MIKOGO SECURITY DOCUMENT



Similar documents
BeamYourScreen Security

Security Overview Introduction Application Firewall Compatibility

WebEx Security Overview Security Documentation

Overview Servers and Infrastructure Communication channels Peer-to-Peer connections Data Compression and Encryption...

Security Policy Revision Date: 23 April 2009

The Secure WebEx Meeting Experience

Mikogo Web Conferencing & Remote Support. User Guide (Windows Version)

RIAS stands for Remote Installation Assistance Service by NT-ware to remotely assist you on-site and on-demand. RIAS sessions are useful to guide you

Web Conferencing: Unleash the Power of Secure, Real-Time Collaboration

Access Your Cisco Smart Storage Remotely Via WebDAV

ereview Security Overview Security Overview

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.

Unleashing the power of real-time collaboration:

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

FileCloud Security FAQ

ACCESS CONTROL TO A NETWORKED COMPUTER SYSTEM

WebEx Remote Access White Paper. The CBORD Group, Inc.

Secure Transfers. Contents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3

Unleashing the power of secure, real-time collaboration

Mikogo User Guide Windows Version

Cisco QuickVPN Installation Tips for Windows Operating Systems

White Paper. BD Assurity Linc Software Security. Overview

Secure VidyoConferencing SM TECHNICAL NOTE. Protecting your communications VIDYO

Mikogo User Guide Linux Version

UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM

Security Policy. Security Policy.

Securing Ship-to-Shore Data Flow

WhatsUp Gold v16.2 MSP Edition Deployment Guide This guide provides information about installing and configuring WhatsUp Gold MSP Edition to central

USER GUIDE. General Information The BeAnywhere Service BeAnywhere Server BeAnywhere DRIVE Security... 2

How To Configure SSL VPN in Cyberoam

IIS 6.0SSL Certificate Deployment Guide

Spreed Keeps Online Meetings Secure. Online meeting controls and security mechanism.

Security Architecture Whitepaper

DSI File Server Client Documentation

LogMeIn Backup. Getting Started Guide

Security Guide for the BD Remote Instrument Support Solution BD Biosciences workstations

TeamViewer Security Information

RevShield Software Suite Network Security Review

SSL Enforcer Documentation

Ti m b u k t up ro. Timbuktu Pro and Microsoft System Management Server Integration White Paper. Contents

ISL AlwaysOn 1.0 Manual

Mikogo User Guide Mac Version

BroadData Unified Meeting Security Whitepaper v4.2

Chapter 17. Transport-Level Security

Transport Layer Security Protocols

The Desktop Sharing Handbook. Brad Hards

INTRODUCTION... 2 Windows Windows Mac OS X Ubuntu Advanced routing Windows Mac OS X Ubuntu...

RemotelyAnywhere Getting Started Guide

QUANTIFY INSTALLATION GUIDE

IBackup Drive User Guide

TeamViewer Security Information

WhatsUp Gold v16.3 Installation and Configuration Guide

Mikogo User Guide Linux Version

DataTrust Backup Software. Whitepaper Data Security. Version 6.8

Entrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client

BeamYourScreen User Guide Mac Version

SSL SSL VPN

WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise

NWIMS. Online Backup Security Documentation

Biznet GIO Cloud Connecting VM via Windows Remote Desktop

Microsoft Office Live 2007 R2. Guide. Published: August 2008

Setting Up Scan to SMB on TaskALFA series MFP s.

DFW Backup Software. Whitepaper Data Security

Ahsay Online Backup. Whitepaper Data Security

Xerox DocuShare Security Features. Security White Paper

SCADA Security. Enabling Integrated Windows Authentication For CitectSCADA Web Client. Applies To: CitectSCADA 6.xx and 7.xx VijeoCitect 6.xx and 7.

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

13.1 Backup virtual machines running on VMware ESXi / ESX Server

WhatsUpGold. v14.2. Getting Started with WhatsUp Gold MSP Edition

PrintFleet Enterprise Security Overview

SSL VPN Setup for Windows

TeamViewer Security Information

For paid computer support call

Configuration Manual

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

MadCap Software. Upgrading Guide. Pulse

Data Superhero Online Backup Whitepaper Data Security

Interacting with Users

Server Installation ZENworks Mobile Management 2.7.x August 2013

GTS Software Remote Desktop Services

REDCENTRIC MANAGED FIREWALL SERVICE DEFINITION

Cyber-Ark Software and the PCI Data Security Standard

Blaze Vault Online Backup. Whitepaper Data Security

Citrix Online, div. of Citrix Systems Inc. GoToAssist TM. Product Category: Knowledge Management/eSupport Validation Date: 2/22/2005

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

ProxyCap Help. Table of contents. Configuring ProxyCap Proxy Labs

Shipping Services Files (SSF) Secure File Transmission Account Setup

What is the Barracuda SSL VPN Server Agent?

