Encrypted Video Conferences

Cuando se realizan las videoconferencias corporativas, la privacidad es un factor importante: se debe evitar que los intrusos accedan a los datos incluso si logran invadir la red interna de una empresa.

We take the privacy of our customers’ conferences seriously. TrueConf Server provides five security levels: from basic to cryptographically impregnable, allowing users to enjoy encrypted video conferences and gain full control over their communications.

Descargue TrueConf Server

Versión 4.5.2.10027 (399.66 MB)

Nivel 1: Autorización obligatoria

Unauthorized users cannot access TrueConf Server (except for guests in public conferences) without authorization that always requires a login and password. Administrator creates user credentials manually when configuring TrueConf Server, or automatically via synchronization with Active Directory.

Autorización de cifrado

Nivel 2: Códec patentado de video

To encode video streams and allow you to hold encrypted video conferences, we use our own implementation of VP8 video codec with advanced SVC support. Eventually, even if a video stream is seized (which is also almost impossible – see the following sections), intruders cannot decode video by standard means.

Nivel 3: Cifrado de datos de control

Signalling information that controls how server and endpoints interact is transmitted over a secure channel with symmetric encryption via TLS Protocol (transport layer security protocol, advanced SSL enhancement). We use an open TLS implementation from OpenSSL, which ensures transparency of the algorithm being used.

Nivel 4: Cifrado de datos multimedia

In addition, video and audio streams are encrypted according to AES-256, a symmetric encryption standard. This method works with a long key length (256 bits), which provides a high level of security, and AES (Advanced Encryption Standard) alone is a generally accepted standard. Even with a successful attempt to intercept traffic, intruders cannot reproduce data streams since they do not know a secret key used by the endpoint and the server to encrypt this session.

Level 5: Integration with VPN Gateways

To additionally secure your encrypted video conferences, you can use software or firmware VPN gateways that provide end-to-end encryption of all corporate traffic between segments of your network when running TrueConf Server.