![]() How to set up Zoom before starting a meeting.The privacy and security section of their website provides advice on: However, there is room for improvement in terms of security. Possibly the most widely used video conferencing solution in the professional and personal sphere, it became very popular during the lockdown, it is easy to use, low cost in use and even free of charge. In this guide published by Microsoft in October 2020 you can see in more detail all the aspects related to how Teams controls common security threats. This makes it robust, stable, but above all reliable, which is what companies and professionals need when using such a solution. It certainly meets all the requirements you need for a “corporate” video conferencing solution, not only because it comes from a trusted manufacturer, but because all the security and functionality comes configured in Microsoft 365 and Office365. With these recommendations in mind, let’s look at how each of the 3 recommendations we have selected fits in. Document sharing must ensure the confidentiality of data and repositories, as determined by the National Security Scheme.In UDP traffic ensure AES-128 encryption and ensure that the initial key exchange is over a secure TLS channel.SRTP traffic recommended for audio, video and media with AES-128 encryption.Use TLS 1.2 secure channels in encrypted calls for signalling and AES-128 or 256 for media traffic.The video sessions must comply with at least the following requirements regarding communication security:.They should offer the possibility to access the session with or without video/audio. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |