Security & privacy are at the core of everything we do.

Your security and privacy are really important to you, so they're really important to us, too.

 

TALK TO SALES

According to a recent industry report, the average enterprise uses nearly 2,000 services - services that potentially threaten the exposure of user data, intellectual property, and confidential material.

At Pexip, we do our utmost to make sure your data is private, protected, and secure. We developed our product to ensure that only you and your guests can see who’s in the meeting and what’s being presented. Pexip also included additional advanced security measures to keep your information private.

The Pexip Infinity self-hosted solution

Private deployments

Run the entire meeting platform on-premises and inside your network, or on any private cloud you choose. You’ll benefit from all the security measures you already have in place, plus those in place by your cloud provider.

Learn more

The PexOS operating system

Pexip Infinity uses a customized, cut-down version of Linux that has been specifically designed to avoid exposing unnecessary network services. This naturally limits the “attack surface” available to an attacker.

Encrypted communication

Pexip Infinity supports the latest industry standards for communication encryption for end-user devices, ensuring that communication encryption is as strong as possible.

Learn more
secure

Encrypt legacy devices

Pexip Infinity can connect legacy devices in the corporate network (which may not independently support encryption) and enable encryption when connecting to external devices that do support encryption.
Video Conference

Avoid eavesdropping

Pexip always displays the full meeting attendee roster and has conference features such as the on-screen audio avatar and +n indicator. These features make it hard for uninvited guests to go undetected.
Locked Database

Make it private

Pexip supports PIN-protected Virtual Meeting Rooms for an additional layer of security and allows all meeting hosts to lock the room. Additional participants are then allowed to enter only through a lobby.
Check

Your own TLS certificates

Pexip Infinity supports TLS and installation of your own TLS certificates – so clients and other servers can verify that they have genuinely connected to the correct Pexip Infinity server.
hospital copy

Enhance security using policies

Organizations can use policies to allow or restrict calls into their service based on a variety of information, for example, the location of the caller.
Video Conference_3

One-time-use VMRs

Meetings scheduled using the Pexip Exchange scheduling solution use Virtual Meeting Rooms with unique, randomly-generated aliases - which only exist for the duration of the meeting.
jitc-certified

JITC Certified

fips-140-2

FIPS 140 Level 2 Validated

hipaa

HIPAA Compliant

Pexip as-a-service

Based on Infinity technology

The Pexip service is based on the same core Infinity technology as our self-hosted software solutions.

TALK TO SALES

laptop@2x

Dedicated Pexip network

All video and content traffic, except the last mile, runs on our dedicated network - a global network designed and built just for video and content sharing.

 

Learn more

GDPR compliant

The EU GDPR, followed by national privacy laws, bring strict requirements regarding how long personal data may be retained. Pexip is required and committed to process personal data accordingly.

Learn more

Continuous service monitoring

Pexip has a dedicated team monitoring the cloud service 24 hours per day, 7 days per week to address service impacting or security threats.

Contact Us
No IT admin Icon

Best practices security measures

Pexip Service PoPs (Points of Presence) are managed by industry-leading facilities, and include multiple layers of security. These layers range from human and personnel security to compliance with relevant standards such as SOC2, SSAE16, and ISO 27001.
secure

Industry-standard encryption

For endpoint registrations, media traveling on the Pexip Service uses industry-standard end-to-end encryption using AES-128, enabling Secure Real-Time Transport (SRTP). By default, signaling is encrypted using SIP TLS.
cloud data access

Network and Host IDS

Pexip uses IDS/IPS solutions to help protect your service hosts. This includes alerting administrators of malicious activity and policy violations, as well as identifying and taking action against attacks.