BeamYourScreen Security

Similar documents
MIKOGO SECURITY DOCUMENT

Security Overview Introduction Application Firewall Compatibility

WebEx Security Overview Security Documentation

Overview Servers and Infrastructure Communication channels Peer-to-Peer connections Data Compression and Encryption...

Security Policy Revision Date: 23 April 2009

The Secure WebEx Meeting Experience

RIAS stands for Remote Installation Assistance Service by NT-ware to remotely assist you on-site and on-demand. RIAS sessions are useful to guide you

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.

Web Conferencing: Unleash the Power of Secure, Real-Time Collaboration

Access Your Cisco Smart Storage Remotely Via WebDAV

ereview Security Overview Security Overview

BeamYourScreen User Guide Mac Version

Unleashing the power of real-time collaboration:

Cisco QuickVPN Installation Tips for Windows Operating Systems

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

FileCloud Security FAQ

DSI File Server Client Documentation

Unleashing the power of secure, real-time collaboration

IIS 6.0SSL Certificate Deployment Guide

ACCESS CONTROL TO A NETWORKED COMPUTER SYSTEM

USER GUIDE. General Information The BeAnywhere Service BeAnywhere Server BeAnywhere DRIVE Security... 2

ISL AlwaysOn 1.0 Manual

WebEx Remote Access White Paper. The CBORD Group, Inc.

Secure Transfers. Contents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3

Setting Up Scan to SMB on TaskALFA series MFP s.

LogMeIn Backup. Getting Started Guide

White Paper. BD Assurity Linc Software Security. Overview

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client

Secure VidyoConferencing SM TECHNICAL NOTE. Protecting your communications VIDYO

SSL SSL VPN

UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM

Securing Ship-to-Shore Data Flow

Mikogo Web Conferencing & Remote Support. User Guide (Windows Version)

Security Policy. Security Policy.

RevShield Software Suite Network Security Review

WhatsUp Gold v16.2 MSP Edition Deployment Guide This guide provides information about installing and configuring WhatsUp Gold MSP Edition to central

SSL Enforcer Documentation

How To Configure SSL VPN in Cyberoam

About the Canon Mobile Scanning MEAP Application

SCADA Security. Enabling Integrated Windows Authentication For CitectSCADA Web Client. Applies To: CitectSCADA 6.xx and 7.xx VijeoCitect 6.xx and 7.

Interacting with Users

IBackup Drive User Guide

Quadro Configuration Console User's Guide. Table of Contents. Table of Contents

SSL VPN Setup for Windows

Spreed Keeps Online Meetings Secure. Online meeting controls and security mechanism.

Security Architecture Whitepaper

Copyright 2012 Trend Micro Incorporated. All rights reserved.

TeamViewer Security Information

Security Guide for the BD Remote Instrument Support Solution BD Biosciences workstations

Ti m b u k t up ro. Timbuktu Pro and Microsoft System Management Server Integration White Paper. Contents

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

Transport Layer Security Protocols

BroadData Unified Meeting Security Whitepaper v4.2

Welcome to ebeam Meeting Sharing

Chapter 17. Transport-Level Security

OfficeSuite HD Meeting Frequently Asked Questions

INTRODUCTION... 2 Windows Windows Mac OS X Ubuntu Advanced routing Windows Mac OS X Ubuntu...

The Desktop Sharing Handbook. Brad Hards

RemotelyAnywhere Getting Started Guide

TeamViewer Security Information

QUANTIFY INSTALLATION GUIDE

Mikogo User Guide Mac Version

WhatsUp Gold v16.3 Installation and Configuration Guide

Configuring and Monitoring Citrix Branch Repeater

How to Setup and Connect to an FTP Server Using FileZilla. Part I: Setting up the server

Server Installation ZENworks Mobile Management 2.7.x August 2013

Campus VPN. Version 1.0 September 22, 2008

NAS 323 Using Your NAS as a VPN Server

DataTrust Backup Software. Whitepaper Data Security. Version 6.8

DEPLOYMENT OF I M INTOUCH (IIT) IN TYPICAL NETWORK ENVIRONMENTS. Single Computer running I m InTouch with a DSL or Cable Modem Internet Connection

Entrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates

Microsoft Office 365 with MailDefender

ProxyCap Help. Table of contents. Configuring ProxyCap Proxy Labs

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

For example some Bookkeepers are using Dropbox to share the accounting files between them and their client.

System Management. What are my options for deploying System Management on remote computers?

Law Conferencing uses the Webinterpoint 8.2 web conferencing platform. This service is completely reservationless and available 24/7.

NWIMS. Online Backup Security Documentation

FAQ. How does the new Big Bend Backup (powered by Keepit) work?

