FUZE

Security

When it comes to meeting security, we bring in the big guns.
Our technology supports the same security standards required by banking and healthcare industries, as well as the Federal government. We're talking some seriously heavy-duty security here.

  • Technology Security

    Our customers trust Fuze to present confidential documents and assets. We earned that trust with technology to keep meeting information and content secure and confidential. The Fuze platform provides:

    • TLS Session Encryption for all web and mobile clients - Fuze uses Transport Layer Security (TLS) to encrypt meeting sessions between participants.
    • AES 256 Cipher - Content transfer, screen sharing, and meeting management are secured using Advanced Encryption Standard (AES) 256—the Federal government's required standard for encryption. Video conferencing sessions are secured using AES 128 encryption.
    • FIPS 140-2 Certified Compliance - Fuze's cryptographic component supports FIPS 140-2, a standard certification that is required by government agencies and regulated industries (such as financial and health-care institutions) that collect, store, transfer, share, and disseminate sensitive information.
    • SAS70 Type II Audited Data Storage - Your information is secure in the Fuze Cloud. Don't take our word for it, our storage service provider successfully completed a Statement on Auditing Standards No. 70 (SAS70) Type II Audit, and has obtained a favorable unbiased opinion from its independent auditors. Please contact us if you'd like more information.
    • Content Security/Protection - All content uploaded by the meeting host is securely stored on our back end. During a meeting, content pushed to the meeting participants is handled so that a local copy can never be obtained.
    • Password Protection - Customer passwords are not stored in our database. Instead we keep the product of a cryptographic hash function that makes extracting your password practically impossible.
    • Signed Code - Fuze components use signed code and a third-party certificate provided by VeriSign.
  • Application Security

    If you've built Fort Knox security but leave the front door open, what's the point? Surprisingly, some of the legacy names in online collaboration have done just that with meetings published on web pages, no explicit attendee accept dialogs, etc. We've taken a different approach. Think of these features as the "armed guard" at the entrance of every Fuze.

    • Unique, random, unpublished meeting URLs - Persistent meeting rooms are an invitation to hackers. So each new Fuze gets a randomly generated URL string to thwart brute force hacking.
    • Host controlled meeting access - Fuze displays Caller ID or the VOIP ID of every meeting participant so participants know who is listening at all times.
    • Visual confirmation of phone participants - Fuze displays Caller ID or the VOIP ID of every meeting participant so participants know who is listening at all times.
    • Secure phone conferencing - If visual confirmation isn't enough, you can use our Call Me feature to explicitly dial participants into the meeting.
    • Audio room lock - After everyone connects, the host can lock the room to prevent unauthorized access.
    • Meeting replay and content links are password secured - Fuze Replays (recordings) are password protected by default.
    • Permission-based participation - Only the online meeting host can control the meeting. Hosts can promote a meeting attendee to presenter, which allows the attendee to lead portions of the meeting until the host revokes those permissions.
  • Service Reliability

    If you've built Fort Knox security but leave the front door open, what's the point? Surprisingly, some of the legacy names in online collaboration have done just that with meetings published on web pages, no explicit attendee accept dialogs, etc. We've taken a different approach. Think of these features as the "armed guard" at the entrance of every Fuze.

    • Automated service quality monitoring
    • 24x7 Engineering and Operations teams - Our offices in the US and Europe are staffed so that there is always a team available to take action where intelligent decision-making is necessary. State-of-the-art software engineering practices are in place to guarantee that performance targets are met.
    • Load balancing, failover, scalability and security are implemented in order to guarantee service performance - Our private cloud infrastructure is capable of growing automatically when necessary, and shrinking when service load goes down.
  • Geo-Redundant Service Infrastructure

    If you've built Fort Knox security but leave the front door open, what's the point? Surprisingly, some of the legacy names in online collaboration have done just that with meetings published on web pages, no explicit attendee accept dialogs, etc. We've taken a different approach. Think of these features as the "armed guard" at the entrance of every Fuze.

    • Private cloud infrastructure - Fuze service is utilizing distributed computing and cloud storage for highly redundant and scalable infrastructure. Our geo-redundant data centers run private cloud infrastructure built on IBM BladeCenter / EMC storage / VMWare virtualization technology. The service expands automatically to accommodate additional load at peak hours.
    • Dedicated communication lines - High definition video conferencing is dependent on a low latency network. Dedicated connections to our data centers can be accommodated in order to avoid public Internet "weather."
    .