dn-logo.png
Book a Demo

Blog

Filter by Category
Filter by Category

Data Security: The Most Important Factor When It Comes To Wireless Presentation

Untitled design (6).png

One of the things we get asked often is “how secure is my data?” and “how secure is your solution when I’m wirelessly sharing content from my device to a screen?”

We know that security is front and centre when it comes down to deciding which wireless presentation system is to be used across an organisation’s meeting spaces.

When it comes to wireless presentation and sharing content, we take security very seriously too.

security.png

To help you understand our approach, we’ll break it down into three elements: software, hosting, and hardware.

Montage Software

All inbound and outbound data from the software is encrypted and transmitted over TLS or DTLS with 2048-bit asymmetric encryption and 256-bit symmetric encryption using certificates from third party credited authorities. Network communication is protected using the latest in technology to secure all your video, audio and data. Using the TLS and DTLS cryptography protocols, previously referred to as SSL, we provide protection using a 2048-bit asymmetric key in conjunction with a 256-bit symmetric session key.

The Montage software consumes a REST API provided by our SaaS layer which is credential secured. All communication with the REST API and our XMPP services are over TLS (port 443) with 2048-bit asymmetric encryption and 256-bit symmetric encryption. For video calls STUN is used to establish a peer to peer connection. If this fails then the client will attempt to use our relay service using the TURN protocol.

In addition to DTLS encryption, we also encrypt data through Secure Real-Time Protocol, which safeguards IP communications from hackers, so that your video and audio data is kept private point to point.

For each meeting, a unique meeting ID is generated from our SaaS layer which is used as a means for the clients to connect to that specific meeting. The host can also specify a PIN, adding that double layer of security for clients joining a meeting.

Hosting

We use Azure to host and support the services we offer to our clients. Azure’s Datacentres are geographically dispersed and comply to ISO/IEC 27001:2005, SOC 1 and SOC 2 .

Hardware

In addition to the security provided with the software, the Montage box can be configured to allow devices to connect via its own access point.  The access point is secured with WPA2 with TKIP encryption, allowing clients to connect directly to the box and therefore creating a local network. If Montage has access to the Montage Cloud, then it will be able to allow devices connecting to it from outside of its local network. This can be restricted by deactivating access to the cloud in the settings of the Montage box.

Final Thoughts.

We have a variety of enterprise companies, who chose Montage for their wireless presentation needs because it was the most secure solution out there, from a major telecommunications company, to a global automotive company.

To talk more about how Montage meets your organisation’s security and compliance requirements, contact us today.

Alternatively, you can download our security and network whitepaper.

Next Steps

Arrange a demo today of Montage, our wireless presentation solution (available as hardware or software), and experience the next generation of meetings now.

Book demo now

To discover how our Montage solution facilitates effective collaborative working, join one of our biweekly webinars.

What Can Montage Bring To Your Organisation?
Guest collaboration with a wireless presentation solution

About Author

Rebecca Reid - Marketing Executive
Rebecca Reid - Marketing Executive

Related Posts
Guest collaboration with a wireless presentation solution
Guest collaboration with a wireless presentation solution
What Can Montage Bring To Your Organisation?
What Can Montage Bring To Your Organisation?
What You Should Know About Wireless Presentation Dongles.
What You Should Know About Wireless Presentation Dongles.

Comment

Subscribe To Blog

Subscribe to Email Updates