Affected by the BlueJeans news? We're here to help

Private & secure video conferencing solutions

Your video conferencing security is paramount. Choose a solution that secures and protects your data.
Private &  secure video conferencing solutionsy hero

Pexip is committed to upholding high standards of information security, privacy and transparency.

3D_bracket_zoom_dark_blue

Security

More than just encryption

Pexip uses industry-standard encryption and security protocols to control access and to prevent unwanted audiences from listening in.

 

To provide information security in areas that encryption cannot address, Pexip has been developed from the ground up within the constraints of a Defense-in-Depth cybersecurity architecture. Our cyber architecture focuses on applying a holistic approach to security and is designed to address all aspects of the threat model, including application, network, and operational security elements.

 

Pexip has implemented a sophisticated Software Development Life Cycle (SDLC), which enables us to constantly roll out new features, new capabilities, and provide ongoing maintenance and fixes. We have a solid internal culture built on strong privacy and security practices. Our security practises focus on the organisation as a whole; from organisational security procedures, to our people hiring policies and employee security policies, to where and how our products are developed. 

man using a laptop while working late in his office

Our security features

  • NIST validated FIPS 140-2 encryption module
  • Zero Trust architecture (ZTA) compliant policy stack
  • Use of industry-standard protocols, and full regulation compliance
  • Data sovereignty and insights
  • Customizable workflows and features to ensure compliance with desired level of security
  • Deployable in private clouds
two men looking at a dashboard on a monitor

Zero trust architecture is shaping the future of data security

Zero trust is shaping the future of data security. Learn how to optimize your zero-trust environment with Pexip.
  • What is zero trust?
  • How does Pexip support zero trust security?
  • Who should consider zero trust security?
  • How does zero trust security protect against hacks?

What does zero trust has to do with video conferencing, and why should you care? 

zero-trust-whitepaper-cover

Trusted by global organizations

Seal_of_the_U.S._Department_of_Veterans_Affairs.svg
US_Air_Force_Logo_Solid_Colour 1
EPA logo-1
GSA logo
The department pf treasury logo

Data privacy & control

Pexip is committed to upholding high standards of information security, privacy and transparency for its customers, partners and employees.

 

We do our utmost to make sure your data is private, protected, secure, and compliant with all relevant privacy regulations such as General Data Protection Regulation (GDPR)/EU Regulation 2016/679.

 

Our video collaboration platform strictly follows our ISO 27001 certified information security policies and is continuously tested with technology providers including Microsoft, Google, Cisco, and Poly to ensure high-quality video conferencing between platforms.

 

Read more about our commitment to privacy.

man wearing glasses thinking looking at monitor

Compliance

Our Pexip Information Security Management System (ISMS) is developed and maintained according to the ISO/IEC 27001:2013 standard and audited by DNV.

  • We have formalized internal information security best practices and implemented the practices from the ISO/IEC 27001:2013 standard.
  • We have formalized a management review of the information security management system and its performance.
  • Our company meets the requirements of relevant regulatory, contractual, and other legal obligations.
  • We are committed to meeting regulatory compliance with international laws and demonstrate worldwide recognition of excellence by employing an international framework with specific codes of practice.
  • We are committed to proactively testing both our software solution and service to ensure they meet high security standards. We conduct both Static and Dynamic Application Security Testing (SAST/DAST), as well as active penetration testing with a certified auditor.
woman wearing headphones looking at her laptop

Certifications of the Pexip solutions

Certifications_DISA
Unified Capabilities Approved Product List (UC APL)

by Defense Information Systems Agency (DISA)

Certifications_FIPS
FIPS 140 Level 2 validated

by Federal Information Processing Standard (FIPS) Publication 140-2 compliance

Certifications_CNN
CCN (Centro Criptologico Nacional)

by Spanish public agency to ensure security of ICT systems, particularly in the public sector

Certifications_ISO
ISO 27001 and ISO 27701 certified organization

by DNV

Certifications_CSA
CSA STAR Level One

by CSA STAR Registry

Certifications_CSPN
CSPN

by French National Agency for Information Technology Security (ANSSI)

Compliance enabled by the Pexip solutions

HIPAA compliance

Enabling Health Insurance Portability and Accountability Act (HIPAA) compliance. 

GDPR compliance

Enabling General Data Protection Regulation (GDPR) compliance. 

HIPPA_compliant
GDPR_compliant

Schrems II: What's next for your personal data & digital privacy?

In 2020, the European Union's Court of Justice struck down a critical data-sharing agreement that allowed personal data to be lawfully transferred from the EU/EEA to the United States for storage and processing.

 

Accordingly, Pexip - as a secure European video conferencing software provider - has taken swift action to comply with the guidance provided by governmental agencies to ensure lawful cross-border data flows. Read here for more information on the implications of the Schrems II ruling, and Pexip's response to the EU-U.S. Privacy Shield invalidation.

Security-related features and capabilities

The list is not exhaustive.

Pexip Infinity

Infinity powers Secure Meetings, Secure Collaboration and Business Continuity. The self-hosted solution supports the industry standards for communication encryption for end-user devices, ensuring that communication is secure and kept private even if it crosses the internet.

  • API support for customer-developed security policy stack
  • Private deployments
  • Encrypted communication
  • Best practises security measures
  • Network and Host IDS
  • Your own TLS certificates
Pexip_Infinity

Pexip Service

The Service leverages the best-in-class industry standards for communication encryption for meetings and end-user devices, ensuring that communication is secure and kept private.
  • Dedicated Pexip network
  • GDPR compliant
  • Continuous service monitoring
Pexip_Service
Pexip Infinity

Pexip Infinity

Infinity powers Secure Meetings, Secure Collaboration and Business Continuity. The self-hosted solution supports the industry standards for communication encryption for end-user devices, ensuring that communication is secure and kept private even if it crosses the internet.

  • API support for customer-developed security policy stack
  • Private deployments
  • Encrypted communication
  • Best practises security measures
  • Network and Host IDS
  • Your own TLS certificates
Pexip_Infinity
Pexip Service

Pexip Service

The Service leverages the best-in-class industry standards for communication encryption for meetings and end-user devices, ensuring that communication is secure and kept private.
  • Dedicated Pexip network
  • GDPR compliant
  • Continuous service monitoring
Pexip_Service