User Settings
Ticketing
Advanced Ticketing Features
Canned Replies Examples & Templates
Canned Reply Categories
Exploring Ticket Groups
How to Integrate Inbound Mailboxes with Slack
Inbound Mailboxes Example Build
Ticket Categories Best Practices & Example Build
Ticketing: Overview
Using Parent Tickets
Voice
API Changes for Voice Billing
Best Practices to Remain CPNI Compliant
Billing Voice Services in Sonar
Deploying Voice Services in Sonar
Working With the Sonar Team & Additional Resources
Sonar's Security Practices & Certifications
Sonar and General Data Protection Regulation (GDPR)
Sonar's Security Strategies
Technical Security Overview
Best Practices for Fast Tracking a Support Request
Feedback Portal / Suggest a Feature
Learning with Sonar: Tools and Resources
New Client Training Overview
Sonar Casts Table of Contents
Submitting Bugs vs. Feature Requests
The Sonar Community Forum
The Sonar Status Page
Third Party Customer Support Referrals
Table of Contents
- Security is a Top Priority
- Security in the Cloud
- Data Security: Industry Standard Encryption and Secure Connections
- Network Security: Intrusion Detection and Prevention
- Access Controls and Data Governance
- Our Shared Security Partnership
- Data Utilization and System Monitoring
- Corporate Security
- Product Security
- All Categories
- Working With the Sonar Team & Additional Resources
- Sonar's Security Practices & Certifications
- Sonar's Security Strategies
Sonar's Security Strategies
- Security is a Top Priority
- Security in the Cloud
- Data Security: Industry Standard Encryption and Secure Connections
- Network Security: Intrusion Detection and Prevention
- Access Controls and Data Governance
- Our Shared Security Partnership
- Data Utilization and System Monitoring
- Corporate Security
- Product Security
Read Time: 3 mins
Security is a Top Priority
At Sonar, trust is at the core of everything we do. We are committed to providing a platform for ISPs that prioritizes data security and privacy. With industry-leading safeguards and continuous monitoring, our customers can rest assured that their data is protected 24/7 in the cloud.
Security in the Cloud
Sonar leverages the robust security of Microsoft Azure and DigitalOcean to safeguard client data in the cloud.
Our cloud platforms adhere to stringent international and industry-specific compliance standards, including:
- SOC 1, SOC 2
- General Data Protection Regulation (GDPR)
- HIPAA, FedRAMP, CSA STAR
These certifications are verified through rigorous third-party audits to ensure adherence to security controls. Data is hosted in regional, state-of-the-art data centers designed for mission-critical systems with:
- Fully redundant subsystems.
- Compartmentalized security zones.
- Multiple layers of authentication, including two-factor biometric access.
- 24/7 surveillance by dedicated security personnel.
Data Security: Industry Standard Encryption and Secure Connections
- In Transit: Data is encrypted using TLS 1.2 or higher.
- At Rest: Data is encrypted with AES 256-bit encryption.
- Geographic Residency: Flexible data residency options are available.
- Tokenization: Sensitive payment data is tokenized for added security.
Network Security: Intrusion Detection and Prevention
Sonar employs robust network security measures, including:
- Firewalls configured for best practices in ingress and egress security.
- Extended Detection and Response (XDR): Real-time monitoring for threats like malware, brute-force attacks, SQL injection, and DoS/DDoS attacks.
- Centralized logging and monitoring for potential security events.
- Network and application vulnerability scanning.
Access Controls and Data Governance
Sonar’s platform includes granular-access permissions and role-based governance:
- User Roles: Group permissions define which actions users can perform.
- Permissions: Permissions are customizable within each module.
- Modules: Functional areas of the platform are managed independently.
Sonar is actively working toward SOC 2 compliance, demonstrating our dedication to security and privacy.
Our Shared Security Partnership
Security is a shared responsibility. Sonar connects to your technology environment, making collaboration essential for maintaining security.
- Customer Responsibilities:
- Secure database access (e.g., IP whitelisting, TLS encryption, SSH tunneling).
- Implement restrictive user permissions within your Sonar instance.
- Sonar Responsibilities:
- Ensuring code quality and secure development practices.
- Continuous monitoring and vulnerability scanning.
Data Utilization and System Monitoring
Sonar uses first- and third-party tools to enhance our platform and services:
- Usage Analytics (Pendo): Helps improve the platform based on user interactions.
- Configuration Backups: Securely encrypted and stored for redundancy.
- Error Reporting: Internal systems collect runtime data to diagnose issues.
- In-Product Messaging (Pendo): Provides personalized, pseudonymized user guidance.
Corporate Security
Personnel and Policies
- Dedicated Information Security team led by the Lead Information Security Engineer.
- Comprehensive security policies reviewed and approved by leadership.
- Background checks for all employees.
- Regular security training for staff.
Incident Response
- 24/7 Monitoring: Security and DevOps teams are on-call for immediate response.
- Incident Response Plan: Comprehensive and regularly tested.
- Training: Staff receive ongoing education on incident escalation and response.
Product Security
Development Practices
- Peer-reviewed code development and secure software lifecycle processes.
- Automated tests targeting injection flaws, input validation, and CSRF token usage.
- Regular penetration testing to identify and mitigate vulnerabilities.
Monitoring and Authentication
- Multi-layer authentication for access to back-end systems.
- Logging and monitoring for all access and potential anomalies.
- Reputation monitoring and threat intelligence checks.