Hosts have the top level of webinar control and can grant and revoke various privileges for participants.

Similar documents
Unleash the Power of Secure, Real-Time Collaboration

Security Guide Zoom Video Communications Inc.

System Security Features

SecureDoc Disk Encryption Cryptographic Engine

PCI DSS and VNC Connect

Security Architecture

Awareness Technologies Systems Security. PHONE: (888)

LEVEL 3 SM WEB MEETING SECURITY GUIDE

LEVEL 3 SM WEB MEETING

WHITEPAPER. Security overview. podio.com

Cloud FastPath: Highly Secure Data Transfer

NIST Cryptographic Toolkit

FIPS Security Policy. for Marvell Semiconductor, Inc. Solaris 2 Cryptographic Module

Safeguarding Cardholder Account Data

The Most Important Facts in a Nutshell Content Security User Interface Security Infrastructure Security In Detail...

Who s Protecting Your Keys? August 2018

Security and Certificates

Cryptography (Overview)

Security Policy Document Version 3.3. Tropos Networks

Pulseway Security White Paper

This Security Policy describes how this module complies with the eleven sections of the Standard:

CSCE 715: Network Systems Security

AN IPSWITCH WHITEPAPER. The Definitive Guide to Secure FTP

Security context. Technology. Solution highlights

MobilePASS. Security Features SOFTWARE AUTHENTICATION SOLUTIONS. Contents

ClickMeeting for Salesforce. User Manual

Cisco WebEx Best Practices for Secure Meetings for Site Administrators and Hosts

Spontania Administrators Manual

The Security Behind Sticky Password

Product Brief. Circles of Trust.

TeamViewer Security Statement

Security and Compliance at Mavenlink

Paperspace. Security Primer & Architecture Overview. Business Whitepaper. 20 Jay St. Suite 312 Brooklyn, NY 11201

QuickBooks Online Security White Paper July 2017

BDPA Conference Windows 10

Getting started with AWS security

Adobe Connect Advanced Features

Dialling Access to the PGi Virtual Meeting Room Service (All Methods)

RSA Solution Brief. Providing Secure Access to Corporate Resources from BlackBerry. Devices. Leveraging Two-factor Authentication. RSA Solution Brief

Getting started. Create event content. Quick Start Guide. Quick start Adobe Connect for Webinars

Security & Compliance in the AWS Cloud. Vijay Rangarajan Senior Cloud Architect, ASEAN Amazon Web

Network Security Essentials

Security Specification

Citrix XenApp and XenDesktop 7.6 LTSR FIPS Sample Deployments

FIPS Management. FIPS Management Overview. Configuration Changes in FIPS Mode

Xerox Audio Documents App

econet smart grid gateways: econet SL and econet MSA FIPS Security Policy

The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to

Transport Level Security

Security & Compliance in the AWS Cloud. Amazon Web Services

Security on AWS(overview) Bertram Dorn EMEA Specialized Solutions Architect Security and Compliance

CSC 774 Network Security

CoSign Hardware version 7.0 Firmware version 5.2

Conferencing and Recording

PKI Credentialing Handbook

Cryptographic Mechanisms: Recommendations and Key Lengths

One Identity Starling Two-Factor Desktop Login 1.0. Administration Guide

Centrify for Dropbox Deployment Guide

Cisco WebEx Meeting Center Scheduling Guide

Shine and Security. Our app is playful and encourages sharing, but we take keeping this information secure very seriously.

Citrix XenApp and XenDesktop 7.15 LTSR FIPS Sample Deployments

Certificate Certificate number:

DCCKI Interface Design Specification. and. DCCKI Repository Interface Design Specification

Secure Access & SWIFT Customer Security Controls Framework

Interagency Advisory Board Meeting Agenda, December 7, 2009

APNIC elearning: Cryptography Basics

PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL

Cisco Desktop Collaboration Experience DX650 Security Overview

PCI DSS and the VNC SDK

Rev X 341. Table 111. Access Levels and Descriptions

Getting Started with Zoom

Our broad and deep array of solutions enables you to use the cloud in your own way, at your own pace.

Security in Bomgar Remote Support

Creating Trust in a Highly Mobile World

Cloud Security Whitepaper

Table of Contents. Page 1 of 6 (Last updated 27 April 2017)

NiceLabel Label Cloud

HIPAA Regulatory Compliance

Chat and Presence. Browser Click to Call

Minimum Standards for Connecting to the UCLA Network

Axway Validation Authority Suite

Distributed Systems. 25. Authentication Paul Krzyzanowski. Rutgers University. Fall 2018

SECURE DATA EXCHANGE

Security Statement Revision Date: 23 April 2009

Afilias DNSSEC Practice Statement (DPS) Version

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Security Overview of the BGI Online Platform

UNDERSTANDING SENETAS LAYER 2 ENCRYPTION TECHNICAL-PAPER

CS November 2018

Cisco WebEx Best Practices for Secure Meetings for Hosts. Cisco WebEx Best Practices for Secure Meetings

ISO/IEC INTERNATIONAL STANDARD. Information technology Trusted Platform Module Part 2: Design principles

Meru Networks. Security Gateway SG1000 Cryptographic Module Security Policy Document Version 1.2. Revision Date: June 24, 2009

UC for Business Executive Conference

Complete document security

Deep Freeze Cloud. Architecture and Security Overview

Dell SonicWALL. NSA 220, NSA 220W and NSA 240. FIPS Non-Proprietary Security Policy

SafeNet Authentication Client

Quickstart Guide to Setup your Zoom Account To start, visit the USF Zoom site:

White Paper. How Organizations. Can Use The Cloud In Confidence. In business for people.

