TECHNICAL GUIDE BlueJeans Network Security and Privacy

Technical Guide Bluejeans Network Security And Privacy-PDF Download

  • Date:27 Nov 2020
  • Views:5
  • Downloads:0
  • Pages:5
  • Size:612.67 KB

Share Pdf : Technical Guide Bluejeans Network Security And Privacy

Download and Preview : Technical Guide Bluejeans Network Security And Privacy

Report CopyRight/DMCA Form For : Technical Guide Bluejeans Network Security And Privacy


Cloud Architecture Security 3rd party consultants to perform penetration testing. Global Data Center Security of the service All of their findings are reviewed and. The BlueJeans service was built from the ground appropriate actions are then taken to address and. up by BlueJeans and consists of software that runs mitigate vulnerabilities found in the service. on cloud compute clusters from a leading global, server vendor The service is hosted in multiple Web Application Security. ISO27001 certified top tier co location data centers This section covers the security features that can be. around the world and in each of these PoPs enabled at the user level. dedicated cages and racks are protected with, 24x7x365 security and multiple levels of biometric User Account Security. access controls Access to the cages is restricted to All user accounts are secure using the following. BlueJeans Operations personnel technologies and security measures. Infrastructure and Network Security Each BlueJeans account is secured with a standard. BlueJeans employs a wide range of security username and password or via SSO SAML. management practices to provide a secure and 2 0 assertion from your IDP. reliable service to customers This includes network. firewalls throughout the infrastructure to create Authentication requests are always sent. security zones for different applications and services over HTTPS. BlueJeans also deploys proxy servers that terminate. Passwords are SHA 256 salted hashed in the, all 3rd party customer traffic at a proxy layer All web. database and can never be viewed in plain text, traffic passes through industry leading load balancers. to protect against a suite of application attack vectors Passwords are never sent via email or any other. form of electronic transmission the Forgot, Beyond the firewall proxy servers and load balancers Password feature only allows for resetting the.
BlueJeans also periodically scans for network port and end user s password. application level vulnerabilities Vulnerability scans. are conducted by a leading 3rd party SaaS provider in In Meeting Security Features. addition to some special purpose in house scanning BlueJeans meetings come with optional security. tools Furthermore all of the 3rd party applications capabilities that users may set as default or enable. and operating system software is checked for security when required. advisories and is patched periodically,Meeting ID, Routers firewalls load balancers and proxy application A randomized nine digit number uniquely identifying. servers are all configured to mitigate numerous a meeting. types of DOS attacks BlueJeans also engages with, 2020 BlueJeans Network All rights reserved 800 403 9256 bluejeans com 2. Participant Passcode Change Password Options, A second level of authentication that can optionally be. Failed Login Notifications,enabled for each meeting. Enable Video Connection Type set supported and, Publish Meeting Option default endpoints for your Group.
An option that allows a meeting to remain hidden on. BlueJeans also offers the option to obscure personally. the end user s personal meeting room Participants, identifying information such as participant names and. must either join these meetings directly from an, IP addresses in the Command Center console so that. email invitation or by entering the Meeting ID and or. IT personnel can monitor and support meetings while. password via the bluejeans com homepage,respecting the privacy of paricipants. Encrypt Meeting Option,Remote Moderation and Live Meeting Control. An option that forces a BlueJeans meeting to only,Group Administrators can offer moderation and.
allow end points with sufficient encryption capabilities. technical support in either of two ways,enabled Please see Media Handling Encryption for. additional details on encryption In Meeting Moderator Join any live meeting. Remote Moderator Manage the meeting from the, Expel Participant Live Meeting Control console in Command Center. During the course of a meeting any participant can Controls include mute unmute participants lock. quickly be removed from the meeting with a click of the meeting and push layouts. Remote Moderation is an ideal option to protect, the confidentiality of sensitive conversations and. Lock Meeting, documents Live Meeting Control is enabled first for an. During the course of a meeting the session may be, enterprise and then on a per admin user basis giving.
locked down to only include those participants that. complete control over access to this powerful feature. are in attendance,Admin Level Security,Group Administrator Security Features. As a Group Administrator BlueJeans allows security. policies to be created for all users in your organization. These include,User Authentication Options standard User. Password configuration or SAML Single Sign On,User Password Requirements. 2020 BlueJeans Network All rights reserved 800 403 9256 bluejeans com 3. Privacy and Customer Data Storage Media Handling and Encryption. Only the most basic user data is stored in the BlueJeans takes the utmost care with your. BlueJeans database BlueJeans stores the following communications and does not record or capture any. user information video or desktop sharing streams without interaction. and consent from customers It is recommended that,User Profile Details. an organization employ the proper steps to ensure,Username Facebook login includes Facebook.
