Don't worry! InterCall products are not vulnerable to Heartbleed.
Communications as a strategic growth catalyst.
InterCall Unified Meeting 5, online meeting service, online meetings, intercall unified meeting, online meeting
Garnter ranks West in the leader
Webcasting and Virtual Event Video
InterCall Blog

The InterCall Blog

Get the latest insights from industry experts.READ ARTICLES
Get MobileMeet

Get MobileMeet™

Have Meetings at Anytime from AnywhereDOWNLOAD
See conference call pricing plans.

Conference Calls

for up to 125 participants


Gartner places West in the leader's quadrant for the 2013 Magic Quadrant for Unified Communications as a Service (UCaaS).

Increasingly, InterCall's conferencing tools and services are being deployed as part of a comprehensive, hosted Unified Communications solution within many of the world's leading firms. As demonstrated in Gartner's most recent report, the integration of InterCall conferencing tools with sister company West IP Communications' enterprise voice solutions offers customers a unique, market-tested solution. Learn more about Unified Communication Solutions »


Heart Bleed Notice

West Corporation is committed to the security of its clients' data and systems and has taken a multi- threaded approach to verifying this vulnerability is not exploitable throughout its infrastructure.

West Corporation IT departments have been reviewing current infrastructure, servers, and networks, to validate the versions of OpenSSL being used, if applicable, and is working with a number of its vendors to validate the products and systems in the environment are not exposed. Enterprise IT Security is performing full vulnerability scans against all perimeter devices and systems, and is reviewing previous vulnerability scan results as a baseline.

At this point, West has not identified systems or devices using a vulnerable version of the OpenSSL libraries and will diligently continue to review its systems and their configurations. In the event a system, server, or network device that is vulnerable is identified, standard incident response procedures will be followed to remediate the vulnerability.