Glossary
Security & Governance

SOC 2 Compliance

A security standard for handling customer data.

SOC 2 certification ensures that a platform manages data securely and reliably. Zuddl adheres to SOC 2 controls for enterprise-grade trust and compliance.

GDPR Compliance

Adherence to European Union data privacy laws.

Ensures that attendee data is collected, stored, and processed under GDPR standards. Zuddl includes consent management and data deletion tools to maintain compliance.

SSO (Single Sign-On)

One login for multiple systems.

SSO enables users to access Zuddl with their enterprise credentials, improving security and simplifying access. Zuddl integrates with identity providers like Okta and Azure AD.

Role-Based Access Control (RBAC)

Permission levels based on user roles.

RBAC lets admins control who can access, edit, or view event data. Zuddl supports granular role assignments for organizers, marketers, and external partners.

Audit Logs

A record of platform actions and changes.

Audit logs track every significant action — from user access to data changes — for accountability and compliance. Zuddl maintains system logs for enterprise-grade governance.

Data Encryption at Rest

Protecting stored data with encryption.

Data encryption at rest ensures that all attendee and event records saved in databases or storage systems remain secure, even if accessed without authorization. Zuddl uses industry-standard encryption protocols (like AES-256) to safeguard sensitive information when stored.

Secure File Uploads

Safe handling of files uploaded to the platform.

Secure file uploads involve scanning, validating, and encrypting files added by organizers, speakers, or attendees. Zuddl enforces secure file transfer protocols and virus detection to prevent malicious files from entering the system.

Multi-Tenant Architecture

A single platform serving multiple customers securely.

Multi-tenant architecture means each customer (tenant) has logically separated data and configurations, even while sharing underlying infrastructure. Zuddl ensures tenant isolation with strict data partitioning and access controls, delivering enterprise-grade security and scalability.

Access Control Lists (ACLs)

Lists that define who can access what resources.

ACLs regulate permissions for users, groups, and systems within the platform. They help administrators enforce granular controls over data, sessions, and features. Zuddl supports ACLs as part of its role-based governance framework.