Our Products & Services
Getting Started
First Time Setup
Getting Started With Jobs
Getting Started with Accounts
Getting Started with Inventory
Getting Started with Ticketing
Setting Sonar up for Billing
Baseline Configuration
How To: Using Sonar's Customer Portal
User Specific Resources
Accounts
Account Groups: Overview & Example Use Cases
Account List View: Overview
Account Management View: Overview
Account Overview Customization
Account Statuses: Overview & Example Use Cases
Account Types: Overview & Example Use Cases
Anchor & Linked Serviceable Addresses: Overview and Best Practices
CPUC Fixed Broadband Deployment by Address
Child Accounts: Best Practices & How Tos
Creating a New Account
Disconnecting an Account
FCC Broadband Data Collection (BDC) Filings: How Sonar Can Help
FCC Data Exports: General Overview and Usage
Future Serviceable Addresses: Overview
Lead Intake Form Processing
Notes & Tasks: Best Practices & Use Cases
Scheduled Events: Overview & Use Cases
Serviceable Addresses: Overview and Usage
Specify Account ID upon Creation
Using Sonar's FCC Broadband Label Generation Tool
Billing
ACH Batching: Overview
Accounts in Vacation Mode
Avalara: Overview & Setup
Batch Payments & Deposit Slips: Overview
Billing Calculator
Billing Defaults
Billing Settings
Building Packages
Building a Data Service
Canadian ACH tool
Changing Service Pricing in Sonar: Best Practices
Considerations When Using Avalara with Voice Services
Creating Discounts for Services and Packages
Delinquency Billing Best Practices
Delinquency Exclusions: Overview and Use Cases
Email Invoice Batch: Overview
General Ledger Codes: Overview
General Transactions: Best Practices
How Sonar Prorates Billing
How to Take Bank Account Payments
How to: Adding a Service to an Account
Invoice Templates: Overview
Leveraging PayPal as a Payment Method in Sonar
Manual Transactions
Multi-Month Billing & Multi-Month Services
Print to Mail
Printed Invoice Batches: Overview
Services: Overview
Setting Up Payment Methods and Taking Payments
Setting up Bank Account & Credit Card Processors
Taxes Setup
Usage Based Billing Policies: Overview and Usage
Usage Based Billing Policy Free Periods: Overview and Usage
Using Tax Exemptions - How To
Communication
Call Logs: General Best Practices
Communication Tools: Overview
Email Variables & Conditions
Message Categories: Overview & Use Cases
Phone Number Types: Overview and Use Cases
Saved Messages: Overview
Setting up an Outbound Email Domain
Trigger Explanations
Triggered Messages: Setup
Using Outbound SMS
Using the Mass Message Tool
Companies
How to: Setting Up a Company in Sonar
Managing Multiple Companies in Sonar: Best Practices
Rebranding your Sonar Instance
Financial
Contract Templates
Invoice Attachment Use Cases & PDF Examples
Invoice Messages: Overview & Use Cases
Invoices in Sonar: Examples, Creation & Contents
Integrations
Calix SMx Integration: Overview
CrowdFiber Integration
External Marketing Providers
GPS Tracking Providers: Overview
GoCardless Integration: Overview & Setup
How to Connect Cambium to your Sonar Instance
How to Connect Preseem to your Sonar System
How to: Using Webhooks in Sonar
RemoteWinBox - Integration with Sonar
The Sonar Field Tech App
Tower Coverage Integration: Overview
Vetro FiberMap Integration: Overview
Webhooks in Sonar: Basic PHP Example
iCalendar Integration
Inventory
Inventory List View: Overview
Inventory Model Management: General Overview
Setup of Inventory: Manufacturers, Categories, and Assignees
Tracking and Using Consumable Inventory
Jobs
Applying Task Templates to Jobs
Edit Job Options
Example Jobs & Templates
Geofences: Overview
Job Types: Best Practices
Jobs and Scheduling: Overview
Scheduling How-to: Creating and Booking a Job
Scheduling Week View: Overview
Setting Up Schedules General Overview
Mapping
Misc.
