Category

Pick a topic

6 security questions to ask when choosing a video conferencing provider

Share

URL copied
4 min read

With virtually every business shifting to remote work almost overnight, the popularity of video meetings has exploded. Not only have companies had to shift all their face-to-face discussions online, but video meetings have also surged as employees suddenly discovered the need to feel connected in ways that phone calls and text messages simply can’t provide (virtual happy hour, anyone?).

Of course, that kind of rapid popularity often brings with it a spotlight. Given that many online meetings involve confidential information, it’s natural that companies want to ensure that their meetings remain secure from unwanted participants and unwanted activity.

Fortunately, options exist to combat security threats. Many of these options center on two key themes: finding a video meeting solution with the security features necessary to safely moderate meetings, and using best practices for hosting and conducting meetings. Let’s take a closer look at a few important questions to ask yourself to ensure that your company keeps its video conferences secure.

1. How do you prevent unwanted attendees in video meetings?

Given the confidential nature of many business meetings, it’s important to ensure that unwanted guests can’t attend video discussions. Fortunately, there are ways for you to protect your meetings from unwanted visitors:

2. What are your provider’s data encryption standards?

Overall, be sure you’ve carefully examined your provider’s data encryption standards. In particular, look at how their solution encrypts data both in transit and at rest. For data in transit, key protocols include Transit Layer Security (TLS), Session Initiation Protocol (SIP) over TLS, Secure Real-Time Transit Protocol (SRTP), and WebRTC (Real-Time Communications). For data at rest, look for Advanced Encryption Standard (AES) with 256-bit keys.

3. Has your video meeting solution been audited for security?

Third-party audits are an indication of a company’s security maturity, their commitment to verifying their security controls, and their transparency with customers. There are several third-party audits to look for when evaluating video meeting solutions:

4. How is your provider handling its cloud security?

Cloud security refers to how your provider protects its cloud infrastructure, back-end communications platform, service environments, and service operations. Transparency from your provider is a must. Key components of a strong cloud security posture include:

5. How are security measures built into your video meeting solution?

In addition to the security of its cloud infrastructure, providers need to build strong security measures into their applications, as well. Here’s what to look for:

6. What is your provider’s security culture?

More than any of the specific technologies and processes described above, the mark of a secure software provider is best reflected in how embedded security is in the culture of the company. That can be a difficult attribute to measure, but consider these elements:

RingCentral’s vision of security emphasizes the importance of both internal and external perspectives. We undergo frequent and proactive testing, assessments, and third-party security audits throughout the year to give our customers assurance that controls are operating effectively for various environments.

RingCentral Video, our video conferencing solution, is built with security in mind, leveraging open standards such as WebRTC and supporting meeting attendance without the need to install any software. You can learn more about RingCentral Video by checking out our video below. Click here to get a demo today.

Originally published Apr 30, 2020, updated Apr 11, 2023

Up next

Security

Security by WebRTC or security by obscurity?

H.323, SIP, XMPP are the most popular and widely known signaling protocols for VoIP and video conferencing. They all can be encrypted and made private per their specification, but none of them mandate encryption. They don’t mandate encryption for the signaling itself and certainly not for the media. This leaves the encryption decisions the people ...

Share

Related content

Security

Cloud security and mobility: how safe are you in the cloud?

Business leadership, Communication & collaboration, IT leadership, RingCentral products, Security

Latest 7.1 update of RingCentral office delivers security and quality in business ...

Security

Bringing cloud communications into your comfort zone: 7 key security ...