Trust Event Hub with your security and privacy
Event Hub delivers enterprise-grade security and compliance while giving you control over your data.
At Event Hub, we are committed to the security and privacy of your data.
We know that data is one of your most valuable assets and always has to be protected — that’s why security is built into every layer of the Event Hub Platform. Our transparency enables you to meet your regulatory needs while taking advantage of our platform.
Trusted Platform
Trust comes through transparency. See how we secure the platform through industry-leading practices including penetration testing, vulnerability management and secure software development to protect the Event Hub Platform.
Security Features
We provide comprehensive security capabilities to protect your data and workloads, such as encryption, network controls, auditing, identity integration, access controls and data governance.
Privacy
We value the privacy of your data and understand that it is important to both your organisation and your customers. Event Hub can help you comply with privacy laws and meet regulatory requirements.
How we secure the Event Hub Platform?
The Event Hub Platform is operated and hosted in AWS Cloud, utilising their world-class security features and benefits. Event Hub has established a Product Security Framework that ensures our product protects you and your customers data.
Zero Trust
We use a Zero Trust model, requiring continuous verification for every user, device, and application, preventing unauthorised access and ensuring your data remains secure and protected at all times.
Secure Cloud
We host our services and data in AWS Cloud, leveraging AWS's world-class data centres and their security benefits, certifications, in Australian locations.
Secure Practices
We utilise AWS's well-architected framework to ensure the best possible security practices are implemented and followed.
Threat Scanning
3rd party companies continuously scan 24x7 for security threats and deliver alerts and reports on aversion actions taken.
Incident Response
We have a mature SIEM program utilising industry-leading monitoring and threat detection systems.
Serverless Security
We use serverless architecture to minimise server exposure, reduce attack surfaces, and ensure robust data security.
Encryption
TLS 1.2 (or higher) is enforced for all communications to and from any endpoint, such as APIs. We leverage industry-standard AES-256 encryption for data at rest.
Security Training
Our software engineers are trained to understand and prevent the most common and severe vulnerabilities impacting software.
Report a security vulnerability
Found a vulnerability? Let our security team know, so we can get straight to work.
Security, privacy & legal resources
Access our policies, reports, and guides for a comprehensive view of our commitment to your safety and trust.
If you are a security researcher or user of the Event Hub Platform, and have discovered a potential security vulnerability we'd appreciate your help in disclosing it in a responsible manner and encourage you to let us know right away.
Your privacy is important to us, and so is being transparent about how we collect, use, and share information about you. For more information about how and why we process personal data, please refer to our privacy policy. This applies to anyone that visits our website, engages with us or our services.
Your trust is important to us, and so is being clear about the terms under which you use our services. The Event Hub Terms of Service outline your rights and obligations when using our platform. This applies to anyone who accesses or uses our website and services. For full details on the terms governing your use of Event Hub, please refer to our complete Terms of Service Agreement.
It's time to remove the pain, from Seat to Survey™
Experience seamless event management with our innovative platform.
