Software & Network Security

Compliance with industry security standards.

High level features

Custom Design
Dynamic Content
Automated Emails
Access Codes
Open/Closed Registration
Data Collection

How it Works

Our systems are highly compliant and use the highest encryption for storing PCI DSS Certification. We also maintain SOC 2 compliance and undergo regular audits to protect the privacy and security of our customers’ information, as well as preserve the high-availability of our system.

Best Practices

  • Network and web application firewall capabilities using AWS lets us create private segregated networks, and control access to unique instances
  • Automated intrusion detection automatically blocks malicious traffic
  • Encryption in transit over TLSv1.2 across all services
  • AES encryption of data at rest with regularly cycled keys allows you to satisfy PII compliance requirements
  • Multi-factor authentication
  • Regular penetration tests and auditing

Account Permissions

Tiered permissions restrict user accounts from accessing data that is unnecessary or sensitive. Read-only access to areas of the admin allow for visibility but stop users from changing things that they shouldn’t.

Ready to discover the event platform you’ve been searching for?

Tell us a little about your event and let us show you how we can help successfully pivot it to virtual.

Get a Quote

Fill out our quote request form to give us a better understanding of your event’s needs, and our team will get back to you with some numbers.  

Fill out form

Send us an email, so we can get in touch quickly to discuss your upcoming event.

Thank you! Your submission has been received!
Oops! Please try again.