Configuring and Monitoring Citrix Branch Repeater

Benefits of the Integrated Firewall in Anonyproz OpenVPN GUI Client

Law Conferencing uses the Webinterpoint 8.2 web conferencing platform. This service is completely reservationless and available 24/7.

Central Agency for Information Technology

Connecting to Remote Desktop Windows Users

Copyright 2012 Trend Micro Incorporated. All rights reserved.

SonicWALL SSL VPN 3.5: Virtual Assist

Sync Security and Privacy Brief

Web Security Considerations

Directory and File Transfer Services. Chapter 7

CA Unified Infrastructure Management Server

Transcription:

MIKOGO SECURITY DOCUMENT

Table of Contents Page 2. 6. 6. The Most Important Facts in a Nutshell In Detail Application Firewall Compatibility Quality Management: ISO 9001 Certification Data Compression and Encryption Website SSL Encryption Digitally Signed Software Roles and Responsibilities Session Parameters Organizer, Presenter and Participant Privileges Conclusion

The Most Important Facts in a Nutshell Data Compression and Encryption All content that is shared with the participant in the meeting is compressed with proprietary compression algorithms. This compressed content can be interpreted only by the appropriate Mikogo participant software. Moreover, Mikogo never sends meeting content in clear text, but encrypts all data using 256-bit AES encryption. Website Encryption The Mikogo website is secured with 128-bit encryption using Secure Sockets Layer (SSL), which is the most widely used Internet standard for securing sensitive web data communications. SSL web server certificates are provided and signed by VeriSign/Thawte. Session ID and Session Password A randomly generated 9-digit session ID is assigned to the session organizer to uniquely identify the session. A session password can be defined for additional security. Sessions can only be joined with the session ID and the session password if any. Roles and Responsibilities There are several roles in a Mikogo session: organizer, presenter and participant. The organizer needs a username and password and is the only user who can start sessions. The presenter has the capability to share data. The presenter determines what is shared in a session and the level of access that the participant will have during a session. The presentation rights can be handed over. Before becoming the presenter, the participant has to explicitly agree to transmit their computer screen. These same explicit agreements are also made when granting remote control rights. It is not possible to view or control the computer screen without the explicit consent of the presenter. Third Party Access Prevention We employ state of the art firewalls, network monitoring, and intrusion detection tools. Strict change management is employed and additional internal security policies and procedures are enforced. No Session Data is stored Dynamic session content displayed during a Mikogo session originates only from the presenter s machine. The participant sees only representations of this data. At the conclusion of a session, all such representations dissipate. 3

In Detail Provided by the global online collaboration solutions provider BeamYourScreen (http://www.beamyourscreen.com), Mikogo is an innovative desktop sharing tool used for sales, marketing, training, project management and customer support. BeamYourScreen endeavors that the Mikogo services meet the most stringent corporate security requirements. Mikogo assigns data security the highest priority in the design, deployment and maintenance of its network, platform and services. The purpose of this document is to provide information on the data security features and functions that are available in Mikogo and inherent in the underlying communication infrastructure. We discuss the following items in this document: application, firewall compatibility, content security, user interface security, and infrastructure security. Application The Mikogo software communicates with the Mikogo servers located in North America and Europe using proprietary protocols and data exchange methods. It is impossible to participate in a Mikogo session without the close coordination between the Mikogo software and the Mikogo servers. The data in a Mikogo session is shared using the software, which must establish a connection with a Mikogo server. These security features are inherent throughout the session. Each session is dynamic and involves a handshake between the Mikogo software and the Mikogo server, and the communication between these components is by default compressed, encoded, and encrypted. Firewall Compatibility The Mikogo software communicates with the Mikogo servers to establish a reliable and secure connection. When a session is started, the Mikogo software determines the best method for communication. The Mikogo software connects to the Mikogo servers using TCP or http/https protocols over port 80 or 44 In case TCP connections are blocked, the Mikogo software will tunnel all communications using http/https. Regardless of the type of connection that is established when the session is started, firewalls do not have to be specially configured to enable Mikogo sessions. Quality Management: ISO 9001 Certification Any user organizing a Mikogo session, as well as the people joining and participating in the session will be pleased to know that Mikogo has been awarded the ISO 9001 Certification. As one of the most internationally renowned set of requirements for quality management, the ISO 9001 Certification recognizes that an organization s quality management system has the ability to consistently provide products/services that enhances high customer satisfaction and that meet applicable statutory and regulatory requirements. 4

