Security Features 01/01/2014



Similar documents
Spreed Keeps Online Meetings Secure. Online meeting controls and security mechanism.

Security Policy. Security Policy.

FileCloud Security FAQ

Unleashing the power of real-time collaboration:

Law Conferencing uses the Webinterpoint 8.2 web conferencing platform. This service is completely reservationless and available 24/7.

Web Conferencing: Unleash the Power of Secure, Real-Time Collaboration

NETASQ SSO Agent Installation and deployment

Lync for Mac 2011 Deployment Guide

UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM

CTERA Agent for Mac OS-X

Web Conferencing Version 8.3 Troubleshooting Guide

Conformance of Avaya Aura Workforce Optimization Quality Monitoring Recording Solution with the PCI Data Security Standard

The Secure WebEx Meeting Experience

LBSEC.

IIS 6.0SSL Certificate Deployment Guide

INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification

Configuring Security Features of Session Recording

WebEx Security Overview Security Documentation

Unleashing the power of secure, real-time collaboration

WebEx Remote Access White Paper. The CBORD Group, Inc.

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.

Security White Paper The Goverlan Solution

Data Storage That Looks at Business the Way You Do. Up. cloud

BeamYourScreen Security

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

DEPLOYMENT GUIDE Version 1.1. Deploying F5 with Oracle Fusion Middleware Identity Management 11gR1

FileMaker Server 13. Getting Started Guide

Paxera Uploader Basic Troubleshooting

MaaS360 Mobile Enterprise Gateway

The Security Behind Sticky Password

SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX

MIKOGO SECURITY DOCUMENT

Enterprise Solution for Remote Desktop Services System Administration Server Management Server Management (Continued)...

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

Colt Conferencing Frequently Asked Questions

Audio and Web Conferencing

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

SAS Agent for Outlook Web Access

Data Storage that Looks at Business the Way You Do. Up. cloud

User's Manual. Intego Remote Management Console User's Manual Page 1

How To Set Up Dataprotect

Live Guide System Architecture and Security TECHNICAL ARTICLE

What is the Barracuda SSL VPN Server Agent?

DilRoom. Improving, accelerating and simplifying the sharing of sensitive information.

Web Conferencing User Guide

LIVE CHAT CLOUD SECURITY Everything you need to know about live chat and communicating with your customers securely

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview

Security Overview Enterprise-Class Secure Mobile File Sharing

Citrix XenApp 6.5 and XenDesktop 5.6 Security Standards and Deployment Scenarios Supplementary scenarios

Security Policy Revision Date: 23 April 2009

How To Understand The Architecture Of An Ulteo Virtual Desktop Server Farm

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Internet Information Services (IIS)

RSS Cloud Solution COMMON QUESTIONS

SSL SSL VPN

Did you know your security solution can help with PCI compliance too?

PartnerConnect software. Installation guide

DEPLOYMENT GUIDE Version 1.0. Deploying F5 with the Oracle Fusion Middleware SOA Suite 11gR1

MaaS360 Mobile Enterprise Gateway

ISL AlwaysOn 1.0 Manual

Important Notes for WinConnect Server ES Software Installation:

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client

Cloud Video. Data Sheet

Administrators Help Manual

Unified Meeting. Easy to use, simple, reliable. Tips for a Successful Conference CONFERENCING & COLLABORATION

Voice Conference Manager

DiamondStream Data Security Policy Summary

Agent Configuration Guide

Spontania User Setup Guide

LifeSize Transit Deployment Guide June 2011

BlackShield ID Agent for Remote Web Workplace

Sync Security and Privacy Brief

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Outlook Web Access 1.06

Genesys Meeting Center User Guide v4.11

HP IMC Firewall Manager

BlackShield ID Agent for Terminal Services Web and Remote Desktop Web

Mobile Device Management Solution Hexnode MDM

Web Conference Manager

ENTRUST CLOUD. SSL Digital Certificates, Discovery & Management entrust@entrust.com entrust.com

FileMaker Server 13. FileMaker Server Help

LifeSize UVC Multipoint Deployment Guide

Software Defined Perimeter Working Group. SDP Hackathon Whitepaper

Audio and Web Conferencing quick start guide

OpenScape Web Collaboration

Secure Transfers. Contents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3

TOP SECRETS OF CLOUD SECURITY

System Management. What are my options for deploying System Management on remote computers?

