RHUB
  Contact About FAQ Blog
Call 866-758-0984
Home   Products   Customers   Buy   Partners   Support   Register for Webinars
 
 

 

RHUB Secure Web Conferencing & Remote Support Solutions


Access security is the weakest point in hosted web conferencing services:

Security is as good as your weakest point: Hosted conferencing services offer little in access security and open up meetings to nearly anyone who has a meeting ID and a password. This “security” can easily be compromised by reading one’s emails or having access to an associate’s calendar (since most meeting invites are done through calendar sharing). In contrast, RHUB servers have the ability to setup a “virtual VPN” between the host and the attendee(s), thus limiting the scope of the attendance to an internal location/address or specified external IP addresses. Note that these policies are designed to work in conjunction with your internal security servers, such as firewalls, routers or other security devices your Enterprise might have deployed. In the end, RHUB servers provide total best in breed security by brilliantly restricting attendance to authorized locations and attendees.

Data transmission security:

For web conferencing applications, transmission security is maintained by using strong SSL encryption alongside with each vendor's proprietary encryption. RHUB's servers use both SSL and proprietary encryption. The transmission of user and meeting passwords as well as meeting IDs over the Internet is SSL encrypted.

Deploy RHUB Web Conferencing Servers to fit your security needs:


The best way to protect against the security breaches described above is to use an on-premise solution where your firewall protects your meetings. The RHUB web conferencing servers are the most affordable solutions that fit that purpose.

The diagrams below show three typical ways to deploy the RHUB web conferencing servers:

  1. Behind the firewall: restricting it to internal meetings only (Private cloud)
  2. DMZ: Designed for both internal and external meetings
  3. Outside firewall: Restricting it to external meetings

 

secure web conferencing

(a) Behind Firewall Deployment
 

secured web conferencing

(b) DMZ Deployment
 

web conferencing security

(c) Outside Firewall Deployment

Both behind-firewall and DMZ deployment offer strong security measures. DMZ is available on almost every router, including home routers. DMZ deployments provide great flexibility, allowing both internal (behind firewall) and external (outside firewall) attendees to join a meeting. When you start a meeting, you simply check the option to restrict the system for internal attendees only (see below diagram). In that case, the RHUB web conferencing server will reject any attendees accessing the system from outside your firewall.

You can determine the level of security of a meeting

The outside-firewall deployment (c) is equivalent in security to hosted services. It has the same weak access issues as hosted services do.