Mikogo provides several controls to prevent unwittingly sharing data during a session. The presenter can hide the screen at any time to browse through their own confidential files. The presenter can also hide the desktop s wallpaper, the desktop contents, and the taskbar. Data Compression and Encryption All content that a presenter shares with the participant in a session is only a representation of the original data. In addition, all content that is shared with the participant in the session is compressed with proprietary compression algorithms. This compressed content can be interpreted only by the appropriate Mikogo connection software. Moreover, Mikogo never sends session content in clear text, but encrypts all data using 256-bit AES encryption (Advanced Encryption Standard). Website SSL Encryption Mikogo secures its website with 128-bit encryption using Secure Sockets Layer (SSL), which is the most widely used Internet standard for securing sensitive web data communications. SSL web server certificates are provided and signed by VeriSign/Thawte. Digitally Signed Software All software components provided by Mikogo are digitally signed using VeriSign/Thawte certificates, the leading certificate authority. Mikogo security is also enforced through a variety of mechanisms exposed through the Mikogo user interface. The available options depend on the role a session participant assumes. Roles and Responsibilities There are several roles in a Mikogo session: organizer, presenter and participant. The organizer needs a username and password and is the only user who can start sessions. The participant can participate in a session. Both, organizer and participant can become presenter and show their screens. Session Parameters The organizer can specify a 9-digit session ID or use a randomly generated 9-digit session ID to uniquely identify the session. A session password can be defined for additional security. Sessions can be joined by either entering the session ID manually or by clicking on the join session URL in an email invitation or instant message. In either case, it is recommended that the organizer explicitly informs the participant of the existence of the session either by phone or by email. Organizer, Presenter and Participant Privileges Only an organizer can start a Mikogo session using a unique username and strong password. The organizer has the first level of control in the session. The viewing direction can be switched by both the organizer and the respective presenter at any time during a Mikogo session and requires the explicit consent of the participant. The presenter has the capability to share data. The presenter determines what is shared in a session and the level of access that the participant will have during a session. The presenter may grant remote control permissions. At any point during such a session the presenter can immediately revoke the participant s remote control privileges by pressing Ctrl+F12 (or Ctrl+ESC on a Mac computer) on the keyboard or by clicking on the M icon in the system tray and selecting Disable Remote Control. This allows full control over what can occur during times of remote control. 5

The organizer may actively request remote control privileges. The presenter always has to explicitly agree to grant remote control rights. It is not possible to control the computer without the explicit consent of the presenter. Both, organizer and presenter can switch the viewing direction. However, the participant first has to explicitly agree to become the presenter and to show their computer screen. After the participant has become the presenter for the first time during a session, the organizer can take back presenting rights for themselves and become the presenter again even without the consent of the participant. However, when switching the viewing direction, the organizer always has to explicitly agree to become presenter. Both, organizer and presenter can end the session at any time. Mikogo maintains a distributed network of high-speed switching servers. Session data originating from the presenter s machine and arriving at the participants machines is switched never stored through the Mikogo switching server network. No session data is stored on the Mikogo servers. There is no need to upload content to the Mikogo servers prior to a session. Dynamic session content displayed during a Mikogo session originates only from the presenter s machine. The participant sees only representations of this data. At the conclusion of a session, all such representations dissipate. All that remains of a Mikogo session is ancillary information like billing records, not a record of the conversation itself. BeamYourScreen invests a lot of time and energy into developing, deploying and maintaining a secure environment for the Mikogo services. We employ state of the art firewalls, network monitoring, and intrusion detection tools. Strict change management is employed and additional internal security policies and procedures are enforced. Conclusion BeamYourScreen pays careful attention to the incorporation of security principles and standards in the design and operation of the Mikogo infrastructure and services. The data security of Mikogo will remain the highest priority at BeamYourScreen, enabling us to continue achieving the goal of providing efficient and secure online real-time communication services. 6