FIPS 140 Level 2 Validated
Enables HIPAA Compliancy
ISO 27001 Certified Company
Pexip is committed to upholding high standards of information security, privacy and transparency for its customers, partners and employees.
We offer security-first, enterprise-grade video conferencing solutions using industry-standard encryption and security protocols to maintain privacy and security.
Schrems II: What's next for your personal data & digital privacy?
In 2020, the European Union's Court of Justice struck down a critical data-sharing agreement that allowed personal data to be lawfully transferred from the EU/EEA to the United States for storage and processing.
Accordingly, Pexip - as a secure European video conferencing software provider - has taken swift action to comply with the guidance provided by governmental agencies to ensure lawful cross-border data flows. Read here for more information on the implications of the Schrems II ruling, and Pexip's response to the EU-U.S. Privacy Shield invalidation.
Security in the Pexip Service
White paper: Pexip and the NCSC's Cloud Security Principles
The UK’s National Cyber Security Centre has specified 14 Cloud Security Principles (CSPs) to inform organizations how to configure, implement and operate cloud services in a secure manner. This whitepaper reflects safeguards employed by Pexip in the context of these CSPs.
Dedicated Pexip network
All video and content traffic, except the last mile, runs on our dedicated network - a global network designed and built just for video and content sharing.Learn More
The EU GDPR, followed by national privacy laws, bring strict requirements regarding how long personal data may be retained. Pexip is required and committed to process personal data accordingly.Learn More
Continuous service monitoring
Pexip has a dedicated team monitoring the cloud service 24 hours per day, 7 days per week to address service impacting or security threats.Contact Us
Pexip’s Direct Peering solution gives you a direct connection from your office to the Pexip Service, reducing the risk for “man-in-the-middle” attacks by keeping your traffic from traversing unneeded paths like the internet.
Security in the Pexip Infinity self-hosted solution
Run the entire meeting platform on-premises and inside your network, or on any private cloud you choose. You’ll benefit from all the security measures you already have in place, plus those in place by your cloud provider.Learn More
The PexOS operating system
Pexip Infinity uses a customized, cut-down version of Linux that has been specifically designed to avoid exposing unnecessary network services. This naturally limits the “attack surface” available to an attacker.
Pexip Infinity supports the latest industry standards for communication encryption for end-user devices including AES-256, ensuring that communication encryption is as strong as possible.Learn More
Encrypt legacy devices
Make it private
Your own TLS certificates
Enhance security using policies
Best practices security measures
Network and Host IDS
Read more - Pexip Security blog
12 September 2020
Key privacy and security considerations when choosing a video conferencing solution
Giles Chamberlin, Pexip's CTO, discusses some key privacy and security considerations to make when c...
28 August 2020
Upholding privacy and security: How Pexip aligns with the 14 Cloud Security Principles
The National Cyber Security Centre (NCSC) has established 14 Cloud Security Principles to help guide...
26 August 2020
The EU-U.S. Privacy Shield Invalidation: Pexip’s Response and Preparedness
Data privacy is paramount for video communications, and Pexip is committed to keeping your data secu...
Data privacy is paramount for video communications, and Pexip is committed to keeping your data secure
As more workers stay home to reduce the risk of Covid-19 exposure, the need for collaboration soluti...
Video communications: The natural choice for business continuity in response to Coronavirus
Concern around the spread of Coronavirus has accelerated many of the collaboration trends we already...