SMART Bridgit software

This works very well for situations where all computers are within the same LAN and can access both the SQL server and the network shares.

Transition Networks White Paper. Network Security. Why Authentication Matters YOUR NETWORK. OUR CONNECTION.

Using the FDO Remote Access Portal

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Proof of Concept Guide

SSL VPN Technical Primer

Transcription:

Security Features 01/01/2014

Introduction ArkadinAnywhere is Arkadin s easy-to-use web collaboration service that helps improve internal and external communication processes, thereby enabling employees to work more efficiently through the ability to collaborate remotely. Designed for a quick deployment and adoption by all users, Arkadin Anywhere has a simple, user friendly and intuitive interface requiring minimum user training. Online meetings can start instantly and there is no need to download software. Arkadin Anywhere offers easy visual sharing from a computer: Share documents and applications online (web conference participants can see everything that is on the presenter s screen: a spread sheet, a web site, or any job specific program placed on the desktop) Present slide presentations Demonstrate new products in a visual format Annotate and utilize the white board in real-time Remotely control another desktop This document describes the security features built into Arkadin Anywhere. It also includes the web based audio console for managing Arkadin audio conferences. Anywhere meeting experience Meeting roles Three key roles are defined in ArkadinAnywhere conference: Moderator, Presenter and Participant. Moderator: has the most control in a session and the ability to grant and revoke various privileges for the other participants. He/she joins the conference with a specific Moderator PIN. Start/end the conference, and lock the conference to avoid uninvited participant to join in See the complete list of Attendees and manage their roles (e.g. Participant to Presenter promotion) Manage the conference settings to allow or disallow certain functions for participants, for example: Chat, save presented document, transfer file, waits for moderator etc. Moderators are able to use their personal Content Bank to upload and store content for future presentation in a web conference.

Presenter: has the sharing ability to present documents, specific applications, or the entire desktop and control the annotation tools. He/she joins the conference with the Participant PIN and gets promoted to Presenter by the Moderator. Whenever the Moderator or a Presenter is sharing an application or his/her entire desktop, a Participant view panel is displayed as a reminder that desktop sharing is active, so that desktop screens are never shared accidentally. Participant: has minimal responsibilities and typically only views session content. He/she joins the conference with the Participant PIN. Attendee list and content list confidentiality By default the list of conference attendees will appear on the screen. The Moderator can disable access to the attendee list at any time during the conference for confidentiality. The list can also be disabled ahead of time or permanently. The same options are also available for the list of content being shared during a meeting so the Moderator can stop the content list being shared. Application or Desktop sharing The application or desktop sharing feature can be disabled centrally for all your users by Arkadin during provisioning or at a later date. The remote control or the ability for participants to be made presenters in order to share their applications or desktop can also be disabled. Audio Conference Management via Web Console The web based audio console is unique to Arkadin and provides security and control for conference calls. This is an incredibly powerful, yet simple and user-friendly tool that allows moderators to view and control audio conference calls in real time via an Internet browser. At a glance the moderator can see the list of all attendees on the call together with their telephone numbers. The moderator can monitor and control the conference by using the features that include: features including muting, conference locking and disconnecting one or several participants. It is therefore easy to see if there are any unexpected callers attending the call and they can be disconnected if appropriate, so ensuring meeting confidentiality.

One-Time PIN Conference Access In addition to the permanent conference PINs, one-time use conferences can be scheduled via the ArkadinLounge portal for a specific date, time and duration. One-time PIN codes are only valid for the duration of the scheduled conference for greater security. Meet-Me Secure This feature provides the most secure profile. Instead of a shared Participant PIN, Participants are provided with individual PIN codes or User IDs, which authenticate and automatically name them in the Participant list. The system checks the Participant s PIN code against a preestablished white list before granting access to the conference. Non matching PIN users are automatically re-directed to an operator. Security level Ease for Moderator Anywhere or Audio Console Good One-click X One-Time PINS Strong Booking X X Strongest PIN list management X Secured PINs X Security Transport layer security On top of the application security, access to the ArkadinAnywhere platform is secured at the transport layer level using a high level of encryption thanks to the https protocol and TLS encryption over TCP port 443. All non-secured communications over port 80 are automatically forced and redirected to a secure mode. The anywhereconference.com web site identity has been verified by VeriSign which provides the https certificate. The certificate provides a 128 bits encryption using an RC4 cyphered connection with SHA1 for authentication and RSA for key exchanges. Servers do not accept connections using a version under the SSL V3.0 protocol. TLS 1.0 is the default mode.