TELNET CLIENT 5.0 SSL/TLS SUPPORT

WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise

Customer Tips. Xerox Network Scanning TWAIN Configuration for the WorkCentre 7328/7335/7345. for the user. Purpose. Background

Microsoft Office Live 2007 R2. Guide. Published: August 2008

Biznet GIO Cloud Connecting VM via Windows Remote Desktop

Mikogo User Guide Windows Version

Online Backup Client User Manual

DFW Backup Software. Whitepaper Data Security

Ahsay Online Backup. Whitepaper Data Security

Xerox DocuShare Security Features. Security White Paper

visionapp Remote Desktop 2010 (vrd 2010)

Integrated SSL Scanning

SonicWALL SSL VPN 3.5: Virtual Assist

Installation Guide. Research Computing Team V1.9 RESTRICTED

13.1 Backup virtual machines running on VMware ESXi / ESX Server

WhatsUpGold. v14.2. Getting Started with WhatsUp Gold MSP Edition

PrintFleet Enterprise Security Overview

Interworks. Interworks Cloud Platform Installation Guide

1. Product Information

Install FileZilla Client. Connecting to an FTP server

Important Notes for WinConnect Server VS Software Installation:

Transcription:

BeamYourScreen Security

Table of Contents BeamYourScreen Security... 1 The Most Important Facts in a Nutshell... 3 Content Security... 3 User Interface Security... 3 Infrastructure Security... 3 In Detail... 4 Application... 4 Firewall Compatibility... 4 Quality Management: ISO 9001 Certification... 4 Content Security... 5 Data Compression and Encryption... 5 Website SSL Encryption... 5 Digitally Signed Software... 5 User Interface Security... 5 Roles and Responsibilities... 5 Session Parameters... 5 Host, Presenter and Participant Privileges... 5 Infrastructure Security... 6 Conclusion... 6 BeamYourScreen Security Page 2

The Most Important Facts in a Nutshell Content Security Data Compression and Encryption Website Encryption All content that is shared with the participant in the session is compressed with proprietary compression algorithms. This compressed content can be interpreted only by the appropriate BeamYourScreen connection software. Moreover, BeamYourScreen never sends session content in clear text, but encrypts all data using 256-bit AES encryption. All BeamYourScreen websites are secured with 128-bit encryption using Secure Sockets Layer (SSL), which is the most widely used Internet standard for securing sensitive web data communications. SSL web server certificates are provided and signed by VeriSign/Thawte. User Interface Security Session ID and Session Password Roles and Responsibilities The host can specify a 9-digit session ID or use a randomly generated 9- digit session ID to uniquely identify the session. A session password can be defined for additional security. Sessions can only be joined with the session ID and the session password if any. There are several roles in a BeamYourScreen session: host, presenter and participant. The host needs a username and password and is the only user who can start sessions. The presenter has the capability to share data. The presenter determines what is shared in a session and the level of access that the participant will have during a session. The presentation rights can be handed over. Before becoming the presenter, the participant has to explicitly agree to transmit their computer screen and to grant remote control rights. It is not possible to view or control the computer screen without the explicit consent of the presenter. Infrastructure Security Third Party Access Prevention No Session Data is stored We employ state of the art firewalls, network monitoring, and intrusion detection tools. Strict change management is employed and additional internal security policies and procedures are enforced. Dynamic session content displayed during a BeamYourScreen session originates only from the presenter s machine. The participant sees only representations of this data. At the conclusion of a session, all such representations dissipate. BeamYourScreen Security Page 3

In Detail BeamYourScreen provides innovative web collaboration solutions to companies around the world. These companies use the BeamYourScreen products for sales, marketing, training, project management and customer support. BeamYourScreen endeavors that its services meet the most stringent corporate security requirements. BeamYourScreen assigns data security the highest priority in the design, deployment and maintenance of its network, platform and services. The purpose of this document is to provide information on the data security features and functions that are available in BeamYourScreen and inherent in the underlying communication infrastructure. We discuss the following items in this document: application, firewall compatibility, content security, user interface security, and infrastructure security. Application The BeamYourScreen software communicates with the BeamYourScreen servers located in North America and Europe using proprietary protocols and data exchange methods. It is impossible to participate in a BeamYourScreen session without the close coordination between the BeamYourScreen software and the BeamYourScreen servers. The data in a BeamYourScreen session is shared using the software, which must establish a connection with a BeamYourScreen server. These security features are inherent throughout the session. Each session is dynamic and involves a handshake between the BeamYourScreen software and the BeamYourScreen server, and the communication between these components is by default compressed, encoded, and encrypted. Firewall Compatibility The BeamYourScreen software communicates with the BeamYourScreen servers to establish a reliable and secure connection. When a session is started, the BeamYourScreen software determines the best method for communication. The BeamYourScreen software connects to the BeamYourScreen servers using TCP or http/https protocols over port 80 or 443. In case TCP connections are blocked, the BeamYourScreen software will tunnel all communications using http/https. Regardless of the type of connection that is established when the session is started, firewalls do not have to be specially configured to enable BeamYourScreen sessions. Quality Management: ISO 9001 Certification Any user organizing a BeamYourScreen session, as well as the people joining and participating in the session will be pleased to know that BeamYourScreen has been awarded the ISO 9001 Certification. As one of the most internationally renowned set of requirements for quality management, the ISO 9001 Certification recognizes that an organization s quality management system has the ability to consistently provide products/services that enhances high customer satisfaction and that meet applicable statutory and regulatory requirements. BeamYourScreen Security Page 4

