Remote access and control can greatly improve productivity and efficiency, but at the same time, it is important to understand that these technologies can also have serious and potentially destructive disadvantages.
According to a 2013 Data Breach Investigations Report, remote access and control was named as the most common attack pathway that hackers utilize. In fact, the report went on to state that more than 40 percent of breaches investigated as part of the study involved the unauthorized access to the victim using a type of remote access control software.
Based on such startling news, it is only natural for our clients to be wary and wonder what it is that makes RHUB secure.
At RHUB, we take security very seriously and it is our highest priority. Toward that end, we have taken several distinct measures to ensure the security of data that is transferred during all report sessions.
We strongly believe that security is only as good as the weakest point in any system. When it comes to access security, hosted conferencing provides very little security. Meetings can be opened up to practically anyone who has a meeting ID and a password. That is more than just a little frightening. This so-called security can be quickly and easily compromised by simply reading someone’s email or gaining access to an individual’s calendar.
By contrast, RHUB servers make it possible to establish a virtual VPN between attendees and the host. This successfully limits the scope of attendance to internal location/address or only specified IP addresses. It should be noted that each of these policies is designed to specifically work along with your own internal security servers, such as routers, firewalls, or any other security devices that your company may have in place. As a result, RHUB servers are able to provide comprehensive security by effectively restricting attendance to only authorized attendees and locations.
When it comes to web conferencing applications, the use of strong SSL encryption maintains transmission security. RHUB’s servers utilize SSL as well as proprietary encryption for your complete peace of mind. The transmission of meeting and user passwords along with meeting IDs is completely SSL encrypted over the Internet.
The most effective solution for protecting against security breaches is to utilize an on-premise solution in which meetings are protected by your firewall. The RHUB web conferencing and remote support servers are designed to provide an effective, affordable solution.
Below are diagrams which are designed to depict three common ways in which the RHUB web conferencing and remote servers are deployed:
- Behind the firewall: restricting it to internal meetings only (Private cloud)
- DMZ: Designed for both internal and external meetings
- Outside firewall: Restricting it to external meetings
(a) Behind Firewall Deployment
(b) DMZ: Designed for both internal and external meetings
(c) Outside firewall: Restricting it to external meetings
In both the behind-firewall as well as DMZ deployment options, strong security measures are offered. DMZ is made available on almost all routers. In addition, DMZ deployments offer superior flexibility, which makes it possible for internal or behind firewall as well as external or outside firewall attendees to join meetings. As soon as a meeting is begun, all you need to do is check the option that restricts the system for only internal attendees. Any attendees that attempt to access the system from outside your firewall will be automatically rejected by the RHUB web conferencing server.
If you would like to learn more about RHUB products, simply call us at 866-758-0984 or email us at email@example.com