Online Security
Multi-Layer Security Model
Our servers are located in secure facilities with restricted physical access. SSL encryption providing transmission security, defeating eavesdroppers and packet sniffers.
Online Meeting Passwords & Host Controls
Online meeting hosts can select conference passwords, which are required for conference room entry. In addition to password authentication and other technical measures, conference hosts can play video, and personally check every meeting attendee. The host can expel anyone at anytime
Signed Code & Certificates
Our servers use signed code with a third-party certificate provided by VeriSign. VeriSign is a leading certificate authority and world-renowned provider of trusted Internet services.
End-to-End Encryption
When the meeting host selects SSL/TLS Security, we use encrypted connections from end-to-end, including all participants and the conferencing server. We send all conference data over one secured TCP/IP connection, ensuring that all data from all features — live data sharing, presentations, voice over the Internet (VoIP), and video — are all sent over the same encrypted connection.
IT Security Policy, Firewall & Proxy Compliance
We use standard ports 80 and 443 for web services and provide proxy and firewall traversal in conformance with IT security policies. Conference connections are initiated by the conference user and pass out through their firewall. We support all leading standards for proxy connections such as TTL values, plus many vendor specific implementations (e.g., Microsoft ISA Server) providing the highest possible connection success rates for all users.
No Unattended Remote Access Features