Content Security BeamYourScreen provides several controls to prevent unwittingly sharing data during a session. The presenter can hide the screen at any time to browse through their own confidential files. The presenter can also hide the desktop s wallpaper, the desktop contents, and the task bar. Data Compression and Encryption All content that a presenter shares with the participant in a session is only a representation of the original data. In addition, all content that is shared with the participant in the session is compressed with proprietary compression algorithms. This compressed content can be interpreted only by the appropriate BeamYourScreen connection software. Moreover, BeamYourScreen never sends session content in clear text, but encrypts all data using 256-bit AES encryption (Advanced Encryption Standard). Website SSL Encryption BeamYourScreen secures all its websites with 128-bit encryption using Secure Sockets Layer (SSL), which is the most widely used Internet standard for securing sensitive web data communications. SSL web server certificates are provided and signed by VeriSign/Thawte. Digitally Signed Software All software components provided by BeamYourScreen are digitally signed using VeriSign/Thawte certificates, the leading certificate authority. User Interface Security BeamYourScreen security is also enforced through a variety of mechanisms exposed through the BeamYourScreen user interface. The available options depend on the role a session participant assumes. Roles and Responsibilities There are several roles in a BeamYourScreen session: host, presenter and participant. The host needs a username and password and is the only user who can start sessions. The participant can participate in a session. Both, host and participant can become presenter and show their screens. Session Parameters The host can specify a 9-digit session ID or use a randomly generated 9-digit session ID to uniquely identify the session. A session password can be defined for additional security. Sessions can be joined by either entering the session ID manually or by clicking on the join session URL in an email invitation or instant message. In either case, the host must explicitly inform the participant of the existence of the session either by phone or by email. Host, Presenter and Participant Privileges Only a host can start a BeamYourScreen session using a unique username and strong password. The host has the first level of control in the session and can specify the initial viewing direction. The viewing direction can be switched by both the host and the respective presenter at any time during a BeamYourScreen session and requires the explicit consent of the participant. The presenter has the capability to share data. The presenter determines what is shared in a session and the level of access that the participant will have during a session. BeamYourScreen Security Page 5

The presenter may grant remote control permissions. At any point during such a session the presenter can immediately revoke the participant s remote control privileges by pressing Ctrl + F12 on the keyboard (on a PC, or Ctrl + Esc on a Mac computer) or by clicking on the B icon in the system tray and selecting Disable Remote Control. This allows full control over what can occur during a remote control session. The host may actively request remote control privileges. The presenter always has to explicitly agree to grant remote control rights. It is not possible to control the computer without the explicit consent of the presenter. Both, host and presenter can switch the viewing direction. However, the participant first has to explicitly agree to become the presenter and to show their computer screen. After the participant has become the presenter for the first time during a session, the host can switch the viewing direction even without the consent of the participant. However, when switching the viewing direction, the host always has to explicitly agree to become presenter. Both, host and presenter can end the session at any time. Infrastructure Security BeamYourScreen maintains a distributed network of high-speed switching servers. Session data originating from the presenter s machine and arriving at the participants machines is switched never stored through the BeamYourScreen switching server network. No session data is stored on the BeamYourScreen servers. There is no need to upload content to the BeamYourScreen servers prior to a session. Dynamic session content displayed during a BeamYourScreen session originates only from the presenter s machine. The participant sees only representations of this data. At the conclusion of a session, all such representations dissipate. All that remains of a BeamYourScreen session is ancillary information like billing records, not a record of the conversation itself. BeamYourScreen invests a lot of time and energy into developing, deploying and maintaining a secure environment for our services. We employ state of the art firewalls, network monitoring, and intrusion detection tools. Strict change management is employed and additional internal security policies and procedures are enforced. Conclusion BeamYourScreen pays careful attention to the incorporation of security principles and standards in the design and operation of the BeamYourScreen infrastructure and services. Data security will remain the highest priority at BeamYourScreen, enabling us to continue achieving the goal of providing efficient and secure online real-time communication services. BeamYourScreen Security Page 6