Security
Securely powering millions of connections
Trust Calendly to keep your data secure with enterprise-grade admin management, security integrations, data governance, compliance
audits, and privacy protections.
Simplified scheduling for more than 200,000,000 meetings
Market-leading software meets enterprise-grade security
Customer Data Protection
Logical tenant separation
Encryption in transit (TLS 1.2+)
Encryption at-rest (AES-256) and in transit
Infrastructure Security
Hosted on leading cloud infrastructure provider
Network and perimeter protection
Application Protection
Web application firewall
Distributed Denial of Service (DDoS) Protections
Regular vulnerability scanning
Semi-annual penetration testing
Compliance & Privacy
SOC 2 Type 2 Report
SOC 3 Report
GDPR & CCPA compliance management
CSA STAR Level One attestation
Org Security
Security education and awareness training
24/7 monitoring and incident response
Vendor risk management
Business continuity planning
Account Protection
Bot prevention
Login notifications
SSO and User lifecycle management (SCIM)
Real-time activity (audit) log
PII data deletion management
Flexible admin roles
Request documentation via Whistic
Calendly uses Whistic to securely share company and product security profiles as well as detailed documentation required for vendor security assessments.
Certifications and frameworks

SOC 2 (Type 2)
Security, availability, and confidentiality trust services criteria

SOC 3
Overview of Service Organization Controls

GDPR
Follow guidelines for data protection and data subject rights for EU residents

CCPA
Follow guidelines for privacy rights and consumer protection for California residents

CSA STAR
Cloud Security alliance STAR Level One self assessment for trust assurance and risk

PCI COMPLIANT
Via payment processor, Chargebee, which encrypts and stores credit card details
“We’re at a monumental moment in our history where workers have an endless number of devices at their disposal, meaning security leaders have a greater responsibility to users, customers, and employees safely into their new era.”
Adapt to evolving business needs — without the risk

Security at scale
More people? No problem. Flexible access management tools — including SSO, SCIM, an activity log and more — fold seamlessly into your corporate policies and IT workflows so nothing falls through the cracks.

Collaboration with control
Empower your remote workforce to schedule efficiently as a team without adding risk to the business. Calendly's activity (audit) log offers visibility while granular, role-based permissions prevent unauthorized changes.

Enterprise-grade data governance
Maintain compliance with Calendly's governance and risk management capabilities — such as global retention policies, custom terms of service, data deletion, audit tracking, and more.

Fraud, Trust, and Safety
Security and the safeguarding of customer data shouldn’t be an afterthought. Calendly’s dedicated team constantly enhances our security techniques and addresses identity impersonation, fraud, and other suspicious activity.
“The security aspect of Calendly for enterprise was important and the ease of deploying it out to the people that needed it. We got over a hundred licenses and it was really easy to set it up and deploy it out to the people.”
Easy access for easy bookings
Share your Calendly link right from your browser, so you can schedule meetings without the back-and-forth.
Easy
ahead
We take the work out of connecting with others so you can accomplish more.
About
Solutions
Popular Features
Support
Add-Ons
Developers