top of page
Search

Private and Secure Video Conferencing Solutions with Pexip



Pexip is committed to upholding high standards of information security, privacy and transparency for its customers, partners and employees.


Pexip offers multiple deployment options from a self-hosted solution, Pexip Infinity, to a private cloud solution call Pexip Private Cloud and a cloud services, the Pexip Service giving you the flexibility to choose what to do with your vide conferencing data and how you want to manage it.


Security at the Highest Level


Pexip's approach to a secure video platform adheres to the strictest security standards established by such risk management frameworks as GDPR, NIST SP 800-37, ISO 27001, PCI DSS, and HIPAA among others. Compliance and certifications of the Pexip solution include:


  • Unified Capabilities Approved Product List (UC APL)

  • FIPS 140 Level 2 Validated

  • Enables HIPAA Compliancy

  • CSA STAR Level One

  • ISO 22001 Certified Company

More Than Just Encryption


Pexip uses industry-standard encryption and security protocols to control access and to prevent unwanted audiences from listening in.


To provide information security in areas that encryption cannot address, Pexip has been developed from the ground up within the constraints of a Defense-in-Depth cybersecurity architecture. Their cyber architecture focuses on applying a holistic approach to security and is designed to address all aspects of the threat model, including application, network, and operational security elements.


Pexip has a very sophisticated Software Development Life Cycle (SDLC), because they know that as an application, they are going to be constantly rolling out new features, new capabilities, and patching and fixing things. They have a solid internal culture built on strong privacy and security practices. Their security practises focus on the organisation as a whole; from organisational security procedures, to our people hiring policies and employee security policies, to where and how their products are developed.



Security Features Include

  • NIST validated FIPS 140-2 encryption module

  • Zero Trust architecture (ZTA) compliant policy stack

  • Use of industry-standard protocols, and full regulation compliance

  • Data sovereignty and insights

  • Customizable workflows and features to ensure compliance with desired level of security

  • Deployable in private clouds

Zero Trust Security Architecture


Learn how Zero Trust (ZT) is shaping the future of data security and how to optimize your ZT environment with Pexip.



  • What is Zero Trust (ZT)?

  • How does Pexip support ZT security?

  • Who should consider ZT security?

  • How does ZT security protect against hacks?


Pexip does their utmost to make sure your data is private, protected, secure, and compliant with all relevant privacy regulations such as General Data protection Regulation (GDPR)/ EU Regulation 2016/679. their video collaboration platform strictly follows their ISO 27001 certified information security policies and is continuously tested with technology providers including Microsoft, Google, Cisco, and Poly to ensure high-quality video conferencing between platforms.



Pexip's Information Security Management System (ISMS) is developed and maintained according to the ISO/IEC 27001:2013 standard and is independently audited by DNV GL.


What Does This Mean for you as a Customer?


  • They have formalized internal information security best practices and implemented the practices from the ISO/IEC 27001:2103 standard.

  • They have formalized a management review of the information security management system and its performance.

  • Their company meets the requirements of relevant regulatory, contractual, and other legal obligations.

  • They are committed to meeting regulatory compliance with international laws and demonstrate worldwide recognition of excellence by employing an international framework with specific codes of practice.

  • they are committed to proactively testing both our software solution and service to ensure they meet high security standards. We conduct both Static and Dynamic Application Security Testing (SAST/DAST), as well as active penetration testing with a certified auditor.



-


Contact Kathea for more information and pricing on our Pexip Solutions!


Get In Touch With Us

info@kathea.co.za

011 844 9900

38 views
bottom of page