Secure Your Events and Protect Your Data
Eventdrive meets the needs of the CISO and compliance
We are committed to meeting the needs and requirements of our clients, especially large companies operating in sectors such as finance, insurance, pharmaceuticals, and many others. We offer the creation of custom roles and permissions, automatic deletion of sensitive data collected #GDPR, secure authentication (SSO), high-security hosting, and high availability. Nothing is left out!
SSO Authentication
SSO authentication allows users to log into Eventdrive's event management platform using their credentials and their company's authentication system. This simplifies the login process by requiring only one set of credentials, thus improving the user experience.
Security is guaranteed, as you adhere to your company's authentication standards to protect user identity and data access. Additionally, when someone leaves the company, their account is automatically deactivated, ensuring they no longer have access to the platform. This helps maintain a high level of security and prevent unauthorized access.
SSO authentication can be enabled on the back office, as well as on the multi-event app, websites, and live events.
Concrete Benefits
• Reduced risk of data leaks
• Easy access for users
• Compliance with your company's authentication standards
• Automatic account deactivation
Protocols Supported by Eventdrive
OpenID Connect, SAMLv2, and Azure AD
Data Hosting
The solution and data are hosted on servers located in France (at OVH in Roubaix, Gravelines, Strasbourg) and are managed by MYQAA, the publisher of the Eventdrive software. This setup facilitates compliance with GDPR standards, allowing you to enjoy the benefits associated with French and European regulations.
Eventdrive deploys a robust and "security by design" infrastructure to ensure the protection of your data and the continuity of your events. Files are deliberately isolated from web servers to prevent any alteration. Data, especially personal data, is isolated and inaccessible from the internet. Additionally, the use of a web application firewall (and anti-DDoS) enhances security by blocking potential attacks. We offer a set of technical and organizational measures to prevent and mitigate any malicious acts.
In addition to these measures, Eventdrive ensures optimal availability of your data and services. The implementation of geo-redundant servers guarantees real-time replication of your data across all servers. Furthermore, the use of load balancing tools between servers allows for balanced distribution of incoming traffic across multiple servers
Concrete Benefits
• Compliance with regulations
• Assurance of event continuity
• Minimization of data loss risks
• Service performance
In a Few Words
Data centers in France
Encrypted and isolated data
High-availability infrastructure
Check our Security Assurance Plan (SAP)
GDPR Compliance
We are aware of the importance of confidentiality and security of personal information, and we are committed to taking the necessary measures to ensure their protection.
Secure data storage: user data and event-related data are stored on databases hosted in France. These databases are encrypted in a VLAN, making access from outside (internet) impossible. Additionally, the certificates used for database encryption are stored on a remote server, further enhancing the security of this information.
Attendee data management: the data of participants in your events is encrypted and stored on secure servers located in France. In respect of privacy, information considered sensitive is systematically deleted the day after the event.
Respect for individual rights: our platform supports individual rights such as the right of access, the right to modification, the right to erasure (right to be forgotten), and the right to data portability.
Concrete benefits
• Practical tool that simplifies your daily life
• Respect for individuals
In a Few Words
Automatic data deletion
Adapted privacy policy
Encrypted and isolated data
Roles and permissions
Concrete benefits
• Access control
• Unlimited number of roles
• Individual or team scope