that software based video clients are secured on the. username Linkedin login includes Linkedin,desktop and that no malware may intercept media. profile URL, at the hardware level BlueJeans supports standards. Password SHA 256 salted hash based encryption AES 128 that is available on most. video endpoints today,Email Address, First Name BlueJeans connections using BlueJeans client. applications or web browsers for video are encrypted. Middle Name by default in BlueJeans meetings as are many other. Last Name solutions such as Cisco Jabber or Microsoft Lync. Title If using room based video endpoints such as Polycom. Company Name Lifesize Cisco etc to connect to BlueJeans calls they. will encrypt upon connection to BlueJeans provided. Profile Picture that they have this feature enabled and the proper. security licenses from those vendors,Billing Details. The BlueJeans Service currently leverages a third party. Most video room systems encrypt by default as long. PCI compliant partner to handle all billing aspects of. as both sides of the call support it However it is. the service This means no user credit card or billing. recommended that you check your system to require, information resides in the BlueJeans database Because.
encryption for all calls or to encrypt by default As. the service is used by thousands of companies globally. mentioned in the In Meeting Security Features, BlueJeans is also compliant with the EU U S Privacy. section above you can select Enforce Encryption,Shield Framework. when scheduling a BlueJeans meeting to ensure only. More information about this as well as the privacy encryption capable devices can join the meeting This. policy can be found here http bluejeans com will help ensure that your room systems connection to. privacy policy BlueJeans using either H 323 or SIP will be a standards. based encrypted connection, 2020 BlueJeans Network All rights reserved 800 403 9256 bluejeans com 4. Recording and Video Content Storage BlueJeans has completed the Statement on. and Encryption Standards for Attestation Engagements SSAE16. The BlueJeans service also includes the unique Service Organization Controls SOC 2 Type 2 Report. capability of uploading and sharing full motion video Completion of this is a very important step for not. content in your meetings as well as the ability to only BlueJeans Network as a company but also for our. record and share your meetings The security of both customer This attests to our commitment as a service. of these features is important to our customers and to provider to our users that we have implemented. us Here it s a little bit more about the security of each formal documented procedures and controls across. our organizations,Recordings are stored in secure containers in the. cloud These videos are encrypted at rest AES 256bit Policy Communications Procedural and Monitoring. and are only accessible to the recording originator control activities as well as Disaster Recovery and. They may be shared by the recording originator using EU U S Privacy Shield Framework are covered under. email addresses through the web user interface These this report. can be viewed as an encrypted AES 128bit playback, stream using a web browser or downloaded to an on Compliance with the General Data Protection.
premise media server or storage device Users may Regulation GDPR. choose to delete their recordings from BlueJeans at The GDPR unifies data privacy requirements across the. any time again using the web user interface European Union EU and establishes data privacy as. a fundamental right for EU citizens Data security and. Uploaded shared video content is also stored in secure user privacy have always been priorities for BlueJeans. containers The video content sharing stream is also To better support GDPR compliant use of BlueJeans. encrypted AES 128bit when shared in a meeting by our customers we have modified the software. Users may also choose to delete their uploaded video systems and processes to enable enterprise customers. content from our service as well to proactively address requests by EU Nationals. regarding personal data and systemized our response. Service Organization Controls SOC 2 to user requests to correct export or delete personal. data We continue to review our systems and processes. In addition to the security measures taken around,to prioritize privacy by design and by default. our service infrastructure as well as the in meeting. security features of the product BlueJeans has taken. important steps to ensure the integrity of our internal. operation is also addressed, If you have further questions or concerns about the security of the BlueJeans Network service. please feel free to contact us at sales bluejeans com and we will be happy to assist. 2020 BlueJeans Network All rights reserved 800 403 9256 bluejeans com 5. If you have further questions or concerns about the security of the BlueJeans Network service please feel free to contact us at sales bluejeans com and we will be happy to assist Created Date

Related Books