Power User Series (#4) - Security

In part four of the Glisser Power User series, we'll be discussing SECURITY. Protecting the information of yourself and your team, your event, and/or your stakeholders should always be at the top of your planning checklist.

Mark Simeon, October 22, 2020

What is Security?

When we say 'Security,' we are referring to one of three things:

✅ Security of access
✅ Security of content
✅ Security of delegate data
Request a Demo

1. Security of Access

In a physical event you can have registration, security guards, badges, scanners, door staff, etc. to decide who comes in.


In a virtual or hybrid environment you have to deliver that technically. For example, you can use whitelisting to approve or reject users, or pin codes to further restrict access. The use of API keys and authentication tokens gives you pretty solid control over who sees what, but, as ever, the biggest security risk is usually people (sharing passwords for example, much like sharing badges at your physical event).


Example uses of securing access:

  • Whitelisting
  • Authentication Tokens
  • Pin Codes

Ultimately it's always a balance between creating friction 'onboarding' and the security you need. From the Glisser perspective, our goal is to offer a broad range of options that can be switched on or off to meet those different event needs.

The Security Menu within Glisser

2. Security of Content

In addition to the security controls determining who gets into an event or session, you should also look to add a layer of security to your content and intellectual property.

In a physical event we've mostly accepted that people have cameras in their phones and have the ability to capture presentation content. With virtual, we have to go the extra step and discourage screen-grabbing. Our watermark feature delivers this, overlaying delegate details on the on screen and downloaded slide images, allowing better tracing of any leaked content.

Watermarking Slides helps protect content

Toggle on 'Watermark Slides' to better secure your presentation content.

3. Security of Delegate Data

Critical across the event tech stack, in physical, virtual and hybrid events is the security of personal data. ISO27001 is the certification to check for here. As of last week, Glisser has passed this certification for a third straight year.

ISO27001 means that the data is not just technically secure, but the whole culture and work processes of a technology provider align with this approach. Some of the requirements include that no unprotected files containing data are flying around, no USB sticks with presentations left on desks, and a relatively simple compliance approval process for your use of the technology.

The image below courtesy of BSI, part of the UK National Standards body.

BSI Data Security ISO 27001 Standard



Talk to an Expert About All of the Features

Share this article:

Does data governance and security still matter in 2020?

As the explosion of virtual events rocks the business world have you stopped to ask yourself what’s happening with all that event data?

Power User Series (#7) - Whitelisting

In part four of the Power User series we discussed security of access. Whitelisting is an additional layer of security for you to keep your sessions accessible only to specific users.

Power User Series (#6) - Monetization

Here we will discuss the myriad options for MONETIZATION within the Glisser platform. Obviously virtual events are an important way to stay connected to audiences and clients whilst dealing with the restrictions of the global pandemic, but you must also consider the ways in which to secure cash flow for your stakeholders.
© 2018 Glisser, all rights reserved