Security is a major concern to all customers, and rightly so. Web conferencing connects people as if they were in the same room, and the information shared should flow freely but be as confidential as you need.
We secure live video and audio communications from the moment of connection. Highly sophisticated authentication technology ensures that people who connect to any conference are who they say they are, and only connect with the tools they are authorised to connect with. The OnSync client authenticates itself against the communication server prior to establishing connection, and the location of the OnSync client is also verified — permitting access from authorised sources only. Only after the application connecting to the server has been verified do we authorise your authentication credentials — providing two levels of independent security.
As video and audio communications are streamed live from client to server and then on to other participants, there is no caching of data. At no time is any information saved on the viewer’s computer, not even when watching a streaming recorded OnSync session. This avoids the possibility of anyone raiding the browser cache and saving unauthorised information to the desktop.
During transmission of audio and video data, OnSync uses the RTMP protocol by Adobe. This is a proprietary protocol (unlike RTSP or HTTP, used by some of our competitors), which automatically reduces security threats.
Additionally, using RTMPS, streams can be encrypted via SSL to 128kbit level. Custom authentication schemes validate the SSL connection prior to passing any data from the server to a client. Real time encryption is also provided, through use of the RTMPE protocol. This real time encryption thwarts third party applications attempting to “rip” the data from the transmitted streams, because only OnSync is able to decode the data transmitted from the server to the client.
In addition to protecting your streams, all other file types you move in and out of OnSync are protected by SSL encryption at all times. This provides the highest level of standard industry protection for your confidential data.
Access logs provide historic feedback on any access to sessions, streams or files, with full information about attempted security violations and IP tracking.
Ultimately, the only reliable means of maintaining a high security standard is evolution. To fight security threats, we continuously monitor and update our systems, adding new security features as they appear, reacting quickly to threats as they are identified, and reworking our security strategies to proactively avoid intrusion.