Security and Compliance Standards

Security, Compliance, and Enterprise Scale for Global Event Programs

Certain gives your teams the confidence to run global event programs securely, without slowing down innovation. With rigorous security controls, verified compliance, and privacy-first practices built into every layer of our platform, you can meet enterprise requirements while delivering exceptional event experiences worldwide.

Certain Security Compliance Hero1

Compliance

  • PCI DSS Level 1 compliance for 6+ consecutive years
  • SOC 2–certified secure cloud environment

Privacy

  • Platform support for GDPR and CCPA compliance
  • Clear customer data ownership and control

Encryption

  • Encryption in transit (TLS) and at rest using industry-standard methods

Access

  • Support for SSO, including SAML2, OAuth2, and OpenID-Connect
  • Strong identity governance with MFA, RBAC, and least privilege access

Monitoring & Response

  • Continuous monitoring, alerting, and incident response processes
  • View our publicly available status page

Global Performance

  • Data residency options (where applicable)
  • Global CDN infrastructure ensures high-performing event websites worldwide
PCI DSS
SOC2
CCPA
GDPR

Proven, Long-Standing Compliance

Certain supports enterprise compliance requirements through verified controls, repeatable audits, and consistent operating discipline, helping your teams pass security reviews faster and with fewer exceptions.

PCI DSS Level 1

Certain has maintained PCI DSS Level 1 compliance for more than six consecutive years, demonstrating long-term discipline in secure payment processing and operational security.

SOC 2 Security Controls

Certain operates SOC 2–aligned controls across our core cloud environments, covering security, availability, and confidentiality. These controls are embedded into day-to-day operations for smooth security reviews and continuous certification.

Enterprise-Grade Security Governance

Our security governance model is designed to meet enterprise procurement and audit expectations, with documented controls, repeatable processes, and clear accountability across infrastructure, product, and operations.

Privacy and Data Control by Design

Certain helps you meet privacy obligations while keeping control in your hands, across the full data lifecycle.

You Own & Control Your Data

Your event data belongs to you. You decide what is collected, how it’s used, and how long it’s retained.

Data Retention & Deletion Controls

We provide configurable retention and deletion practices aligned with enterprise needs.

Consent & Preferences

Our platform supports consent management and user preferences to help organizations meet global privacy expectations.

Subprocessor Handling & DPAs

We maintain vendor governance practices and provide DPAs to support compliance and customer procurement.

Military-Grade Data Destruction Standard

Certain follows a strict approach to data destruction aligned with DoD 5220.22-M guidance, a high-assurance standard valued by government, financial services, and regulated industries.

Defense-in-Depth Across Infrastructure, Product, and Operations

defense in depth

Certain applies layered security controls across the entire platform, from cloud infrastructure to application design and daily operations, to protect your programs at scale.

  • Data encryption in transit (TLS)
  • Data encryption at rest using industry-standard encryption methods
  • Secure key handling aligned with enterprise best practices

Certain supports modern enterprise identity and authentication controls, enabling centralized access management and consistent login policies across teams.

  • SSO via SAML2, OAuth2, and OpenID-Connect
  • MFA support
  • Integration with enterprise identity providers
  • Secure session management

Certain is built for enterprises with layered teams and complex programs, offering robust controls over access, visibility, and accountability. Role-based permissions and multi-level sub-account structures ensure users see only what they need: whether they’re building events, managing registrations, or reviewing reports. Predefined and custom roles support strong governance, auditability, and separation of duties across your organization.

  • Secure development lifecycle (SDLC) practices
  • Code reviews and controlled change management
  • Environment segregation and access controls
  • Security and quality verification before releases
  • Secure cloud environment aligned with enterprise control frameworks
  • Network segmentation and protection
  • Hardened infrastructure with regular updates
  • Continuous monitoring and alerting
  • Incident response planning and escalation
  • Operational security readiness and reviews
  • Ongoing vulnerability scanning
  • Patch management and remediation
  • Responsible handling of third-party risks

Trusted by Many Fortune 500 companies

We welcome responsible disclosure of potential security vulnerabilities. If you believe you’ve identified an issue, please contact us so our team can investigate and respond promptly.

FAQs

Do you support SSO?
Yes. Certain supports SSO including SAML2, OAuth2, and OpenID-Connect, enabling centralized identity management and enterprise authentication policies.
Yes. Certain maintains PCI DSS Level 1 compliance, with 6+ years of consecutive certification.

Yes. Our platform supports GDPR and CCPA compliance with privacy controls including consent handling, data retention, and deletion processes.

We use layered security controls including encryption in transit and at rest, strong access controls, monitoring, and disciplined operational processes.
Security and compliance documentation is available upon request by emailing us at help@certain.com.

Get Started with Certain Now

This website uses cookies to ensure you get the best experience on our website.