Spreed Keeps Online Meetings Secure. Online meeting controls and security mechanism. www.spreed.com

Similar documents
For example some Bookkeepers are using Dropbox to share the accounting files between them and their client.

Copyright Telerad Tech RADSpa. HIPAA Compliance

Security Features 01/01/2014

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

Law Conferencing uses the Webinterpoint 8.2 web conferencing platform. This service is completely reservationless and available 24/7.

Online Backup Management Console 3.8 User Manual

DRAFT Standard Statement Encryption

Hassle-Free Meetings. Hold meetings anytime anywhere.

Customer Tips. Xerox Network Scanning TWAIN Configuration for the WorkCentre 7328/7335/7345. for the user. Purpose. Background

Cloud Computing for Education Workshop

You re FREE Guide SSL. (Secure Sockets Layer) webvisions

Secur User Guide

ISL AlwaysOn 1.0 Manual

Security Policy. Security Policy.

TargetingMantra Privacy Policy

Is your data safe out there? -A white Paper on Online Security

CTERA Agent for Mac OS-X

Experian Secure Transport Service

BeamYourScreen Security

FileCloud Security FAQ

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.

Secure User Guide

Utilizing Dropbox to Share Files

Help us make this document better smarttech.com/docfeedback/ Security information

IIS 6.0SSL Certificate Deployment Guide

MIKOGO SECURITY DOCUMENT

Setting Up SSL on IIS6 for MEGA Advisor

BackupAgent Management Console User Manual

Xerox DocuShare Security Features. Security White Paper

Secure Frequently Asked Questions

BEGINNER S GUIDE TO SSL CERTIFICATES: Making the best choice when considering your online security options

Initiating Web Conferences

Beginner s Guide to SSL Certificates

Securing your Online Data Transfer with SSL

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

Enterprise SM VOLUME 1, SECTION 4.5: WEB CONFERENCING SERVICES (WCS)

Blue Jeans Network Security Features

User Guide. The AMF's File Transfer Service (FTS)

Web Conferencing Version 8.3 Troubleshooting Guide

MadCap Software. Upgrading Guide. Pulse

White Lion Seminar Edition Quick Reference Guide

2014 IBM Corporation

The All-in-One Support Solution. Easy & Secure. Secure Advisor


SSL Certificates 101

Extended SSL Certificates

CGHub Client Security Guide Documentation

Secure Data Transfer

Options for encrypted communication with AUDI AG Version of: 31 May 2011

Alaska Alternate Assessment. Website Security Assurances

Out of Harms Reach -A Whitepaper on Online Backup

Basics of SSL Certification

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Secure IIS Web Server with SSL

MSGCU SECURE MESSAGE CENTER

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Understanding SSL Certificates THAWTE IS A LEADING GLOBAL PROVIDER OF SSL CERTIFICATES

Getting Started. Getting Started.

IIS Reverse Proxy Implementation

Quick Start Guide. Hosting Your Domain

TELNET CLIENT 5.0 SSL/TLS SUPPORT

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client

Installation Procedure SSL Certificates in IIS 7

Enterprise Security Critical Standards Summary

UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM

Security Considerations

User Guide. 24x7 Audio Conferencing

understanding SSL certificates THAWTE IS A LEADING GLOBAL PROVIDER OF SSL CERTIFICATES

BEGINNERS GUIDE TO SSL CERTIFICATES: Making the BEST choice when considering your online security options

Secure Transfers. Contents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3

Table of Contents. Begin Here: Getting Started with WebEx. What is WebEx? Why would I use it?

Introweb Remote Backup Client for Mac OS X User Manual. Version 3.20

White Paper. Enhancing Website Security with Algorithm Agility

BlackBerry Business Cloud Services. Administration Guide

help BT Conference Call User Guide Web Conferencing powered by WebEx Further

Secure Client Guide

Lync Online Meeting & Conference Call Guide

ONLINE PRIVACY POLICY

SMALL BUSINESS USER GUIDE

Business Internet service from Bell User Guide

UNIFIED MEETING 5 Frequently Asked Questions

FAQ. How does the new Big Bend Backup (powered by Keepit) work?

Chapter 7 Transport-Level Security

Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability

GETTING STARTED GUIDE: VOICETEXT S WEBEX.

Colt Conferencing Frequently Asked Questions

Introduction to Dropbox. Jim Miller, LCITO Office Mobile

USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity

WhatsUp Gold v16.3 Installation and Configuration Guide

WebEx Security Overview Security Documentation

FileCruiser. User Portal Guide

BEGINNERS GUIDE BEGINNERS GUIDE TO SSL CERTIFICATES: MAKING THE BEST CHOICE WHEN CONSIDERING YOUR ONLINE SECURITY OPTIONS

Ref: U.S. Department of Commerce IT Security Program Policy and Minimum Implementation Standards, revised 30 June 2005.

