Secure Web Conferencing

Secure Web Conferencing

When using web conferencing software, the user is presented with several options to secure and protect a scheduled meeting. These settings provide different qualities of service (QoS), but QoS is a playing field where changing one setting may have unexpected, diverse and hidden effects elsewhere. However, there is always more than just the things presented to the user in the application interface.

Web conferencing systems make use of cryptography in the background, store data on different systems, media and locations, forward that data to different, authenticated users, send (hopefully authentic) meeting invitations or even automatically analyze your call to create transcriptions. The list of options has heavy impacts on your data confidentiality, integrity and authenticity.

This white paper provides 12 recommendations as a starter package to foster a security conscious evaluation of web conferencing solutions.

  1. Randomness
  2. Data Stores
  3. Cryptography
  4. Architecture
  5. Management
  6. Authentication and Authorization
  7. User Interface
  8. Quality
  9. Availability
  10. Auditing and Monitoring
  11. Data Privacy
  12. Certifications

Download Now