Web Conferencing Security Analyzing the Case Study

Total Length: 797 words ( 3 double-spaced pages)

Total Sources: 3

Page 1 of 3

The U.S. Department of Defense was instrumental in the definition of this technology and also has led in tis adoption globally (Xirasagar, Mojtahed, 2010).

Figure 1:

Comparing Tunneling Configurations in IPSec vs. SSL VPN Configurations

Source: (Opus Consulting, 2007)

Figure 1 illustrates how both VPN and IPSec work in secured Web conferencing configurations. Both of these approaches can drastically reduce the level of risk associated with video conferencing today. Increasingly these technologies are included in the baseline VPN configurations of enterprises who do much of their work and collaboration across the Internet.

The configuring of the TCP/IP command set across these secured connections can also increase the level of video streamlining and combined content distribution as well. Studies indicate that the greater the level of bandwidth planning and optimization on the part of companies the greater the level of ongoing stability and performance of these enterprise-wide applications (Xirasagar, Mojtahed, 2010). It is possible for example to enable exceptionally high levels of video bandwidth so simultaneous, secured video sessions could be going on literally at the same time anywhere in the word, with capable levels of performance and stability (Xirasagar, Mojtahed, 2010). Conclusion

Enterprises can get the same level of security as highly secured government sites including the Office of the President.
The ability to lock down a Web conferencing application to the VPN and IPSec level is crucial for protecting intellectual property and ensuring a high level of responsiveness to an enterprises' global needs (Xirasagar, Mojtahed, 2010). There is a greater level of security and stability in this platform than ever before. The bottom line is that Web conferencing is more secured that it has ever been, ensuring a high level of cost savings for enterprises who choose to use these technologies.

References

Baez, David. (2011) "How Web Conferencing Security Works" 03 October 2007. HowStuffWorks.com. http://communication.howstuffworks.com/how-web-conferencing-security-works.htm

Baker, P., Hanson, J., & Myhill, W.. (2009). The promise of municipal WiFi and failed policies of inclusion: The disability divide. Information Polity, 14(1/2), 47.

Olga Kharif. (2007, August). Why Wi-Fi Networks Are Floundering. Business Week (Online),1.

Opus One (2007). Selected content on SSL configurations obtained through analysis of the content at this consultancy's site. Accessed from the Internet on March 12, 2012 from location: http://www.opus1.com/o/index.html

Suduc, a., Bizoi, M., & Filip, F.. (2009). Exploring Multimedia Web Conferencing. Informatica Economica, 13(3), 5-17.….....

Have Any Questions? Our Expert Writers Can Answer!

Need Help Writing Your Essay?