Meetgeek Security Portal

Start your security review
View & download sensitive information
Ask for information
Search items
ControlK

Overview

Welcome to Meetgeek's Trust Center. Our commitment to data privacy and security is embedded in every part of our business. Use this Trust Center to learn about our security posture and request access to our security documentation.

We maintain a security program to implement and maintain enterprise-grade security on our products and services.

Compliance

  • SOC 2 Type 2 compliance against the Trust Services Criteria for security, privacy and confidentiality
  • GDPR
  • HIPAA (via Business Associate Agreement). We are able to sign Business Associate Agreements in support of customers’ compliance with the Health Insurance Portability and Accountability Act (HIPAA). Please reach out to our team if you have a qualifying use case.

How can I get a Data Processing Addendum (DPA)?

Reach out to our team to execute our Data Processing Addendum.

Compliance

CCPA Logo
CCPA
GDPR Logo
GDPR
HIPAA Logo
HIPAA
SOC 2 Logo
SOC 2
Start your security review
View & download sensitive information
Ask for information

Meetgeek is reviewed and trusted by

Keap-company-logoKeap
H1-company-logoH1
Prezi-company-logoPrezi
Nike-company-logoNike
Airbase-company-logoAirbase
Appcues-company-logoAppcues
Otter Public Relations-company-logoOtter Public Relations
The Telegraph-company-logoThe Telegraph
Red Hat-company-logoRed Hat
Decathlon-company-logoDecathlon
AOL.com-company-logoAOL.com
Bosch Global-company-logoBosch Global
New York University-company-logoNew York University
ClickFunnels-company-logoClickFunnels
Workday-company-logoWorkday

Documents

Pentest Report
HIPAA
SOC 2
Data Processing Agreement
Penetration Testing
Access Control Policy
Anti-Malicious Software Policy
Asset Management Policy
Backup Policy
Business Continuity Policy
Data Classification Policy
Data Sanitization Policy
Encryption Policy
General Incident Response Policy
Information Security Policy
Password Policy
Risk Management Policy
Software Development Lifecycle

Risk Profile

Data Access LevelRestricted
Impact LevelLow
Recovery Time Objective4 hours
View more

Product Security

Audit Logging
Data Security
Integrations
View more

Reports

Network Diagram
PCI DSS
Pentest Report
View more

Data Security

Access Monitoring
Backups Enabled
Data Erasure
View more

App Security

Code Analysis
Credential Management
Secure Development Training
View more

Access Control

Data Access
Logging
Password Security

Infrastructure

Status Monitoring
Amazon Web Services
Anti-DDoS
View more

Endpoint Security

Disk Encryption
DNS Filtering
Endpoint Detection & Response
View more

Network Security

Data Loss Prevention
DNSSEC
Firewall
View more

Corporate Security

Asset Management Practices
Email Protection
Employee Training
View more

Policies

Access Control Policy
Anti-Malicious Software Policy
Asset Management Policy
View more

Security Grades

CryptCheck
Meetgeek App
A+
Qualys SSL Labs
Meetgeek.ai App
A+

If you need help using this Trust Center, please contact us.

If you think you may have discovered a vulnerability, please send us a note.

Powered bySafeBase Logo