Enterprise-GRADE encryption and authentication

Built to securely scale across global networks, Reelay’s fail-safe protocols ensure complete privacy and regulatory compliance.

The way we're meeting today


As the leading virtual meeting productivity solutions provider, we ensure data protection is embedded throughout our AI-driven applications. Suffice it to say, Reelay integrates enterprise-grade authentication and encryption into everything we do. In addition to fail-safe privacy protocols, you have complete control over the secure distribution of each Reelay Meeting Asset generated by our intelligent attendant. Only approved team members within your closed network are able to receive and forward curated videos and transcripts.

Data Protection
Our robust platform is built to securely scale across global networks. We apply a holistic approach to data protection based on best practices aligned with a common controls framework. Any data security threat is immediately thwarted by our detections program. We maintain a secure software development process and industry-recognized operational practices. At Reelay, our network infrastructure relies on a secure cloud service platform with flexible capacity to ensure best-in-class protection and reliability.

Privacy & Hosting
As a dedicated SaaS solutions provider, we integrate security and ease of implementation into all our proprietary artificial intelligence-based applications. At the data level, we only access internal information that is fully manageable by you. Our secure meeting attendant sits alongside your current video conferencing solutions. So, there is no need to integrate complex software programs with inherent security risks. We host our intelligent applications on the AWS cloud platform.

Reelay employs a private virtual network of secured micro services using AWS Compute Engine nodes. AWS also provides a comprehensive list of compliance and regulatory assurances including SOC 1-3 and ISO 27001.

Product Architecture
Our application software complies with the latest industry security practices, which includes the ASVS 4.0.2 standard defined by OWASP. Internally, we utilize CI/CD pipelines such as Embold to perform security reviews and rapidly identify any potential issues within our development phase. Synk.io and Dependabot are also deployed to provide robust vulnerability detection and detailed security audits. In addition, we maintain separate production and development environments to guarantee stability and safekeeping.

Data Security
All data-in-transit delivered through our applications is encrypted using the most up to date version of SSL or RTMPS. In addition, your data-at-rest is encrypted using Advanced Encryption Standard. Cryptographic encryption keys are maintained through AWS. Disk storage is also fully encrypted and utilizes AWS key management. An Advanced Encryption Standard (AES) algorithm with a key size of 256 bits and a unique encryption key rotation policy is maintained to ensure your data stays yours.

Data Protocol
Reelay monitors all access attempts to our company resources. We also enable full backups of your data across multiple locations. This ensures your data can be retrieved within a standard recovery time objective in the unlikely event of failure. Your meeting information can be deleted through data erasure requests to our security team. Encryption-at-rest and encryption-in-transit are maintained at all times via secure data channels.

App Security
Reelay maintains a continuous integration and software delivery pipeline that utilizes security tools such as Git, Jenkins, and Snyk to identify issues throughout our development phase. In addition, our security team performs regular penetration tests to address issues that may occur in later SDLC phases. All software patches and updates are installed as soon as available, and all vulnerabilities are tracked in our project security system.


See how Reelay improves productivity without having to change team behavior or meeting software.

Reelay. How We’re Meeting Today™