Security & privacy

Whether you choose self-hosted software or as-a-service, we ensure that your data is secure and protected.

 

Talk to Sales

jitc-certified-1

JITC Certified

FIPS logo-1-1

FIPS 140 Level 2 Validated

hipaa_logo-01-2-1

Enables HIPAA Compliancy

Artboard 1-1-1-1

ISO 27001 Certified Company

 

security-product-sheet-1

 

Pexip is committed to upholding high standards of information security, privacy and transparency for its customers, partners and employees.
We offer security-first, enterprise-grade video conferencing solutions using industry-standard encryption and security protocols to maintain privacy and security.
Learn more →
Download product sheet →

 

Making-secure-video-calls

Schrems II: What's next for your personal data & digital privacy?

In 2020, the European Union's Court of Justice struck down a critical data-sharing agreement that allowed personal data to be lawfully transferred from the EU/EEA to the United States for storage and processing.

Accordingly, Pexip - as a secure European video conferencing software provider - has taken swift action to comply with the guidance provided by governmental agencies to ensure lawful cross-border data flows. Read here for more information on the implications of the Schrems II ruling, and Pexip's response to the EU-U.S. Privacy Shield invalidation.

Security - Pexip Service

8-1

White paper: Pexip and the NCSC's Cloud Security Principles

The UK’s National Cyber Security Centre has specified 14 Cloud Security Principles (CSPs) to inform organizations how to configure, implement and operate cloud services in a secure manner. This whitepaper reflects safeguards employed by Pexip in the context of these CSPs.

Read more

Based on Infinity technology

The Pexip service is based on the same core Infinity technology as our self-hosted software solutions.

Discover Flexible Deployment

laptop@2x-2

Dedicated Pexip network

All video and content traffic, except the last mile, runs on our dedicated network - a global network designed and built just for video and content sharing.

Learn More

GDPR compliant

The EU GDPR, followed by national privacy laws, bring strict requirements regarding how long personal data may be retained. Pexip is required and committed to process personal data accordingly.

Learn More

Continuous service monitoring

Pexip has a dedicated team monitoring the cloud service 24 hours per day, 7 days per week to address service impacting or security threats.

Contact Us

Pexip’s Direct Peering solution gives you a direct connection from your office to the Pexip Service, reducing the risk for “man-in-the-middle” attacks by keeping your traffic from traversing unneeded paths like the internet. 

Learn more

 

Futurum Podcast_ Part One-1

 

 

What's the best approach to ensure privacy and security in your video conferencing solution? 

Learn more in the podcast with Daniel Newman from Futurum Research and Giles Chamberlin, Pexip CTO and Co-Founder. 

Learn more

 

 

 

The Pexip Infinity self-hosted solution

Private deployments

Run the entire meeting platform on-premises and inside your network, or on any private cloud you choose. You’ll benefit from all the security measures you already have in place, plus those in place by your cloud provider.

Learn More

The PexOS operating system

Pexip Infinity uses a customized, cut-down version of Linux that has been specifically designed to avoid exposing unnecessary network services. This naturally limits the “attack surface” available to an attacker.

Encrypted communication

Pexip Infinity supports the latest industry standards for communication encryption for end-user devices including AES-256, ensuring that communication encryption is as strong as possible.

Learn More
secure-1

Encrypt legacy devices

Pexip Infinity can connect legacy devices in the corporate network (which may not independently support encryption) and enable encryption when connecting to external devices that do support encryption.
Video Conference-2

Avoid eavesdropping

Pexip always displays the full meeting attendee roster and has conference features such as the on-screen audio avatar and +n indicator. These features make it hard for uninvited guests to go undetected.
Locked Database-1

Make it private

Pexip supports PIN-protected Virtual Meeting Rooms for an additional layer of security and allows all meeting hosts to lock the room. Additional participants are then allowed to enter only through a lobby.
Check-2

Your own TLS certificates

Pexip Infinity supports TLS and installation of your own TLS certificates – so clients and other servers can verify that they have genuinely connected to the correct Pexip Infinity server.
hospital copy-2

Enhance security using policies

Organizations can use policies to allow or restrict calls into their service based on a variety of information, for example, the location of the caller.
Video Conference_3-2

One-time-use VMRs

Meetings scheduled using the Pexip Exchange scheduling solution use Virtual Meeting Rooms with unique, randomly-generated aliases - which only exist for the duration of the meeting.
No IT admin Icon-2

Best practices security measures

Pexip Service PoPs (Points of Presence) are managed by industry-leading facilities, and include multiple layers of security. These layers range from human and personnel security to compliance with relevant standards such as ISO/IEC 27001, SSAE 18 and NIST SP 800-53.
secure-2

Industry-standard encryption

For endpoint registrations, media traveling on the Pexip Service uses industry-standard encryption to enable Secure Real-Time Transport (SRTP). By default, signaling is encrypted using SIP TLS.
cloud data access-2

Network and Host IDS

Pexip uses IDS/IPS solutions to help protect your service hosts. This includes alerting administrators of malicious activity and policy violations, as well as identifying and taking action against attacks.

Read more - Pexip Security blog

23 March 2021

Encryption in the Pexip Ecosystem

Joel Bilheimer discusses what encryption and end-to-end encryption (E2EE)  mean to an enterprise col...

Read More

12 September 2020

Key privacy and security considerations when choosing a video conferencing solution

Giles Chamberlin, Pexip's CTO, discusses some key privacy and security considerations to make when c...

Read More

28 August 2020

Upholding privacy and security: How Pexip aligns with the 14 Cloud Security Principles

The National Cyber Security Centre (NCSC) has established 14 Cloud Security Principles to help guide...

Read More

26 August 2020

The EU-U.S. Privacy Shield Invalidation: Pexip’s Response and Preparedness

Data privacy is paramount for video communications, and Pexip is committed to keeping your data secu...

Read More

Breaking Down Video Conferencing Privacy And Security

This is part one of a podcast series with Futurum Research called Navigate. The six-part series aims...

Read More

Secure Cloud Video Conferencing: 3 Key Areas to Consider

Remote working has skyrocketed in response to COVID-19, with IT leaders fast-tracking purchases of c...

Read More

How to better secure your video meetings

The concern around the spread of Covid-19 (Coronavirus) has accelerated many of the collaboration tr...

Read More

Data privacy is paramount for video communications, and Pexip is committed to keeping your data secure

As more workers stay home to reduce the risk of Covid-19 exposure, the need for collaboration soluti...

Read More

How Pexip created a telework policy to support its culture of remote work

As a video conferencing company, remote work is in our DNA. In fact, roughly half of our employees w...

Read More

How to Plan for a Successful Video Meeting

Whether you're new to video meetings or simply want to get the most from them, there are a few tips ...

Read More

Video communications: The natural choice for business continuity in response to Coronavirus

Concern around the spread of Coronavirus has accelerated many of the collaboration trends we already...

Read More

Why Security is Imperative for Video Meetings

Have you seen the movie “Snowden”? In the film, the infamous Edward Snowden (contractor for the NSA)...

Read More