Security: Not All Video Conferencing Platforms Are Created Equal

Last night, Nicole Perlroth wrote an interesting piece about corporate security and video camera hacking issues. The article resonated throughout the web and rightfully so: security is – and should be – a major concern when it comes to corporate networks. Luckily, not all video conferencing platforms are created equal, the VidyoRouter provides a level of security superior to other video conferencing solutions.

The article highlights two key issues:

  1. People are deploying endpoints on public IPs. Why? Because it is too difficult, too expensive or both to place them on their intranet and solve the firewall traversal issue AND they need to be able to connect with people outside of their corporate network.
  2. As directly accessible devices, legacy room systems are inherently prone to hacking when visible in public space, particularly when they ship by default with the auto answer feature turned on (as is the case with Polycom). The way these devices are accessed is dialing of an IP string from another legacy endpoint. There is no layer of protection between the two.

Here’s how Vidyo addresses these issues:

  1. VidyoRouter Cloud Edition enables customers to solve firewall traversal as a deployment option without buying expensive dedicated equipment or paying for special licensing. By deploying a low cost VidyoRouter appliance inside the corporate network and another in the DMZ, firewall traversal is achieved natively and transparently from the user’s perspective by establishing explicit IP to IP rules on the firewall between the two trusted and secured devices. Using this approach, it becomes easy to keep all of the room system endpoints on the corporate network, behind the firewall, without sacrificing performance or accessibility to the rest of the world, and without adding cost to deployment.
  2. All of the Vidyo endpoints connect through the VidyoRouter and are not directly accessible from another endpoint. The VidyoRouter inherently provides the endpoint with a layer of security from third party hacking and voyeurism with technology built in for spoof prevention (other devices can’t pretend to be a trusted part of the Vidyo network), encrypted token technology for session security, HTTPS with certificate support on login, and TLS with certification for signaling as examples. It is not possible for a would-be hacker to connect directly to a Vidyo endpoint that is on the public network simply by dialing an IP address as is the case with legacy video conferencing endpoints.

Bottom line: Vidyo’s architecture not only delivers higher performance in terms of user experience over converged IP networks, but it also prevents the kind of malicious voyeurism legacy endpoints are susceptible to when left in public space with the auto-answer feature enabled.

 

2 thoughts on “Security: Not All Video Conferencing Platforms Are Created Equal

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>

Current day month ye@r *