Don't worry! InterCall products are not vulnerable to Heartbleed.
Communications as a strategic growth catalyst.
Webcasting and Virtual Event Video
InterCall Unified Meeting 5, online meeting service, online meetings, intercall unified meeting, online meeting
Garnter ranks West in the leader
Manage conference calls more efficiently.

Get Call Manager

Enhance Your Meetings by Managing Them OnlineDOWNLOAD
Get MobileMeet

Get MobileMeet™

Have Meetings at Anytime from AnywhereDOWNLOAD
try online meeting free for 30 days.

Online Meetings

for up to 25 participants


Gartner places West in the leader's quadrant for the 2013 Magic Quadrant for Unified Communications as a Service (UCaaS).

Increasingly, InterCall's conferencing tools and services are being deployed as part of a comprehensive, hosted Unified Communications solution within many of the world's leading firms. As demonstrated in Gartner's most recent report, the integration of InterCall conferencing tools with sister company West IP Communications' enterprise voice solutions offers customers a unique, market-tested solution. Learn more about Unified Communication Solutions »


Heart Bleed Notice

West Corporation is committed to the security of its clients' data and systems and has taken a multi- threaded approach to verifying this vulnerability is not exploitable throughout its infrastructure.

West Corporation IT departments have been reviewing current infrastructure, servers, and networks, to validate the versions of OpenSSL being used, if applicable, and is working with a number of its vendors to validate the products and systems in the environment are not exposed. Enterprise IT Security is performing full vulnerability scans against all perimeter devices and systems, and is reviewing previous vulnerability scan results as a baseline.

At this point, West has not identified systems or devices using a vulnerable version of the OpenSSL libraries and will diligently continue to review its systems and their configurations. In the event a system, server, or network device that is vulnerable is identified, standard incident response procedures will be followed to remediate the vulnerability.