We’re committed to safety and security

We’ve built a unified security strategy and roadmap to keep us focused and current with best practices.

Data protected in transit using TLS security
One way encryption of passwords using salted hashes and AES encryption
Granular application access controls
SAML-based SSO
Robust network security and firewalls with intrusion detection systems
Physical security via our SOC2 compliant data center
Regular security audits and penetration testing
Full disaster recovery procedures and offsite backups utilizing AES encryption
SOC@ Type 1 certified
Data protected in transit using TLS security
One way encryption of passwords using salted hashes and AES encryption
Granular application access controls
SAML-based SSO
Robust network security and firewalls with intrusion detection systems
Physical security via our SOC2 compliant data center
Regular security audits and penetration testing
Full disaster recovery procedures and offsite backups utilizing AES encryption
SOC@ Type 1 certified
SOC@ Type 1 certified
Full disaster recovery procedures and offsite backups utilizing AES encryption
Data protected in transit using TLS security
Regular security audits and penetration testing
Physical security via our SOC2 compliant data center
Robust network security and firewalls with intrusion detection systems
SAML-based SSO
Granular application access controls
One way encryption of passwords using salted hashes and AES encryption
Data protected in transit using TLS security
One way encryption of passwords using salted hashes and AES encryption
Granular application access controls
SAML-based SSO
Robust network security and firewalls with intrusion detection systems
Physical security via our SOC2 compliant data center
Regular security audits and penetration testing
Full disaster recovery procedures and offsite backups utilizing AES encryption
SOC@ Type 1 certified
Data protected in transit using TLS security
One way encryption of passwords using salted hashes and AES encryption
Granular application access controls
SAML-based SSO
Robust network security and firewalls with intrusion detection systems
Physical security via our SOC2 compliant data center
Regular security audits and penetration testing
Full disaster recovery procedures and offsite backups utilizing AES encryption
SOC@ Type 1 certified
Data protected in transit using TLS security
One way encryption of passwords using salted hashes and AES encryption
Granular application access controls
SAML-based SSO
Robust network security and firewalls with intrusion detection systems
Physical security via our SOC2 compliant data center
Regular security audits and penetration testing
Full disaster recovery procedures and offsite backups utilizing AES encryption
SOC@ Type 1 certified

Multi-layered protection

Our security strategy involves multiple layers to protect sensitive information. Utilizing government level encryption, robust network boundaries, access controls including role driven access, and other best practices, we are working to ensure data is protected at rest and in transmission.

Constant evaluation

Security threats change constantly, so we are always evaluating and evolving our system and processes for improvements and vulnerabilities.

Privacy first

We do not share or sell personal information with any third-party organizations.

Ready to secure your next event?

Get started by booking a demo now. Enter your email address and speak with a member of the MeetingPlay team.