Pexip is committed to upholding high standards of information security, privacy and transparency for its customers, partners and employees.
We offer security-first, enterprise-grade video conferencing solutions using industry-standard encryption and security protocols to maintain privacy and security.
Learn more →
Download product sheet →

JITC Certified

FIPS 140 Level 2 Validated

Enables HIPAA Compliancy

ISO Certified Company
Security - Pexip Service
White paper: Pexip and the NCSC's Cloud Security Principles
The UK’s National Cyber Security Centre has specified 14 Cloud Security Principles (CSPs) to inform organizations how to configure, implement and operate cloud services in a secure manner. This whitepaper reflects safeguards employed by Pexip in the context of these CSPs.

Dedicated Pexip network
All video and content traffic, except the last mile, runs on our dedicated network - a global network designed and built just for video and content sharing.
GDPR compliant
The EU GDPR, followed by national privacy laws, bring strict requirements regarding how long personal data may be retained. Pexip is required and committed to process personal data accordingly.
Continuous service monitoring
Pexip has a dedicated team monitoring the cloud service 24 hours per day, 7 days per week to address service impacting or security threats.
The Pexip Infinity self-hosted solution
Private deployments
Run the entire meeting platform on-premises and inside your network, or on any private cloud you choose. You’ll benefit from all the security measures you already have in place, plus those in place by your cloud provider.
The PexOS operating system
Pexip Infinity uses a customized, cut-down version of Linux that has been specifically designed to avoid exposing unnecessary network services. This naturally limits the “attack surface” available to an attacker.
Encrypted communication
Pexip Infinity supports the latest industry standards for communication encryption for end-user devices including AES-256, ensuring that communication encryption is as strong as possible.
/secure.png?width=622&name=secure.png)
Encrypt legacy devices
/Video%20Conference.png?width=622&name=Video%20Conference.png)
Avoid eavesdropping
Make it private
Your own TLS certificates
Enhance security using policies
One-time-use VMRs
Best practices security measures
Industry-standard encryption
Network and Host IDS
Read more - Pexip Security blog

12 September 2020
Key privacy and security considerations when choosing a video conferencing solution
Giles Chamberlin, Pexip's CTO, discusses some key privacy and security considerations to make when c...

28 August 2020
Upholding privacy and security: How Pexip aligns with the 14 Cloud Security Principles
The National Cyber Security Centre (NCSC) has established 14 Cloud Security Principles to help guide...

26 August 2020
The EU-U.S. Privacy Shield Invalidation: Pexip’s Response and Preparedness
Data privacy is paramount for video communications, and Pexip is committed to keeping your data secu...

Breaking Down Video Conferencing Privacy And Security
This is part one of a podcast series with Futurum Research called Navigate. The six-part series aims...

Secure Cloud Video Conferencing: 3 Key Areas to Consider
Remote working has skyrocketed in response to COVID-19, with IT leaders fast-tracking purchases of c...

How to better secure your video meetings
The concern around the spread of Covid-19 (Coronavirus) has accelerated many of the collaboration tr...

Data privacy is paramount for video communications, and Pexip is committed to keeping your data secure
As more workers stay home to reduce the risk of Covid-19 exposure, the need for collaboration soluti...

How Pexip created a telework policy to support its culture of remote work
As a video conferencing company, remote work is in our DNA. In fact, roughly half of our employees w...

How to Plan for a Successful Video Meeting
Whether you're new to video meetings or simply want to get the most from them, there are a few tips ...

Video communications: The natural choice for business continuity in response to Coronavirus
Concern around the spread of Coronavirus has accelerated many of the collaboration trends we already...

Why Security is Imperative for Video Meetings
Have you seen the movie “Snowden”? In the film, the infamous Edward Snowden (contractor for the NSA)...