The Weakest Security Point in Hosted Web Conferencing Services.
Web conferencing is an Internet-based application. For any Internet application,
two types of security measures work together to ensure adequate security:
1. Transmission security - protecting data from wire-tapping during the data
2. Access security - protecting applications from unauthorized access.
For web conferencing applications, transmission security is easily maintained by
using the popular SSL encryption together with each vendor's proprietary
encryption. RHUB's TurboMeeting system uses both SSL and proprietary encryption.
The transmission of user and meeting passwords and meeting IDs over the Internet
is always SSL-encrypted.
The weakest security point in web conferencing is access security. Every web
conferencing system today uses meeting IDs and/or passwords as simple access
security measures to protect web meetings from unwanted attendance. However, the
problem is that meeting IDs and passwords are usually emailed to attendees
before scheduled meetings start. This
process can easily compromise access security. Your computer screen may be
captured within seconds once a hacker intercepts or guesses your meeting ID or
password. Once you realize you have been hacked, it is too late to close your
Deploy RHUB Web Conferencing Appliances For The Security You Need.
The best way to protect against security breaches described above is to use an
on-premise solution where your firewall to protects your meetings. RHUB web
conferencing appliances are the easiest and most affordable solution for your
most sensitive security needs.
The figures below show three typical ways in which to deploy RHUB web
1. Behind-firewall for internal meetings only
2. DMZ for both internal and external meetings
3. Outside firewall for external meetings only
(a) Behind Firewall Deployment
(b) DMZ Deployment
(c) Outside Firewall Deployment
Both behind-firewall and DMZ deployment are strong security measures. Today DMZ
is available for almost every router used, including home routers. DMZ
deployment provides great flexibility. It allows both internal (behind firewall)
and external (outside firewall) attendees to join a meeting. When you start a
meeting, you simply check an option to tell the system that this meeting is for
internal attendees only (see the Figure below). The RHUB web conferencing
appliance will reject any attendees who come from outside your firewall.
You can determine the level of security of a meeting
The outside-firewall deployment (c) is equivalent to hosted services. It does
not add anything to access security but weakens it.