Server to server communications is on private MPLS networks between regions and on private LANs when on the same site. Application servers securely communicate between each other through AES 256 bits encrypted streams with RSA for key exchanges. Firewall compatibility Arkadin Anywhere uses HTTPS (port 443) to establish a reliable and secure connection between the anywhereconference.com domain and the servers. If IT administrators have to allow traffic to the anywhereconference.com servers using TCP port 443 with https protocol, Arkadin Administrators can provide the exact list of server IP addresses. Caution: Arkadin is often adding servers to the infrastructure so the list if frequently updated. There is no direct communication between users terminals. All communications go through the server to provide end-to-end high level security. Content security Data exchanged during meetings is secured thanks to the 128 bits encryption. It covers slides, application or desktop sharing data, chat messages, files and everything being exchanged during the meeting. Content exchanged during an ArkadinAnywhere web conference is securely stored in folders that are not accessible from the Internet. This security is regularly tested to ensure confidentiality is maintained (see Third Party Audit.) Only application servers have access to the content and are able to forward it to authenticated users. All content shared during a web conference is deleted from servers when the moderator ends the conference.* Arkadin has security measures in place to ensure that data exchanged during a given web conference is solely restricted to that specific meeting. It is not possible to access shared data from another web conference. Strong role based authentication checks are also in place to ensure that users rights are maintained for data sharing so the level of documentation sharing rights are done to make sure data are reachable only depending on the user role: Moderator, Presenter or Participant.

Arkadin Anywhere application sharing module An optional module is required on users machines for application and desktop sharing. The module is digitally signed by Arkadin. It is an ActiveX for Internet Explorer, a Firefox module on Windows and a DMG package on MacOS for Safari, Firefox and Chrome browsers. Arkadin Anywhere Content Bank The Arkadin Content Bank* provides Cloud storage to Moderators so they are able to easily retrieve their content, especially if it is frequently used, during their meetings. Content is stored in secured databases that cannot be accessed via the public Internet (only authenticated users can access the information.) Only application servers have access to the database. *Arkadin will not modify documents stored in the Content Bank. It is the moderator s storage space and as such they are responsible for the content of documents stored and the uploading and deletion of these documents. The Content Bank should not be used for data back-up or archiving. There are content banks in the US, in France and in Hong-Kong. Arkadin administrators can determine which one of these content banks is used for your company. By default the Content Bank will be enabled. However, it can be deactivated during provisioning by Arkadin administrators, if requested. It can also be deactivated at any time by contacting Arkadin Client Care. Documents in the Content Bank will be automatically archived after 6 months for a period of 3 months before being deleted. When a customer account is deleted, all documents in the associated Content Bank will be removed. Third party audit Verizon Cybertrust Security performs security audits on the ArkadinAnywhere application. Verizon Cybertrust Security has more than 350 security consultants in 18 countries with robust methodologies based on standards and certifications (OSSTMM, OWASP, CREST and CHECK). Their consultants have the following certifications: CESG CHECK GIAC Certified Penetration Tester Certified Information Systems Security Professional CISSP ISACA Certified Information System Auditor (CISA) Payment Card Industry Qualified Security Assessor PCI QSA.

Verizon Cybertrust Security audits are manual penetration tests performed by their security consultants. Their security reports are referring to the OWASP methodology. Please refer to www.owasp.org for more details. Arkadin commits to fixing any major security issue that might be discovered by Verizon Cybertrust Security. Data Centers Arkadin has deployed global audio and web conferencing platforms all around the world. These platforms are housed in world-class Tier 1 secured data centers located in major cities such as London, Paris, New York, Frankfurt, Hong Kong, Tokyo, Guangzhou, ChongQing, New Delhi, Gyeonggi, Sydney, Brazil, Singapore etc... People allowed to access to any facility must be registered on the access list managed globally by the Arkadin security team.