Security & Compliance

Demodesk enables screen sharing at the highest security level.
We take the security of your data and our infrastructure very seriously and are committed to providing an environment that is safe, secure, and stable.

Security by design

Legacy solutions transfer the presenter's local screen content to another computer over the Internet. Demodesk on the other hand shares only one browser tab. The screen content of that browser tab is generated on a virtual display in the cloud and synchronized to all participants at the same time. Since only one browser tab is shared on the virtual machine in the cloud, the presenter has absolute control over the shared content. Unwanted pop-ups and notifications in the presenter's browser tab are disabled by default.

Demodesk redefines screen sharing: Not sharing your local desktop screen but rendering shared content on a secure virtual desktop in the cloud

Strict privacy requirements

Demodesk assigns each meeting a randomly generated code that connects securely to the shared screen. Since a new code is generated for each meeting, you do not have to worry about uninvited guests. We do not store any data you share in your meetings nor do we store any personal data unless you ask us to do so.

Encrypted data transmission

Demodesk is compliant with the latest security standards for data transmission. Demodesk acts as a proxy server and encrypts all data that is being sent using the latest technologies. The currently accepted standard for sending and receiving confidential data is 128-bit Transport Layer Security (TLS) encryption. Demodesk makes your data twice as secure with 256-bit TLS encryption - just as secure as your online banking account.

Secure datacenters

Demodesk is hosted in datacenters with the highest level of security, fully compliant with industry standards. Our datacenters are co-located at Hetzner, Google and DigitalOcean – the most respected datacenter facility providers in the world. We leverage all capabilities including physical security and environmental controls to secure our infrastructure from physical threat or impact. Each site is staffed 24/7/365 with on-site physical security to protect against unauthorized entry.

Perform better demos, onboard customers faster,
automate manual tasks and scale your team