web conferencing

Secure Web Conferencing, Secure Remote Support, Secure Remote access

Contact Us  |  About Us  |  FAQsBlog
free web conferencing  web conferencing demo  
  remote support
remote access  


RHUB Security Solutions


The Weakest Security Point in Hosted Web Conferencing Services

Web conferencing is an Internet-based application. For any Internet application, two types of security measures work together to ensure adequate security:

  • Transmission security - protecting data from wire-tapping during the data transmission
  • Access security - protecting applications from unauthorized access.

For web conferencing applications, transmission security is easily maintained by using the popular SSL encryption together with each vendor's proprietary encryption. RHUB's TurboMeeting system uses both SSL and proprietary encryption. The transmission of user and meeting passwords and meeting IDs over the Internet is always SSL-encrypted. 

The weakest security point in web conferencing is access security. Every web conferencing system today uses meeting IDs and/or passwords as simple access security measures to protect web meetings from unwanted attendance. However, the problem is that meeting IDs and passwords are usually emailed to attendees before scheduled meetings start. This process can easily compromise access security. Your computer screen may be captured within seconds once a hacker intercepts or guesses your meeting ID or password. Once you realize you have been hacked, it is too late to close your meeting.

Deploy RHUB Web Conferencing Appliances For The Security You Need

The best way to protect against security breaches described above is to use an on-premise solution where your firewall to protects your meetings. RHUB web conferencing appliances are the easiest and most affordable solution for your most sensitive security needs.

The figures below show three typical ways in which to deploy RHUB web conferencing appliances:
  1. Behind-firewall for internal meetings only
  2. DMZ for both internal and external meetings
  3. Outside firewall for external meetings only

secure web conferencing

(a) Behind Firewall Deployment

secured web conferencing

(b) DMZ Deployment

web conferencing security

(c) Outside Firewall Deployment

Both behind-firewall and DMZ deployment are strong security measures. Today DMZ is available for almost every router used, including home routers. DMZ deployment provides great flexibility. It allows both internal (behind firewall) and external (outside firewall) attendees to join a meeting. When you start a meeting, you simply check an option to tell the system that this meeting is for internal attendees only (see the Figure below). The RHUB web conferencing appliance will reject any attendees who come from outside your firewall.

on-premise web conferencing

You can determine the level of security of a meeting

The outside-firewall deployment (c) is equivalent to hosted services. It does not add anything to access security but weakens it.


Web Conferencing  |  Web Conferencing ServerWeb Conferencing SolutionRemote Desktop Access toolsRemote Access ServerRemote Access SoftwareRemote Desktop Support  toolRemote Support ServerRemote Control SoftwareWeb Conferencing ServiceWeb Conferencing CompanyWeb Conferencing Comparison

2003-2009 RHUB Communications, Inc. All rights reserved.