Citrix Web Conferencing Security
Total Page:16
File Type:pdf, Size:1020Kb
White Paper Citrix Web Conferencing Security Citrix provides true end-to-end data security measures that address both passive and active attacks against confidentiality, integrity and availability when using GoToMeeting, GoToWebinar and GoToTraining. gotomeeting.com White Paper Web Conferencing Security Citrix GoToMeeting, GoToWebinar and GoToTraining tools are the most secure web conferencing products available. For each solution, standards-based cryptography with true end-to-end encryption, a high-availability hosted service infrastructure and an intuitive user interface combine to maximize confidentiality, integrity and availability. This document provides a technical and phone conferencing for ease of use and description of the security features built into solution completeness. GoToMeeting, GoToWebinar and GoToTraining. It has been written for technical evaluators and Business needs for secure collaboration security specialists who are responsible for Easy-to-use online business collaboration ensuring the safety of their company’s tools like GoToMeeting, GoToWebinar and network and the privacy and integrity of GoToTraining can help companies increase business communications. productivity by enabling them to communicate and interact more effectively with co-workers, GoToMeeting, GoToWebinar and GoToTraining business partners and customers. But such are web conferencing tools that allow multiple tools vary greatly when it comes to embedded PC and Mac users to interact using screen security features. Moreover, it is essential to sharing, remote keyboard/mouse control, text understand the security implications of chat and other features. GoToMeeting is online collaboration and comply with safe ideal for sales demos and collaborative usage guidelines. online meetings. Built for larger audiences, GoToWebinar is great for marketing Using any web conferencing solution requires presentations and company events. And careful consideration of potential threats and GoToTraining provides features specifically resulting business risks. Business security needs for web-based training, such as online that must typically be addressed when adopting access to tests and materials and a hosted a web conferencing product include: course catalog. • Preventing unauthorized use of the service These products are hosted services, delivered and its features so that only legitimate users via web browsers, downloadable client and invited participants can schedule and par- executables and a network of multicast ticipate in online sessions communication servers operated by Citrix. • Avoiding any compromise of company assets, Sessions are scheduled, convened and including client computers and the private moderated using the Citrix website and client networks to which they are attached software. GoToMeeting, GoToWebinar and GoToTraining automatically integrate with VoIP gotomeeting.com 2 White Paper Web Conferencing Security • Protecting the privacy and integrity of • Internal administrators are Citrix staff confidential communication, including members authorized to manage screen sharing, text messages, email and GoToMeeting, GoToWebinar and GoToTraining voice interaction services and accounts. • Ensuring availability and reliability of the ser- • External administrators are individuals from a vice itself, so that business communications customer site authorized to manage multi- cannot be denied or disrupted user accounts. External administrators can • Integrating seamlessly with other network/ configure account features, authorize orga- computer security measures, so that web con- nizers and access a variety of reporting tools. ferencing services can leverage (not degrade) an organization’s existing safeguards The GoToMeeting, GoToWebinar and GoToTraining user interfaces provide intuitive Our web conferencing tools were developed session controls and status indicators that from the ground up to satisfy these common facilitate productive and safe online sessions. business security needs. By incorporating security features and making them easy to Controls and privileges available to each user administer and use, GoToMeeting, depend on the currently assigned role: GoToWebinar and GoToTraining enable organizer, active presenter or general attendee. effective and safe online business collaboration. Organizer privileges Role-based security features Organizers (or trainers) have the most control in To enable account owners to enforce company a session and the ability to grant and revoke access policies related to service and feature various privileges for the other participants. use, every GoToMeeting, GoToWebinar and GoToTraining user is assigned one of several Specific organizer privileges include: application-defined roles. • The ability to invite attendees, before or dur- • Organizers (or trainers) are authorized to ing the session, so that only authorized schedule meetings, webinars and/or training participants can join a given session sessions. An organizer sets up each session, • The ability to see the complete list of attend- invites other users to participate, initiates and ees and their current roles and privileges, so ends the session and designates the current the organizer remains aware of those present presenter. at all times • Attendees are authorized to participate in ses- • The ability to start and end the session, which sions. Attendees can view the trainer’s or prevents others from disrupting the session presenter’s screen, chat with other attendees accidentally or otherwise or view the attendee list. • The ability to make any attendee the active • Presenters are attendees who are able to presenter, controlling which desktop can share their computer screens with other be viewed at any point in time throughout attendees. Presenters also decide which the session other attendees, if any, are permitted to con- • The ability to disallow the use of chat by one trol the keyboard and mouse of the or more attendees, and permitting sidebar presenters’ computers. discussions only when appropriate gotomeeting.com 3 White Paper Web Conferencing Security • The ability to disconnect attendees • The ability to view the presenter’s screen • The ability to transfer the organizer role to unless the presenter has paused or disabled another attendee (a privilege that cannot be screen sharing revoked) so the session can continue if the • If granted, the ability to remotely control the organizer must leave early presenter’s keyboard and mouse (a privilege that is automatically revoked whenever the Presenter privileges active presenter role is changed) A presenter is the user actively sharing his or her • The ability to use chat to send text messages desktop screen with other attendees. Only one to all other attendees or to one specific attendee at a time within a session may be attendee (features that can be disabled by an granted the active presenter role. Presenters organizer) have the following controls available to them: • The ability to leave a session at any time • The ability to enable, disable or pause screen Basing access rights and privileges on assigned sharing, which can be helpful to avoid display- roles allows flexible sessions that facilitate ing confidential data that might otherwise highly dynamic interaction between attendees, appear on the presenter’s desktop (e.g., while without sacrificing either control or visibility. searching files or folders) Organizers can easily add attendees or • The ability to grant/revoke remote keyboard change the presenter as needed throughout and mouse control to another attendee, the session. Presenters remain in complete which facilitates efficient communication control of their own desktops, and organizers through desktop interaction have everything required to manage the • The ability to make another attendee the pre- session effectively. senter, providing for a flexible, dynamic flow during sessions Account and session authentication features Whenever a presenter is sharing his or her Role-based authorization depends upon the screen with other attendees, an “On Air” ability to correctly identify and authenticate indicator is displayed on the presenter’s each and every user. To ensure that each control panel. To share his or her screen, the organizer, presenter and attendee is in fact who presenter must click the Screen button on the he or she claims to be, GoToMeeting, control panel. These features ensure that GoToWebinar and GoToTraining incorporate presenters always know when desktop sharing robust account and session authentication is active so that desktop screens are never features. shared accidentally. Website account login Attendee privileges To access a user account on the GoToMeeting, Users with the basic attendee role have the GoToWebinar and GoToTraining website, users following privileges: must supply a valid email address and corresponding user account password. To make • The ability to join any session to which they them hard to guess, all passwords must contain have been invited at or after the session’s at least eight characters and include both start time letters and numbers. Too many failed log-in gotomeeting.com 4 White Paper Web Conferencing Security attempts cause the website account to be presented by the downloaded GoToMeeting, temporarily locked to protect against password GoToWebinar or GoToTraining client. guessing. Passwords stored in the service database are encrypted and checked using a Whenever a valid session ID is presented, the cryptographically secured verifier that is