top of page
A website for an audio technology company against a tiled background. To the right of the image is a code module and to the left is a list of security features.

WIX SECURITY

Fortify your business

Security is at the foundation of everything we do—keeping your business protected with a cutting-edge framework and multi-layered defense throughout our platform.

A website for an audio technology company against a tiled background. To the right of the image is a code module and to the left is a list of security features.A website for an audio technology company against a tiled background. To the right of the image is a code module and to the left is a list of security features.
Legalzoom
Yell
vevo
Mott Macdonald
Fujitsu
intuit
Kroger
Bolt
NTT
AXA
Legalzoom
Yell
vevo
Mott Macdonald
Fujitso
intuit
Kroger
Bolt
NTT
AXA

We take security
into account

Wix’s account-level security features deliver the advanced protection capabilities you need to ensure that your business remains secure at all times.

Single
Sign On

Enhance security using SSO authentication for employees and independent business units with top providers like Azure, Okta, Auth0, Google and more.

A log in window overlapping a website homepage against a purple tiled background. To the right of the log in widows are icons.

Multi-Factor Authentication

Provide all your users with MFA through authenticator apps, SMS, and more, for extra layers of protection that help keep their accounts secure.

Roles & Permissions

Control user access by predefined roles or create custom permissions per site, site group, or dashboard area to match your business needs.

A team management window showing team members and responsibilities against a green background.

IP
Allowlisting

Secure your business systems and assets by adding, managing, or deleting IP addresses and ranges for enhanced access control and security.

Audit
Log

Keep a full audit trail of account activity, including any changes to sites and assets, to assist with debugging, regulatory compliance, and more.

Single
Sign On

Enhance security using SSO authentication for employees and independent business units with top providers like Azure, Okta, Auth0, Google and more.

A log in window overlapping a website homepage against a purple tiled background. To the right of the log in widows are icons.

Multi-Factor Authentication

Provide all your users with MFA through authenticator apps, SMS, and more, for extra layers of protection that help keep their accounts secure.

Roles & Permissions

Control user access by predefined roles or create custom permissions per site, site group, or dashboard area to match your business needs.

A team management window showing team members and responsibilities against a green background.

IP
Allowlisting

Secure your business systems and assets by adding, managing, or deleting IP addresses and ranges for enhanced access control and security.

Audit
Log

Keep a full audit trail of account activity, including any changes to sites and assets, to assist with debugging, regulatory compliance, and more.

Single
Sign On

Enhance security using SSO authentication for employees and independent business units with top providers like Azure, Okta, Auth0, Google and more.

A log in window overlapping a website homepage against a purple tiled background. To the right of the log in widows are icons.

Multi-Factor Authentication

Provide all your users with MFA through authenticator apps, SMS, and more, for extra layers of protection that help keep their accounts secure.

Roles & permissions

Control user access by predefined roles or create custom permissions per site, site group, or dashboard area to match your business needs.

A team management window showing team members and responsibilities against a green background.

IP
Allowlisting

Secure your business systems and assets by adding, managing, or deleting IP addresses and ranges for enhanced access control and security.

Audit
Log

Keep a full audit trail of account activity, including any changes to sites and assets, to assist with debugging, regulatory compliance and more.

Fully compliant,
totally private

We’re committed to your privacy and data protection—and that of your customers. Wix is compliant and certified with the highest international privacy and security regulations, including SOC 2 Type 2, PCI DSS Level 1, several ISOs, GDPR, CCPA, and LGPD.

Several logos representing the highest international privacy and security regulations, including SOC 2 Type 2, PCI DSS Level 1, several ISOs, GDPR, CCPA and LGPD.

Your every-line
of defense

With a full range of built-in security features, 24/7 monitoring by a global team of experts and rapid response plans to contain threats, Wix’s security framework keeps your business running as planned, without unexpected interruptions. 

SSDLC

Wix implements security best practices at each step of the development process, from design to code review, threat modeling and penetration test—resulting in unwavering protection throughout the platform.

Secure Payments & Anti-Fraud

All Wix sites are compliant with PCI DSS Level 1, and are supported by anti-fraud protection in order to safeguard payment info and deliver maximum protection for all transactions.

Safe Data Encryption

Wix data in transit encryption uses HTTPS, TLS 1.2+ and automatic SSL, while data at rest uses AES-256. Our high-security PCI environment uses a FIPS 140-2-certified HSM.

Third-Party Risk Management

To help protect client data and site safety in working with third-party services, Wix operates a strict TPRM Program to ensure vendors align with our unrelenting security standard.

We brought backup

In addition to our own dedicated data centers, Wix also relies on world-leading DC providers such as AWS, Google Cloud Platform and Equinix—all of which are compliant with the highest industry standards for physical, environmental and hosting controls.

Logos of world-leading Data Center providers AWS, Google Cloud Platform and Equinix

Security by design

Wix places site security at the core of everything we do. Your business—and ours—depend on it. Because of this, for every new piece of infrastructure we build, feature we develop, or partnership we engage on, we consider the impact on security from the beginning.

We only proceed when we’re certain we’ll be able to maintain the high standards that we, and our customers, expect—and then back it up with a fully-monitored Security Operations Center, a team of experts on duty 24/7, and a battle-tested framework methodology for threat detection and response.

“We’ve created a team of the best infosec experts, coupled with high-end technology and robust processes, to manage data and flows at a large scale and always keep our eye on the ball.”

Israel Rachmani, CISO at Wix

Give your business the best kind of defense.
Schedule a call to learn more.

bottom of page