Access security is the weakest point in hosted web 
				conferencing services:
				
				Security is as good as your weakest 
				point: Hosted conferencing services offer little in access 
				security and open up meetings to nearly anyone who has a meeting 
				ID and a password. This “security” can easily be compromised by 
				reading one’s emails or having access to an associate’s calendar 
				(since most meeting invites are done through calendar sharing). 
				In contrast, RHUB servers have the ability to setup a 
				“virtual VPN” between the host and the attendee(s), thus 
				limiting the scope of the attendance to an internal 
				location/address or specified external IP addresses. Note that 
				these policies are designed to work in conjunction with your 
				internal security servers, such as firewalls, routers or 
				other security devices your Enterprise might have deployed. In 
				the end, RHUB servers provide total best in breed security by 
				brilliantly restricting attendance to authorized locations and 
				attendees. 
				Data transmission security:
				For web conferencing applications, transmission security is 
				maintained by using strong SSL encryption alongside with each 
				vendor's proprietary encryption. RHUB's servers use both SSL 
				and proprietary encryption. The transmission of user and meeting 
				passwords as well as meeting IDs over the Internet is SSL 
				encrypted.  
				
				Deploy RHUB Web Conferencing Servers to fit your security 
				needs: 
				The best way to protect against the security breaches 
				described above is to use an on-premise solution where your 
				firewall protects your meetings. The RHUB web conferencing 
				servers are the most affordable solutions that fit that 
				purpose. 
				The diagrams below show three typical ways to deploy the RHUB 
				web conferencing servers: 
				
					- Behind the firewall: restricting it to internal meetings 
					only (Private cloud)
 
					- DMZ: Designed for both internal and external meetings
 
					- Outside firewall: Restricting it to external meetings
 
				 
				  
				
				  
				(a) Behind Firewall Deployment   
				
				  
				(b) DMZ Deployment   
				
				  
				(c) Outside Firewall Deployment 
				Both behind-firewall and DMZ deployment offer 
				strong security measures. DMZ is available on almost every 
				router, including home routers. DMZ deployments provide great 
				flexibility, allowing both internal (behind firewall) and 
				external (outside firewall) attendees to join a meeting. When 
				you start a meeting, you simply check the option to restrict the 
				system for internal attendees only (see below diagram). In that 
				case, the RHUB web conferencing server will reject any 
				attendees accessing the system from outside your firewall. 
				  
				You can determine the level of security of a meeting 
				The outside-firewall deployment (c) is equivalent in security to 
				hosted services. It has the same weak access issues as hosted 
				services do.    |