Private & secure video conferencing solutions

Security
Security is paramount to us. Everything we do is built around providing a secure video platform for our customers.
Read moreData privacy & control
Your data is always your own. We do not sell or share your data with any third parties.
Read moreCompliance
Pexip’s platform is designed to meet the strictest U.S. Federal & European requirements.
Read morePexip is committed to upholding high standards of information security, privacy and transparency.

Security
More than just encryption
Pexip uses industry-standard encryption and security protocols to control access and to prevent unwanted audiences from listening in.
To provide information security in areas that encryption cannot address, Pexip has been developed from the ground up within the constraints of a Defense-in-Depth cybersecurity architecture. Our cyber architecture focuses on applying a holistic approach to security and is designed to address all aspects of the threat model, including application, network, and operational security elements.
Pexip has implemented a sophisticated Software Development Life Cycle (SDLC), which enables us to constantly roll out new features, new capabilities, and provide ongoing maintenance and fixes. We have a solid internal culture built on strong privacy and security practices. Our security practises focus on the organisation as a whole; from organisational security procedures, to our people hiring policies and employee security policies, to where and how our products are developed.

Our security features
- NIST validated FIPS 140-2 encryption module
- Zero Trust architecture (ZTA) compliant policy stack
- Use of industry-standard protocols, and full regulation compliance
- Data sovereignty and insights
- Customizable workflows and features to ensure compliance with desired level of security
- Deployable in private clouds

Zero trust architecture is shaping the future of data security
- What is zero trust?
- How does Pexip support zero trust security?
- Who should consider zero trust security?
- How does zero trust security protect against hacks?
What does zero trust has to do with video conferencing, and why should you care?

Trusted by global organizations


Data privacy & control
Pexip is committed to upholding high standards of information security, privacy and transparency for its customers, partners and employees.
We do our utmost to make sure your data is private, protected, secure, and compliant with all relevant privacy regulations such as General Data Protection Regulation (GDPR)/EU Regulation 2016/679.
Our video collaboration platform strictly follows our ISO 27001 certified information security policies and is continuously tested with technology providers including Microsoft, Google, Cisco, and Poly to ensure high-quality video conferencing between platforms.
Read more about our commitment to privacy.

Compliance
Our Pexip Information Security Management System (ISMS) is developed and maintained according to the ISO/IEC 27001:2013 standard and audited by DNV.
- We have formalized internal information security best practices and implemented the practices from the ISO/IEC 27001:2013 standard.
- We have formalized a management review of the information security management system and its performance.
- Our company meets the requirements of relevant regulatory, contractual, and other legal obligations.
- We are committed to meeting regulatory compliance with international laws and demonstrate worldwide recognition of excellence by employing an international framework with specific codes of practice.
- We are committed to proactively testing both our software solution and service to ensure they meet high security standards. We conduct both Static and Dynamic Application Security Testing (SAST/DAST), as well as active penetration testing with a certified auditor.

Certifications of the Pexip solutions

Unified Capabilities Approved Product List (UC APL)
by Defense Information Systems Agency (DISA)

FIPS 140 Level 2 validated
by Federal Information Processing Standard (FIPS) Publication 140-2 compliance

CCN (Centro Criptologico Nacional)
by Spanish public agency to ensure security of ICT systems, particularly in the public sector

ISO 27001 and ISO 27701 certified organization
by DNV

CSA STAR Level One
by CSA STAR Registry

CSPN
by French National Agency for Information Technology Security (ANSSI)
Compliance enabled by the Pexip solutions
HIPAA compliance
GDPR compliance
Enabling General Data Protection Regulation (GDPR) compliance.


Schrems II: What's next for your personal data & digital privacy?
In 2020, the European Union's Court of Justice struck down a critical data-sharing agreement that allowed personal data to be lawfully transferred from the EU/EEA to the United States for storage and processing.
Accordingly, Pexip - as a secure European video conferencing software provider - has taken swift action to comply with the guidance provided by governmental agencies to ensure lawful cross-border data flows. Read here for more information on the implications of the Schrems II ruling, and Pexip's response to the EU-U.S. Privacy Shield invalidation.
Pexip's security-related offerings
Security-related features and capabilities
Pexip Infinity
Infinity powers Secure Meetings, Secure Collaboration and Business Continuity. The self-hosted solution supports the industry standards for communication encryption for end-user devices, ensuring that communication is secure and kept private even if it crosses the internet.
- API support for customer-developed security policy stack
- Private deployments
- Encrypted communication
- Best practises security measures
- Network and Host IDS
- Your own TLS certificates

Pexip Service
- Dedicated Pexip network
- GDPR compliant
- Continuous service monitoring

Pexip Infinity
Infinity powers Secure Meetings, Secure Collaboration and Business Continuity. The self-hosted solution supports the industry standards for communication encryption for end-user devices, ensuring that communication is secure and kept private even if it crosses the internet.
- API support for customer-developed security policy stack
- Private deployments
- Encrypted communication
- Best practises security measures
- Network and Host IDS
- Your own TLS certificates

Pexip Service
- Dedicated Pexip network
- GDPR compliant
- Continuous service monitoring
