Protect Your Audience and Attendee Data Using 6Connex's Security-First Approach

6Connex has decades of experience securing virtual environments. We deliver risk-free events to our customers, building trust and protecting audiences worldwide.
6connex virtual event platform security and privacy in meeting room header
6connex virtual event security and privacy on laptops header

ISO 27001 Certification

6Connex is a pioneer of enterprise-level security in the virtual and hybrid event industry, achieving the ISO 27001 certification in 2017.

  • ISO 27001 is an international standard on how to best manage information security.
  • Compliance with ISO 27001 is certified by an accredited auditor.
  • This certification demonstrates that 6Connex uses internationally recognized processes and best practices in infrastructure and security management.

6Connex Security Standards

General Data Protection Regulation

6Connex’s technology teams are virtual event industry experts in the design and development of secure virtual environments and data protection. They’re committed to ensuring your virtual or hybrid event strictly adheres to GDPR security compliance regulations.

Securely Store and Backup All Virtual Environment Assets and Data

6Connex ensures all data that lives within your virtual event platform remains accessible and secure, and delivers centralized backup management for your entire virtual environment.

Third-Party Penetration Testing

6Connex implements third-party cloud penetration testing as a security measure to ensure sensitive data within your virtual environment is highly protected and ultra-secure.

Security Compliance Training for All 6Connex Employees

6Connex provides security compliance training to ensure our teams adhere to existing and emerging security and compliance requirements.

In-House and Third-Party Security and Systems Monitoring

Out of the box, 6Connex allows you to centrally manage and monitor third-party systems to ensure you always have a high-availability virtual environment.

Security and Resilience

Hosted within AWS, and encrypted using AMS KMS, is a secure and resilient service that uses FIPS 140-2 validated hardware security.

yellow to green gradient hexagon
gdpr certified icon

General Data Protection Regulation

6Connex's technology teams are virtual event industry experts in the design and development of secure virtual environments and data protection. They're committed to ensuring your virtual or hybrid event strictly adheres to GDPR security compliance regulations.

cloud backup icon

Securely Store and Backup All Virtual Environment Assets and Data

6Connex ensures all data that lives within your virtual event platform remains accessible and secure, and delivers centralized backup management for your entire virtual environment.

security penetration testing icon

Third-Party Penetration Testing

6Connex implements third-party cloud penetration testing as a security measure to ensure sensitive data within your virtual environment is highly protected and ultra-secure.

compliance training icon

Security Compliance Training for All 6Connex Employees

6Connex provides security compliance training to ensure our teams adhere to existing and emerging security and compliance requirements.

hacker monitoring software icon

In-House and Third-Party Security and Systems Monitoring

Out of the box, 6Connex allows you to centrally manage and monitor third-party systems to ensure you always have a high-availability virtual environment.

data encryption icon

Security and Resilience

Hosted within AWS, and encrypted using AMS KMS, is a secure and resilient service that uses FIPS 140-2 validated hardware security.

Advanced Controls and Settings

Compliance with Data Privacy Regulations to Stop Threats

Compliance with Data Privacy Regulations to Stop Threats

6Connex offers advanced security controls and settings to minimize exposure of personal data and ensure data is accessed as intended.

User Permissions and Access Controls

User Permissions and Access Controls

Entitlements allow virtual event planners and sponsors to control access to content, rooms, and booths based on predefined membership privileges.

Allowlist

Allowlist

Set and manage allowlist rules to control user registration based on IP addresses/ranges, domains, and email addresses.

Blocklist

Blocklist

Set and manage blocklist rules to block user registration based on IP addresses/ranges, domains, and email addresses that present serious security vulnerabilities.

Complex Passwords

Complex Passwords

6Connex enables you to enforce checks and response actions for failed logins, password complexity, password expiration, and password reuse.

Time Restrictions

Time Restrictions

Restrict users from exceeding reasonable virtual environment access based on schedules, connect times, and more.

Customized T&Cs

Customized T&Cs

Customize the Terms & Conditions text that is presented to your audience.

Information Privacy

girl sitting on computer with thumbs up

Secure Cookie Handling

6Connex properly protects cookies to mitigate risk of interception and enforce high levels of user privacy.

happy man with a fist

Privacy Policy

User privacy is important to 6Connex. Our Privacy Policy outlines how personal information is collected, used, and protected.

woman with glasses on a computer

Terms of Service

Thousands of people access 6Connex virtual environments every day. Our Terms of Service help define our relationship with our customers and their audiences.

Industry Leaders Trust 6Connex With Their Virtual Venues and Environments

Attendee Security Starts Here

Chat with an Expert

Try Free for 30 Days