Meetby - Highly Secure for Video Conference and Meetings
Meetby continues to be the favourite meeting tool for the distributed workforce. Easy setup and central administration improve the business communications, though enterprise-level security features are the prime reason that companies are switching to Meetby from other vendors.
Security first, feature next.
The increase in adoption of meeting solutions have expanded during the pandemic, though many of the providers weren’t ready to scale for the unexpected increase in usage. This left their applications with serious security vulnerabilities that could compromise the business operations, data privacy and safety. As a result, enterprises, government agencies and companies started to focus more on security of the applications than features and compatibility.
Meetby’s Assurance
Meetby offers robust systemic level security on its platform and network. The customer data is encrypted at various levels according to the best standards in the industry. With the team’s extensive experience in building communication systems, Meetby’s architecture is capable of handling all possible threats and challenges on the internet. There are automated systems in place to detect fraudulent use and unauthorized access. Overall Meetby ensures a secure online meeting experience along with amazing features.
Admin, host and attendee level security controls
Meetby provides top-level security at all layers including application, platform and network. All data channels are fully encrypted . A central team continuously monitors application and infrastructure behaviors for potential security threats. Even then, the user level security practises are crucial for overall security and privacy. The following features should be configured according to your company policy to get maximum protection.
Meeting password
Meeting passwords prevent unauthorized access at user level. This ensures that only people with a password can attend the meeting. A meeting host can set the password while creating the meeting. For high-level security, send meeting links and passwords in separate communications preferably by different channels.
Lock A Room
When ‘Lock A Room’ is enabled, no one else can join the meeting even with the invitation. The host could enable this feature once the invitees have joined. There is always a risk to track the late joinees once the meeting is started. This feature helps you to prevent all unauthorized logins throughout the meeting.
Join Before Host
‘Join before the host’ allows attendees to join the meeting before the host joins or when the host is absent. Just like any face-to-face meeting, attendees can interact with each other before the actual meeting starts.This feature shall be enabled only when the attendees are known to each other, such as the sales team, school class or executive committee.
Restricted Screen Share
A meeting host shall enable the attendees who can share the screen. This prevents unauthorized sharing of content, especially when the attendees are outside your team. The delegated presenters shall ensure that the content shared on such meetings comply with the company’s data privacy policies.
Encrypted Meeting URL
The URLs of Meetby are encrypted. Thus the intruders cannot intercept the information from the invite link. Meetby users shall ensure that such information is secure in your system and not available for public access. It’s advised not to forward the meeting invites through non-standard email providers and messaging services.
Encrypted Meeting Recordings
Meetby offers two options to store the meeting recordings - local and cloud. The host could download the recording to their local device based on the use case. The cloud storage of Meetby allows you to store the recordings online and access the files on-demand. All media on Meetby’s cloud server is encrypted to provide maximum security.
User Authorization
The role based access is restricted through login credentials. In a company, the admin can centrally manage the users through Meetby’s admin portal. This prevents any unauthorized access to your meeting system and recordings. IT administrators shall comply with the company's security policies while assigning these credentials.
How do I get started?
Login to Meetby.com and start your meetings right away. The base plan is FREE with advanced features including ‘unlimited meetings’, ‘meeting recording’ and ‘audio bridge’.
On our base plan? Upgrade to business plan to avail more features. Contact us to avail the best offers.