Web Conferencing Security Analyzing the Case Study

Total Length: 797 words ( 3 double-spaced pages)

Total Sources: 3

Page 1 of 3

The U.S. Department of Defense was instrumental in the definition of this technology and also has led in tis adoption globally (Xirasagar, Mojtahed, 2010).

Figure 1:

Comparing Tunneling Configurations in IPSec vs. SSL VPN Configurations

Source: (Opus Consulting, 2007)

Figure 1 illustrates how both VPN and IPSec work in secured Web conferencing configurations. Both of these approaches can drastically reduce the level of risk associated with video conferencing today. Increasingly these technologies are included in the baseline VPN configurations of enterprises who do much of their work and collaboration across the Internet.

The configuring of the TCP/IP command set across these secured connections can also increase the level of video streamlining and combined content distribution as well. Studies indicate that the greater the level of bandwidth planning and optimization on the part of companies the greater the level of ongoing stability and performance of these enterprise-wide applications (Xirasagar, Mojtahed, 2010).

Stuck Writing Your "Web Conferencing Security Analyzing The" Case Study?

It is possible for example to enable exceptionally high levels of video bandwidth so simultaneous, secured video sessions could be going on literally at the same time anywhere in the word, with capable levels of performance and stability (Xirasagar, Mojtahed, 2010).

Conclusion

Enterprises can get the same level of security as highly secured government sites including the Office of the President. The ability to lock down a Web conferencing application to the VPN and IPSec level is crucial for protecting intellectual property and ensuring a high level of responsiveness to an enterprises' global needs (Xirasagar, Mojtahed, 2010). There is a greater level of security and stability in this platform than ever before. The bottom line is that Web conferencing is more secured that it has ever been, ensuring a high level of cost savings for enterprises who choose to use these technologies......

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Web Conferencing Security Analyzing The" (2012, March 12) Retrieved June 5, 2025, from
https://www.aceyourpaper.com/essays/web-conferencing-security-analyzing-54981

Latest MLA Format (8th edition)

Copy Reference
"Web Conferencing Security Analyzing The" 12 March 2012. Web.5 June. 2025. <
https://www.aceyourpaper.com/essays/web-conferencing-security-analyzing-54981>

Latest Chicago Format (16th edition)

Copy Reference
"Web Conferencing Security Analyzing The", 12 March 2012, Accessed.5 June. 2025,
https://www.aceyourpaper.com/essays/web-conferencing-security-analyzing-54981