Combining Custom Fields & Task Templates for Information Storage
Custom Fields Overview & Use Cases
Custom Links: Overview
Task Templates Overview & Use Cases
Monitoring
Building Alerting Rotations
Building a Monitoring Template
Poller Troubleshooting
Pollers: General Overview, Deployment Strategy, Build Out & Setup
Networking
Assigning RADIUS Addresses
Assigning an IP Address Using Sonar's IPAM: How to
Automating IP Assignments, Data Rates, and Network Access in Sonar
Building Address Lists
Building RADIUS Groups
Building a Device Mapper
Cable Modem Provisioning
Controlling Customer Speeds with Sonar: General Overview
DHCP Delivery
Data Usage Available Methods
Finding your OIDs
How Sonar Communicates - Egress IPs Explained
IP Assignments & Sonar
IPAM: Basic Setup
IPAM: Overview
LTE Integration
MikroTik as an Inline Device: Integration With Sonar
MikroTik: Controlling Access
MikroTik: Controlling Speeds
MikroTik: Setting Up a Sonar Controlled DHCP Server
Netflow Integration: Overview
Network Dashboard: Overview
Network Sites: Management View Overview
PacketLogic: Integration With Sonar
Pulse, Polling, and PHP
RADIUS: Build-Out & Integration with Sonar
RADIUS: Building Reply Attributes
Setting Up CoA Proxy
Sonar Flow
Sonar IP Addressing
Using Multiple Network Devices in Sonar
Purchase Orders
Release Notes
Reporting
Enhanced Business Intelligence - Tips & Tricks for Advanced Users
How To Enhance Your Reporting With Custom Field Data
Report Licenses
Sonar's Business Intelligence: Overview
Understanding Sonar Reports
Security
Application Firewall: General Overview and Best Practices
Auth0: Overview
Multi-Factor Authentication: Overview
Password Policy In Depth
Removing a Terminated Employee In Sonar
Role Creation using GraphiQL
User Role Creation & Best Practices
Users: Overview
Sonar Billing
sonarPay
sonarPay Chargebacks & Disputes: Overview
sonarPay Disbursements: Overview
sonarPay Overview
sonarPay Reversals, Voids, & Refunds: Overview
sonarPay: Token Migration Process
System
A Deeper Dive into the New Sonar API
API Calls Using Third Party Applications: Personal Access Tokens
Browser Compatibility and Minimum Hardware Requirements for Sonar
Consuming the Sonar API
Controlling Your Landing Page: Personal Preferences
Customizing Your Customer Portal
Date/Time Picker: Overview
Dynamic Time Zones in Sonar
Filtering: Overview
Frequently Used Terms
Getting Your Data into Sonar
How To Use GraphiQL to Understand the Sonar API
How Your Data is Backed Up
How to Best Use Global Search
Interacting with Files via the API
Introducing the New Sidebar
Mutations in the Sonar API
Notification Preferences
REST API Wrappers for V1 Compatibility
SMS Notifications
Sonar's Rich Text Editor
System Settings: Overview
The New Sonar API
Troubleshooting the Customer Portal
Upgrading your Ubuntu OS - Customer Portal Upgrades
User Profile: Your Personal User Settings
Ticketing
Advanced Ticketing Features
Canned Replies Examples & Templates
Canned Reply Categories
Exploring Ticket Groups
How to Integrate Inbound Mailboxes with Slack
Inbound Mailboxes Example Build
Ticket Categories Best Practices & Example Build
Ticketing: Overview
Using Parent Tickets
Voice
API Changes for Voice Billing
Best Practices to Remain CPNI Compliant
Billing Voice Services in Sonar
Deploying Voice Services in Sonar
Working With the Sonar Team & Additional Resources
Sonar's Security Practices & Certifications
Sonar and General Data Protection Regulation (GDPR)
Sonar's Security Strategies
Technical Security Overview
Best Practices for Fast Tracking a Support Request
Feedback Portal / Suggest a Feature
Learning with Sonar: Tools and Resources
New Client Training Overview
Sonar Casts Table of Contents
Submitting Bugs vs. Feature Requests
The Sonar Community Forum
The Sonar Status Page
Third Party Customer Support Referrals
Table of Contents
- All Categories
- Working With the Sonar Team & Additional Resources
- Sonar's Security Practices & Certifications
- Technical Security Overview
Technical Security Overview
Read Time: 3 mins
1.0 Purpose
This document provides an overview of Sonar Software’s security technologies, policies, and best practices. It addresses the most common questions and areas of importance for our valued business partners.