Contents. Configuring SSH 1

Transcription:

Introduction ClickMeeting is an easy-to-use SaaS webinar platform used worldwide. It was built using highend technology, with data security as the highest priority. The platform meets stringent security requirements in the design, deployment, and maintenance of its network, platform, and applications. Businesses and government agencies can use ClickMeeting services routinely and effectively, secure in the knowledge that their sessions are safe and private. Role-based security features Each ClickMeeting user is assigned an application-defined roles, so account owners can enforce company access policies related to service and feature use. Host privileges Hosts have the top level of webinar control and can grant and revoke various privileges for participants. Host capabilities include the following: Invite attendees before or during the webinar, so only authorized participants can join the webinar. View an attendee list showing current roles and privileges. Start and end the webinar, to prevent others from disrupting it. Make any attendee an active presenter. Allow or disallow the use of chat by attendees. Disconnect or log out attendees. Transfer the host role to another attendee so the webinar can continue if the host must leave. (Once an attendee becomes a host, this privilege cannot be revoked.) 1

Presenter privileges A presenter shares content with the attendees. Any webinar attendee may be granted the role of active presenter. Presenters have the following capabilities: Share content, to avoid displaying confidential data that might appear on the presenter s desktop while searching files or folders. Grant or revoke remote keyboard and mouse control to another attendee, to facilitate efficient communication through desktop interaction. Designate an attendee as presenter, allowing a flexible, dynamic flow. Attendee privileges Users with the attendee role have the following privileges: Join any webinar they ve been invited to. View the presentation content unless the presenter has paused or disabled it. If granted, remotely control the presenter s keyboard and mouse. (Remote control privileges are automatically revoked whenever the presenter moves his mouse.) Use chat to send text messages to all other attendees. (Chat may be disabled or moderated by the host or presenter.) Leave a webinar at any time. With basic access rights and privileges on assigned roles, webinars have the flexibility to facilitate interaction between attendees without compromising control or visibility. Hosts can easily add attendees or change the presenter as needed throughout the webinar. Presenters remain in complete control of their desktops, and hosts have everything required to manage the webinar effectively. 2

Secured Data Centers ClickMeeting servers operate using a cloud-based infrastructure. Our network includes servers in the following locations: North America: Washington DC, Virginia, Texas, California, Pennsylvania Europe: Poland, Netherlands, Russia, Ireland, Germany Asia: Singapore South America: Sao Paulo Australia: Sydney Data center personnel are available 24/7 to provide logistical security and operational support. Security Personnel We have a dedicated security department that recommends and implements security procedures for ClickMeeting service and business operations. Our dedicated security department recommends and implements security procedures for ClickMeeting service and business operations. Highly qualified security personnel receive ongoing training in all aspects of security to remain at the forefront of security innovation and meet the criteria for security accreditations. Management of security-related features covers: Account management User account-management actions Account creation Security policy Account passwords Strong account-password criteria Webinar passwords a host can set a webinar password and optionally choose to include or exclude the password in the webinar invitation email. 3

Webinar room and account security features Role-based authorization depends on the ability to correctly identify and authenticate every user. ClickMeeting uses robust account and webinar authentication features to verify the identity of each host, presenter, and attendee. Website account login To access an account on the ClickMeeting website, users must provide a valid email address and user account password. Passwords must consist of at least eight characters and include letters, numbers and non-alphabetic characters. Passwords stored in the service database are encrypted with salted SHA1 and checked using a cryptographically secured verifier that is highly resistant to dictionary attacks. Authentication of webinar attendees ClickMeeting provides the following types of access to webinars: Password protected one webinar password for all attendees. Token protected 6-Character password (digits and/or letters) generated by ClickMeeting and unique for each participant. Registration with manual conformation Host approves or declines each registration. Webinar link is sent only to approved participants. 4

Encryption Technologies/TCP layer security ClickMeeting provides the following encryption mechanisms: Data is transported from the client to the cloud-based server using 256 bit Secure Socket Layer version 3 (SSLv3). During uploading, documents and presentations are encrypted end-to-end using 256-bit RSA. Security standards ClickMeeting is compatible with world standards for cryptographic algorithms and security protocols for secure services: TLS/SSL Protocol, Version 1.0 IETF RFC 2246 RSA, PKCS #1 SHA-1, FIPS 180-1 HMAC-SHA-1, IETF RFC 2104 Advanced Encryption Standard (AES), FIPS 197 MD5, IETF RFC 1321 Pseudorandom Number Generation, ANSI X9.62 and FIPS 140-2 AES Cipher suites for TLS, IETF RFC 3268 Last update: 11/21/2016 5