RHUB Web conferencing
Access security is the weakest point in hosted web conferencing services:
Security is as good as your weakest point: Hosted conferencing services offer little in access security and open up meetings to nearly anyone who has a meeting ID and a password. This “security” can easily be compromised by reading one’s emails or having access to an associate’s calendar (since most meeting invites are done through calendar sharing). In contrast, RHUB servers have the ability to setup a “virtual VPN” between the host and the attendee(s), thus limiting the scope of the attendance to an internal location/address or specified external IP addresses. Note that these policies are designed to work in conjunction with your internal security servers, such as firewalls, routers or other security devices your Enterprise might have deployed. In the end, RHUB servers provide total best in breed security by brilliantly restricting attendance to authorized locations and attendees.
Data transmission security:
For web conferencing applications, transmission security is maintained by using strong SSL encryption alongside with each vendor's proprietary encryption. RHUB's servers use both SSL and proprietary encryption. The transmission of user and meeting passwords as well as meeting IDs over the Internet is SSL encrypted.
Deploy RHUB Web Conferencing Servers to fit your security needs:
The best way to protect against the security breaches described above is to use an on-premise solution where your firewall protects your meetings. The RHUB web conferencing servers are the most affordable solutions that fit that purpose.
The diagrams below show three typical ways to deploy the RHUB web conferencing servers:
- Behind the firewall: restricting it to internal meetings only (Private cloud)
- DMZ: Designed for both internal and external meetings
- Outside firewall: Restricting it to external meetings
(a) Behind Firewall Deployment
(b) DMZ Deployment
(c) Outside Firewall Deployment
Both behind-firewall and DMZ deployment offer strong security measures. DMZ is available on almost every router, including home routers. DMZ deployments provide great flexibility, allowing both internal (behind firewall) and external (outside firewall) attendees to join a meeting. When you start a meeting, you simply check the option to restrict the system for internal attendees only (see below diagram). In that case, the RHUB web conferencing server will reject any attendees accessing the system from outside your firewall.
You can determine the level of security of a meeting
The outside-firewall deployment (c) is equivalent in security to hosted services. It has the same weak access issues as hosted services do.
You might also like
iPhone 5S Case TexosEducatienAgensy Tetn Region 6 Interactive Videoconferencing Hard Plastic Cover for iPhone 5 Case Wireless (Canbinms)
|