Teem Platform Security

Protecting Your Data

  • Our Commitment to Security

    Security-conscious companies like SoftBank, Palantir and Mozilla trust us to protect their information because we’re serious about safeguarding our customers’ data. We’re committed to being on the forefront of security best practices and we constantly strive to improve the security of our platform.

    Get Started With Your Free Trial

Client Controlled Security Features

Display Security

Read more about security options for the individual conference room displays, such as event-related privacy options and screen settings to prevent tampering with the device.

Learn more about device security →

User Permissions and Sign-On Options

The Teem admin dashboard allows you to control your data via detailed user permission settings, so you can limit access to the right people or groups. The Teem platform also supports Google Single Sign-On, multifactor authentication and SAML.

Learn More About Setting Up Groups and Permissions →

Exchange Server Data Flow

The Teem servers ingest calendar data for display on the conference room iPads. We accept data from Google, Office 365 and most flavors of Exchange. You can choose between impersonation or delegate access for permissions for your Exchange integration.

Learn more about our integrations →

Teem’s Data Security Policies

Encryption

All sensitive data is encrypted before transmission and while at rest.

Data Retained

Teem securely gathers information about calendars (unique identifier, color, name, access control status), events (unique ID, title, description, location, recurring, time/date visibility, all day) and attendees (name, email address).

AWS Cloud Security

All Teem production systems are hosted on Amazon’s AWS infrastructure, designed to provide the highest availability while putting strong safeguards in place regarding customer privacy and segregation.

Learn More About Amazon AWS Security →

Security Testing

To help ensure the safety of the data, regular security assessments are conducted. This includes internal and external vulnerability assessment and penetration testing

Teem Company Security

Teem has a dedicated CISSP staff member. We follow security best practices for incident response management procedures and user access control. We utilize safe password management and multifactor authentication, and enforce rigorous security measures.

This just scratches the surface of our security policies. If you’d like more details, we’re happy to provide them. Just contact us with your specific questions or requirements.

Contact Us to Learn More About Security →

Get Started Today With 15 Days on Us

Now that your security questions have been answered, it’s a great time to get started with your free trial. Take 15 days and put it all to the test, you’ll be glad you did.