Security Policy Revision Date: 23 April 2009

Conferencing Moderator Guide - Proprietary Nextera Communications. Conferencing Moderator Guide

Instructions on TLS/SSL Certificates on Yealink Phones

The Conference Room of Today. Easy & Secure. Instant Meeting

WebEx Remote Access White Paper. The CBORD Group, Inc.

SHARPCLOUD SECURITY STATEMENT

CONFERENCE NOW. with WebConnect

Transcription:

Spreed Keeps Online Meetings Secure Online meeting controls and security mechanism www.spreed.com

Spreed Online Meeting is protected by the most advanced security features. Rest assured that your meetings and events are well guarded. Over the next several pages, we explain the safety features that help keep your online meeting safe and secure with maximum protection features. 1 Accessing Your Online Meeting As a host, you decide if your meeting room is open only to a select group of people or if access is given to the public. You choose the option that best serves your needs. Only invited participants can join a private meeting room. Specify names and email addresses of anyone invited to your event. Each participant receives an email invite that includes a password for joining your meeting room. The password is personal and cannot be used by another person. A public meeting room can be joined by anybody. No login is required. Your online event can be joined with the meeting number or a generated link. Announce your meeting online through a website, social media or other avenues to make access quick and simple. With Spreed, you decide the security level for your online event. Select the suitable meeting type by setting up your Spreed online meeting. 2

2 No Long-Term Backup The Spreed server saves and administrates all your information, data and files according to the required security guidelines: Data Deleted in Seven Days All data including presentations, files, chat history, polls and participant lists, are deleted seven days after your meeting ends. You may also delete data immediately. Recorded and permanent meetings, including all data and files, will be saved for a longer period, but you have the option of deleting the entire meeting manually. No long-term storage of uploaded documents, chat histories, voting and participant lists Automatic deleting of all data seven days after the meeting ends. Recorded and permanent meetings are saved to guarantee playback and permanent availability Tip: To avoid having to upload and temporarily store your data on the Spreed server you can present your files directly from your desktop using the Screen Sharing feature. Please see the next chapter for details. Screen Sharing Eliminates the Need for Uploading Documents If you don t want to upload personal or other protected files, use screen sharing. Spreed screen sharing is the ideal feature for sharing any kind of application. PDFs, Office documents, PowerPoint presentations and other files can be shared directly from your desktop. No files need to be uploaded. More information about Screen sharing and a manual how to use this feature can be found in our Short manual Screen sharing and in the Spreed User Manual. 3

Protect Your Documents Spreed s presentation and file sharing allow you to control the flow of documents. Uploaded documents ( 1 ) can be available for all meeting participants. 2 Uploaded files can be provided for your event in the presentation panel of the meeting room ( 2 ). Presentations are not automatically made public. You can allow downloading by activating the Presentation PDF option ( 3 ). Participants gain access to the presented documents only if this option is switched on. 3 3 Manage the Security of Your Meeting As the host of a meeting, you control the rights and attendance of your participants, per your requirements. Adjust Permission With Spreed, the moderator assigns roles of participants. Every role includes special permissions. As moderator, you have full rights to decide which person takes an active part in your conference and who is part of the audience. 4

Remove Unwanted Parties You can easily remove participants from your meeting room at any time. They will be moved to the lobby and will no longer be able to hear or see presentations. Add More Security by Locking Meeting Room Want another layer of security? After your meeting starts, click on Lock Meeting to forbid any other people from entering. You can unlock your meeting room again while the meeting is running. 4 Advanced encryption Spreed protects your meetings with state of the art encryption. Data encryption (HTTPS, SSL) * Spreed supports encrypted web meeting traffic via HTTPS and SSL certificates. This provides strong cryptography via the Secure Socket Layer (SSL v3) and Transport Layer Security (TLS v1) protocols. Spreed server 256 bit data encryption Secure transmission Detailed encryption data: High-grade Encryption (AES-256 256 bit) PKCS #1 SHA-1 With RSA Encryption (256 Bytes / 2048 Bits) Participant access via a secure HTTPS website * All facts apply to Spreed Online Meeting with use of a web browser only. There is no encryption on phone lines and therefore no guarantee on security. 5

Please notice! As sites are already encrypted before being transmitted, it is nearly impossible to view content without permission. Access information Three different secure number generators generate all information required for accessing your meeting room. You can be confident that the meeting number and the personal passwords of your invited participants are secure. Spreed uses the highest security standards of data protection and data security worldwide. These security measures and the different control functions guarantee you the ability to hold online meetings in a secure environment. If you have more questions, please contact us. Spreed Germany Phone: +49-711 - 89 66 56 66 Email: info@spreed.com Web: www.spreed.com Spreed United States Phone: +1-800 - 96 98 776 (Toll-free USA) Email: value@spreed.com Web: www.spreed.com Abb. 9 Further questions? Click here. We call you in a few seconds at our cost - worldwide. Please keep your phone ready! Call now Details subject to change without notice. For additional information visit www.spreed.com. June 2014