Planning a hybrid event? See how Array's hybrid solution works
Design and Compliance
In a climate of data breaches and privacy concerns plaguing the software industry, Array is committed to security. In doing so, Array leverages industry-standard infrastructure to run Array’s software using Amazon Web Services (AWS) which enables robust access- control, monitoring, and multiple layers of encryption. Data and backups are encrypted at rest and all application servers transmit data to browsers securely over HTTPS. Technologies used at Array are regularly reviewed for vulnerabilities and configuration mistakes that could cause data to be leaked.
Culture of Security
To bolster information security, Array actively works to maintain its company culture of information security and technological excellence. Through Array’s use of modern technologies, Array works to ensure its application and infrastructure are maintained to enterprise levels of security and reliability. Array empowers all of its employees to keep data safe and secure, regardless of role or responsibility. All Array employees vigilantly work to protect customer data and undergo annual security and privacy training in order to stay abreast of the latest security and privacy threats and trends.
In-person and Hybrid Event and Meeting Security
Some of the greatest risks for security breaches are during in-person and hybrid meetings and events. Hotels and public venue spaces are notorious for cyber-attacks and data theft. Array is able to address this issue by setting up its own highly-controlled network environment in most instances in order to create a secure space for data and information to be transferred and stored. Array configures closed wireless networks on-site using WPA2 encryption so that only approved devices can connect. Traffic to and from Array’s application to participant devices are sent encrypted over HTTPS preventing breaches like “man-in-the-middle” attacks. Additionally, Array’s on-premise servers used at events implement secure password authentication and utilize full disk encryption which protects data even if a malicious actor were to gain physical access.