Security Concerns with Video Conferencing

By Sheila Shanker
Updated: April 08, 2011

Many firms have been taking advantage of technology to conduct videoconferencing using Internet protocols (IP) these days. They can communicate in real-time with offices and clients in remote locations, saving a lot in travel expenses. However, there are certain security risks associated with videoconferencing that must be addressed.

In order to work properly, a video conferencing program must interact with other systems within your network, which can introduce security risks. Using encryption between the video setup and the rest of your network helps in minimizing any possible problem. Any browser interfaces should use SSL security.

Password-protect your meetings and give access to only those with appropriate login information. You could set up a list of participants to the meeting, and only those individuals have access to join in. The same level of care should be taken as to who can record meetings.

Using a hosted video conferencing, which uses a third party for communications, is riskier than on-premise system. Why? Because it exposes the firm to individuals who are not part of the business. This means that you must inquire about security with your hosting firm to assure that your privacy is protected.

Security threats involve the possibility of someone hacking the video conference with “denial of service” attacks, viruses, and other issues involving buffer overflow and other matters. You could consider a “session border controller” instead of your regular firewall because the controller is designed for media flows and can be used as a filter and manager between the enterprise network and the outside world.

Below is a summary of threat types and ways to control them:

  • Threats against the end-points and serves can be controlled with a public key infrastructure, also known as a PKI.
  • Threats against the control channel can be managed with the SIP/TLS encryption of signaling.
  • Threats regarding spying or modification are handled by SRTP media encryption.
  • Threats involving the SIP trunking, which is used to connect the Internet to the internal PBX, can be handled by requiring mutual authentication of all the devices in the trunk. It’s suggested to end the SIP trunks on a SIP proxy, such as a Sub-band coding (SBC).

Video conferencing is a great tool to conduct meetings, while saving a ton in travel costs. However, concerns about security with video conferences are legitimate and should be taken seriously. As technology progresses, so do security risks. Encryption and password-protection should be your first line of defense to be employed whenever possible. Be careful, but don't let your security concerns prevent you from taking part of this exciting Internet functionality.

Featured Research
  • Video Conferencing Software Cost Guide

    In today’s global business environment, there are numerous advantages to video conferencing. With a robust video conferencing system in place, businesses can save money on travel costs for an increasingly mobile workforce. Consultation with clients and business partners becomes easier. more

  • The Hidden Costs of Immersive Telepresence

    Immersive telepresence is the ultimate in teleconferencing technology, allowing conference participants to talk to one another as though they were sitting in the same room together. Using large screens, high definition video, and high-speed broadband communications, immersive telepresence provides an outstanding conferencing experience. more

  • The Ultimate Guide to Cloud Video Conferencing

    How we communicate around the office and with our clients and customers is changing. Where there was once costly travel, conference calls emerged to speed up the conversation and help expedite decision making. more

  • Eight Challenges Solved by Cloud Video Conferencing

    This guide is all about outlining the different ways that cloud video conferencing can solve your business problems without creating any headaches or breaking the bank. So go ahead—browse around and learn more about video conferencing in the cloud. more

  • The Ultimate Video Conferencing Buyer's Guide

    Take full advantage of the benefits of a remote workforce by investing in video conferencing software. Get insight into the various types of video conferencing implementations, features, and purchase considerations so that you can make the best decision for your business. more