This information is highly confidential and may only be shared with proper authorization. If you require additional details, please contact your Sonar representative.
2.0 Information Security
2.1 Cloud Security
Sonar leverages Microsoft Azure and DigitalOcean for secure, reliable cloud services. These platforms meet a wide range of international and industry-specific compliance standards, including:
- Microsoft Azure: SOC 1, SOC 2, GDPR, CSA STAR, HIPAA, FedRAMP
- DigitalOcean: SOC 1, SOC 2, CSA STAR
For further information, please visit:
2.2 Network Security
Sonar employs advanced network security measures to protect systems and data, including:
- Network Controls: Azure Network Security Groups (NSGs) for controlled access to private VNets.
- Threat Monitoring: Extended Detection and Response (XDR) for real-time monitoring of vulnerabilities and threats.
- Intrusion Protection: Systems to defend against malware, brute-force attacks, SQL injection, Denial of Service (DoS), and Distributed Denial of Service (DDoS) attacks.
- Centralized Logs: Logging of all services and audit trails for system changes.
- VPN Administration: Secure remote administration of servers.
2.3 Data Security
Data protection is a cornerstone of Sonar’s operations:
- In Transit: Data is transmitted via HTTPS using TLS 1.2 or higher.
- At Rest: Data is encrypted using AES 256-bit encryption.
- Geographic Data Residency: Flexible data residency options for compliance with regional requirements.
- Tokenization: Sensitive payment data is tokenized to ensure security.
2.4 Physical Security
Sonar’s applications are hosted on Microsoft Azure in state-of-the-art regional data centers, featuring:
- Multiple layers of authentication, including biometric access.
- 24/7 surveillance and monitoring by security personnel.
- Stringent restrictions on physical access to facilities.
2.5 User Controls
Access to Sonar sessions is managed by customer-designated Super Administrators, with features including:
- Role-based access controls.
- Granular permissions for user roles.
- Enforced session timeout policies.
3.0 Application Security
3.1 Secure Development Practices
Sonar’s application security practices include:
- Peer-reviewed code check-ins.
- Password complexity requirements.
- Session controls to enforce data security.
- HTTP security headers for protection against web vulnerabilities (e.g., XSS, X-Frame-Options).
3.2 Penetration Testing
Sonar conducts annual independent penetration testing to identify and mitigate vulnerabilities, ensuring the integrity of our defenses.
4.0 Technology Governance
4.1 Compliance
Sonar is actively pursuing SOC 2 compliance, reflecting our commitment to protecting customer data and meeting international privacy and security standards. Our platform aligns with the General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA), PIPEDA (Personal Information Protection and Electronic Documents Act), and the NIST Cybersecurity Framework (CSF).
4.2 Privacy Practices
Sonar’s Privacy Management Program is designed to comply with global requirements, including GDPR, CCPA, and PIPEDA. Highlights include:
- Encryption: Tokenization for secure handling of sensitive data.
- Vendor Compliance: Data storage providers meet the highest levels of compliance.
4.3 Operational Management & Access
Sonar may require temporary access to customer data for support purposes. When required:
- Customer Administrators grant access on a per-case basis.
- Access is revoked by the customer once the support issue is resolved.
Employee access to user data is strictly controlled and permitted only under defined circumstances outlined in our Privacy Policy.