Posts Tagged ‘secured remote support’

What Makes R-HUB Remote Support Servers Secure?

March 25th, 2015

build_trust

As technology continues to evolve and improve, remote access and control technologies now provide the ability to significantly improve productivity and efficiency. Even so, the potentially destructive impact of remote access and control technologies must also be recognized.

How Hackers Gain Access
In a Data Breach Investigations Report, the Verizon Business Risk Team named “remote access and control” the most common attack pathway used by hackers. The team concluded that, “in over 40 percent of the breaches investigated during this study, an attacker gained unauthorized access to the victim via one of the many types of remote access and control software.”

Why R-HUB Is Secure
Given the hacker climate in which we live today, you might wonder “What makes R-HUB secure?”

That is certainly a legitimate question, considering the potential risk. First, it is important to know that R-HUB recognizes both the risk and the importance of protection and has taken a number of measures to ensure the security of the data transferred during support sessions. Below are a few of those measures that outline the major areas that support R-HUB being a secure, remote access and control technology:

  • Architecture: Encrypting data is a good start, but the reality is that it is simply not enough. A remote access and control system must provide support organizations with control over sensitive data as well as visibility into remote support activity. R-HUB’s appliance-based architecture works to unify support activity and collects all the data surrounding support in a central repository.
  • Authentication: One layer of authentication is not sufficient. Support reps should pass through multiple authentication layers or directory authentication prior to being given access to or control of a remote system. R-HUB provides administrators with complete control over the way in which individuals, teams, and customers are authenticated without sacrificing or slowing down support.
  • Access: Access should be tiered as well as permission-based at each level. R-HUB ensures this by focusing on each end of the support session and offering granular user management to administrators and reassuring controls to customers.
  • Reporting: The ability to review support activity is vital to security. R-HUB offers robust logging and recording capabilities to capture exhaustive details regarding support sessions. Administrators are provided with critical visibility into support activity.

Inadequate remote working policies can result in serious potential problems, including placing a business or organization at risk for a data breach. Data protection is now a massive concern for businesses in all sectors and industries. As the number of people working remotely continues to increase, the need to ensure that employees are able to work securely without compromising sensitive data has become of paramount importance. Ensuring the correct procedures and tools are in place can help to reduce the risks associated with inadequate remote access and control technologies, while still providing all of the benefits.

Secure your remote support sessions using our on premise R-HUB remote support servers. To obtain more information about R-HUB remote support products, contact us on 1-866-758-0984 or email us at sales@rhubcom.com

  • Share/Save/Bookmark

Why RHUB Web Conferencing and Remote Servers are So Secure

July 4th, 2014

Remote access and control can greatly improve productivity and efficiency, but at the same time, it is important to understand that these technologies can also have serious and potentially destructive disadvantages.

According to a 2013 Data Breach Investigations Report, remote access and control was named as the most common attack pathway that hackers utilize. In fact, the report went on to state that more than 40 percent of breaches investigated as part of the study involved the unauthorized access to the victim using a type of remote access control software.

Based on such startling news, it is only natural for our clients to be wary and wonder what it is that makes RHUB secure.

At RHUB, we take security very seriously and it is our highest priority. Toward that end, we have taken several distinct measures to ensure the security of data that is transferred during all report sessions.

We strongly believe that security is only as good as the weakest point in any system. When it comes to access security, hosted conferencing provides very little security. Meetings can be opened up to practically anyone who has a meeting ID and a password. That is more than just a little frightening. This so-called security can be quickly and easily compromised by simply reading someone’s email or gaining access to an individual’s calendar.

By contrast, RHUB servers make it possible to establish a virtual VPN between attendees and the host. This successfully limits the scope of attendance to internal location/address or only specified IP addresses. It should be noted that each of these policies is designed to specifically work along with your own internal security servers, such as routers, firewalls, or any other security devices that your company may have in place. As a result, RHUB servers are able to provide comprehensive security by effectively restricting attendance to only authorized attendees and locations.

When it comes to web conferencing applications, the use of strong SSL encryption maintains transmission security. RHUB’s servers utilize SSL as well as proprietary encryption for your complete peace of mind. The transmission of meeting and user passwords along with meeting IDs is completely SSL encrypted over the Internet.

The most effective solution for protecting against security breaches is to utilize an on-premise solution in which meetings are protected by your firewall. The RHUB web conferencing and remote support servers are designed to provide an effective, affordable solution.

Below are diagrams which are designed to depict three common ways in which the RHUB web conferencing and remote servers are deployed:

  • Behind the firewall: restricting it to internal meetings only (Private cloud)
  • DMZ: Designed for both internal and external meetings
  • Outside firewall: Restricting it to external meetings

 

 

(a) Behind Firewall Deployment

 

(b) DMZ: Designed for both internal and external meetings

 

(c) Outside firewall: Restricting it to external meetings

 

In both the behind-firewall as well as DMZ deployment options, strong security measures are offered. DMZ is made available on almost all routers. In addition, DMZ deployments offer superior flexibility, which makes it possible for internal or behind firewall as well as external or outside firewall attendees to join meetings. As soon as a meeting is begun, all you need to do is check the option that restricts the system for only internal attendees. Any attendees that attempt to access the system from outside your firewall will be automatically rejected by the RHUB web conferencing server.

If you would like to learn more about RHUB products, simply call us at 866-758-0984 or email us at sales@rhubcom.com

  • Share/Save/Bookmark