The Weakest Security Point in Hosted Web Conferencing Services.
Web conferencing is an Internet-based application. For any Internet application, two types of security measures
work together to ensure adequate security:
1. Transmission security - protecting data from wire-tapping during the data transmission
2. Access security - protecting applications from unauthorized access.
For web conferencing applications, transmission security is easily maintained by using the popular SSL encryption
together with each vendor's proprietary encryption. RHUB's TurboMeeting system uses both SSL and proprietary
encryption. The transmission of user and meeting passwords and meeting IDs over the Internet is always SSL-encrypted.
The weakest security point in web conferencing is access security. Every web conferencing system today uses meeting
IDs and/or passwords as simple access security measures to protect web meetings from unwanted attendance. However,
the problem is that meeting IDs and passwords are usually emailed to attendees before scheduled meetings start. This
process can easily compromise access security. Your computer screen may be captured within seconds once a hacker
intercepts or guesses your meeting ID or password. Once you realize you have been hacked, it is too late to close
Deploy RHUB Web Conferencing Appliances For The Security You Need
The best way to protect against security breaches described above is to use an on-premise solution where your
firewall to protects your meetings. RHUB web conferencing appliances are the easiest and most affordable solution
for your most sensitive security needs.
The figures below show three typical ways in which to deploy RHUB web conferencing appliances:
1. Behind-firewall for internal meetings only
2. DMZ for both internal and external meetings
3. Outside firewall for external meetings only
(a) Behind Firewall Deployment
(b) DMZ Deployment
(c) Outside Firewall Deployment
Both behind-firewall and DMZ deployment are strong security measures. Today DMZ is available for almost every
router used, including home routers. DMZ deployment provides great flexibility. It allows both internal
(behind firewall) and external (outside firewall) attendees to join a meeting. When you start a meeting, you
simply check an option to tell the system that this meeting is for internal attendees only (see the Figure below).
The RHUB web conferencing appliance will reject any attendees who come from outside your firewall.
You can determine the level of security of a meeting
The outside-firewall deployment (c) is equivalent to hosted services. It does not add anything to access
security but weakens it.