{"id":14685,"date":"2020-04-21T18:16:18","date_gmt":"2020-04-21T15:16:18","guid":{"rendered":"https:\/\/trueconf.com\/blog\/?p=14685"},"modified":"2024-08-01T15:26:54","modified_gmt":"2024-08-01T12:26:54","slug":"video-conferencing-security-how-trueconf-protects-your-privacy","status":"publish","type":"post","link":"https:\/\/trueconf.com/blog\/news\/video-conferencing-security-how-trueconf-protects-your-privacy","title":{"rendered":"Video conferencing security: How TrueConf protects your privacy"},"content":{"rendered":"<p><a href=\"https:\/\/trueconf.com\/blog\/wp-content\/uploads\/2020\/04\/security_trueconf.png\" data-rel=\"lightbox-gallery-wE6VQWFH\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-14694\" src=\"https:\/\/trueconf.com\/blog\/wp-content\/uploads\/2020\/04\/security_trueconf.png\" alt=\"\" width=\"1200\" height=\"auto\" loading=\"lazy\" title=\"\" srcset=\"https:\/\/trueconf.com/blog\/wp-content\/uploads\/2020\/04\/security_trueconf.png 1600w, https:\/\/trueconf.com/blog\/wp-content\/uploads\/2020\/04\/security_trueconf-690x345.png 690w, https:\/\/trueconf.com/blog\/wp-content\/uploads\/2020\/04\/security_trueconf-768x384.png 768w, https:\/\/trueconf.com/blog\/wp-content\/uploads\/2020\/04\/security_trueconf-1024x513.png 1024w, https:\/\/trueconf.com/blog\/wp-content\/uploads\/2020\/04\/security_trueconf-290x145.png 290w\" sizes=\"auto, (max-width: 1600px) 100vw, 1600px\" \/><\/a><\/p>\n<p>The coronavirus outbreak has pushed businesses and government institutions to move any in-person activities online. With a third of humanity now in lockdown due to the pandemic, video conferencing systems have surged in popularity for personal and professional events. As more and more people prefer to use virtual meetings for their internal and external organizational communications, we believe it is our responsibility to provide a clear explanation of how we protect your video meetings and personal information.<\/p>\n<p>Cloud-based video conferencing systems largely depend on an Internet connection and third-party security measures, creating vulnerabilities for enterprises adopting the technology. TrueConf offers a self-hosted collaboration platform that operates totally offline in your LAN\/VPN network. With TrueConf, you are free to take full advantage of the on-premises video conferencing solution, while all communications, meeting recordings and personal data stay within your company network under your supervision. You can learn more about how we protect your information <a href=\"https:\/\/trueconf.com\/features\/core\/encryption.html\" target=\"_blank\" rel=\"noopener noreferrer\"><b>here<\/b><\/a>.<!--more--><\/p>\n<p>&nbsp;<\/p>\n<p style=\"font-size: 20px;\">Video Conferencing Security Measures Comparison<\/p>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr style=\"border: 2px solid black;\">\n<td style=\"border: 2px solid black;\"><\/td>\n<td style=\"border: 2px solid black;\"><b><a href=\"https:\/\/trueconf.com\/products\/tcsf\/trueconf-server-free.html\" target=\"_blank\" rel=\"noopener noreferrer\">TrueConf Server<\/a><\/b><\/td>\n<td style=\"border: 2px solid black;\"><b>Other cloud-based VC solutions<\/b><\/td>\n<\/tr>\n<tr style=\"border: 2px solid black;\">\n<td style=\"border: 2px solid black;\"><b>Media streams protection<\/b><\/td>\n<td style=\"border: 2px solid black;\">In addition to the fact that all media streams are encrypted using AES-256 and delivered over secured TLS connections, the video conferencing server is hosted within your company\u2019s premises. Third-party access to the server is restricted.<\/td>\n<td style=\"border: 2px solid black;\">During multipoint conferences, video and audio data are processed unencrypted on the servers of cloud providers and can be accessed by service employees.<\/td>\n<\/tr>\n<tr style=\"border: 2px solid black;\">\n<td style=\"border: 2px solid black;\"><b>User data protection<\/b><\/td>\n<td style=\"border: 2px solid black;\">User accounts are safely stored within your company\u2019s environment. Only your system administrator has access to users\u2019 personal data.<\/td>\n<td style=\"border: 2px solid black;\">Personal data can be leaked due to cloud service vulnerabilities. Cloud service employees can also have access to the databases.<\/td>\n<\/tr>\n<tr style=\"border: 2px solid black;\">\n<td style=\"border: 2px solid black;\"><b>Meeting ID protection<\/b><\/td>\n<td style=\"border: 2px solid black;\">The server requires users to authenticate with a login and password before joining the meeting by following a link with a meeting ID.<\/td>\n<td style=\"border: 2px solid black;\">Weak meeting IDs are vulnerable to enumeration attacks.<\/p>\n<p>PIN codes are usually delivered along with meeting ID within the same invitations which makes them useless.<\/p>\n<p>Accounts with login and password are usually available for hosts only.<\/td>\n<\/tr>\n<tr style=\"border: 2px solid black;\">\n<td style=\"border: 2px solid black;\"><b>Data center overload<\/b><\/td>\n<td style=\"border: 2px solid black;\">Your server resources are not shared with third-party users and companies.<\/td>\n<td style=\"border: 2px solid black;\">There is no guarantee of service quality.<\/p>\n<p>Degraded performance and low audio\/video quality during peak hours.<\/td>\n<\/tr>\n<tr style=\"border: 2px solid black;\">\n<td style=\"border: 2px solid black;\"><b>Offline operation<\/b><\/td>\n<td style=\"border: 2px solid black;\">No internet connection required for a video conferencing server to operate.<\/td>\n<td style=\"border: 2px solid black;\">Permanent internet connection required for every user even within the corporate network.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>The coronavirus outbreak has pushed businesses and government institutions to move any in-person activities online. With a third of humanity now in lockdown due to the pandemic, video conferencing systems have surged in popularity for personal and professional events. As more and more people prefer to use virtual meetings for their internal and external organizational [&hellip;]<\/p>\n","protected":false},"author":22,"featured_media":14696,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[104],"tags":[],"class_list":["post-14685","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","wpautop"],"_links":{"self":[{"href":"https:\/\/trueconf.com/blog\/wp-json\/wp\/v2\/posts\/14685","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/trueconf.com/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/trueconf.com/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/trueconf.com/blog\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/trueconf.com/blog\/wp-json\/wp\/v2\/comments?post=14685"}],"version-history":[{"count":18,"href":"https:\/\/trueconf.com/blog\/wp-json\/wp\/v2\/posts\/14685\/revisions"}],"predecessor-version":[{"id":15287,"href":"https:\/\/trueconf.com/blog\/wp-json\/wp\/v2\/posts\/14685\/revisions\/15287"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/trueconf.com/blog\/wp-json\/wp\/v2\/media\/14696"}],"wp:attachment":[{"href":"https:\/\/trueconf.com/blog\/wp-json\/wp\/v2\/media?parent=14685"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/trueconf.com/blog\/wp-json\/wp\/v2\/categories?post=14685"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/trueconf.com/blog\/wp-json\/wp\/v2\/tags?post=14685"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}