Join Teams meetings from Zoom Rooms. Zoom & Pexip partnership
Pexip Secure Meetings

Secure meetings with complete data control

A self-hosted and secure video conferencing solution that can be used in any meeting room or on any device.

Pexip-Secure-Meetings-on-dark-blue-background
important_devices

Modern
UX

settings

Customizable
platform

deployed_code

Easy
setup

readiness_score

Reliable
performance

encrypted

Advanced
security

Privacy, control, and compliance drive the need for secure meetings

Manage risk and compliance with robust protection standards tailored to every industry.

verified_user

Compliance & data control

Adhere to data sovereignty requirements by ensuring data transfer and storage align with local regulations. By self-hosting the deployment, you can be confident that your data remains your data.

fingerprint

User access & authentication

Use advanced authentication to ensure only the right people attend the right meeting at the right time. Grant access based on attributes like role, device type, location, and IP address.

settings_backup_restore

Redundancy & backup

Implement resilient video meetings as part of your business communication plan, whether to comply with regulations such as NIS2 or to ensure uninterrupted access to a collaboration platform.

Business continuity
encrypted

Zero trust architecture

Adhere to zero trust principles by enforcing continuous identity and integrity verification for all users and devices, irrespective of location, and implementing stringent access controls and authentication measures.

Zero trust architecture

A modern platform

Pexip Secure Meetings is a self-hosted video conferencing solution. Designed to run in private or sovereign clouds, or on-premises. The solution is easy to install, manage, and scale – you can be up and running in a couple of hours.

Designed-to-run-in-private-or-sovereign-clouds

Trusted by

Customer_logos_Seal_of_the_U.S._Department_of_Veterans_Affairs.svg
Bundesagentur_für_Arbeit-Logo.svg
US_Air_Force_Logo_Solid_Colour 1
Capgemini logo-1
The department pf treasury logo

Your secure meeting alternative

Pexip Secure Meetings can operate alongside your regular meeting solution,
catering to restricted meetings that require privacy and control.
differing security and privacy policies

Easily book secure meetings

Secure Scheduler for Exchange

Book Secure Meetings with an Outlook add-in button to ensure your meetings are fully compliant – and as easy to schedule as your everyday meetings.

Secure Scheduler for Web

Enjoy hassle-free scheduling for situations where you cannot use Exchange but require a secure scheduling tool that is easy to use and manage.
Secure-Scheduler-for-Web

Ensure your security & privacy requirements are met with a self-hosted meeting platform

complementary video ervice for security requirements

Build trust through a familiar branded interface

Create a personalized user experience

Customize your meeting experience and build trust. Logo, colors, images and text. Your branding before, during and after the call.

Ensure that the right person attends the right meeting

Verify users’ identities by authenticating against the identity provider of your choice to ensure zero trust.

Leverage your identity provider of choice

Ensure only authorized and identified individuals enter a meeting. 

 

Integrate with identity providers, like Google, Microsoft, or Okta for secure access.

 

Authenticate users through Single Sign-On protocols such as SAML 2.0 and Open ID connect (OIDC) for easy, secure logins.

Kick authentication up a notch

Pexip's access control uses a policy server with Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC) for security and customization.

 

It assigns access by roles (RBAC) and fine-tunes permissions with ABAC, ensuring precise control and protection of sensitive resources.

Encourage situational awareness

Create security awareness

Begin the meeting with a brief, automated message to alert attendees of the advanced security measures in place.

Integrate and customize solutions

Harness our APIs and SDKs for your platform

Leverage our comprehensive APIs and SDKs to:

  • Tailor the platform to your specific needs, including user interface design and functionality
  • Integrate with existing systems and workflows
  • Conform to your unique security requirements – our definition of security is your definition of security
Video meeting APIs and SDKs for your platform

You own all data associated to your meetings

Your data is your data

In shared cloud solutions you don't get to know where your data goes. Maintain complete control over the routing, storage, and handling of your video traffic, including associated data and metadata such as call detail records, personally identifiable information, and meeting patterns. 

 

Learn more about how to keep video conferencing data secure.

Your data is your data

Compliance made easy

Adhere to data sovereignty requirements by ensuring data storage and transfer align with local regulations. This adherence not only ensures legal compliance but also aligns with regional data handling and security mandates.

Compliance made easy

Stay in control of AI data

Privately and securely enable AI features for your video meetings, while keeping all training and input data within the borders of your organization. For industries under strict regulations and security requirements.

Certified by the strictest security standards worldwide

Pexip prioritized security from day 1. Because security can't be retrofitted.

Anssi 2
CCN logo
DISA logo
FIPS2 logo

Get started with secure meetings

3D_bracket_tall_dark_blue