Lifesize CTO Talks Encryption, Authentication and Security Misconceptions

UC Today spoke with BobbyΒ Beckmann, CTO at Lifesize

2
Sponsored Post
Lifesize CTO Talks Encryption, Authentication and Security Misconceptions
Unified Communications & Collaboration

Published: September 11, 2020

George Malim

Security’s always a consideration when it comes to videoΒ conferencing,Β but users don’t like to consider it for any longer than they absolutely need to. This has given rise to common misconceptions around securing unified communications and the role of encryption in enabling security. Too often, people think that encryptionΒ equates toΒ the communicationΒ being entirelyΒ secure and over-rely on elastic terminology such as end-to-end encryption to assure themselves they are secure.Β 

β€œEnd-to-end encryption is the most obvious misconception,” confirmed BobbyΒ Beckmann, Chief Technology Officer at Lifesize. β€œIt makes people think there’s no way for bad actorsΒ to see what’s going on in the middle,Β but in order to secure a video call,Β something in the middle has to be encrypted too, not just at each end.”  

BobbyΒ Beckmann
BobbyΒ Beckmann

As always,Β being secure is a function ofΒ howΒ much risk you face and what resources you’re able to devote to security. β€œIt’s a threat model you have to figure outΒ for yourself,” addedΒ Beckmann. β€œIf you’re a book club,Β you probably don’t need security,Β but if you’re having a board meeting,Β you probablyΒ do. You’reΒ likelyΒ fine 99% of the time but it’s thatΒ 1% that matters.” 

The idea that encryption is simply a black box that you buy and then have in place impedes user understanding of the strength and performance of encryption. β€œEveryone thinks encryption is easy and they’re right – it’s superΒ easy to encrypt something,” BeckmannΒ said. β€œWhat’s hard is verifyingΒ whoΒ encryptedΒ it. We’ve tried to simplify this by showing a visual indicator so thatΒ a userΒ can confirm thatΒ the communicationΒ wasn’t intercepted.Β By matching aΒ visualΒ password embedded into the video stream with one thatΒ the userΒ knows,Β they’re able to confirm that the session is encrypted without having to trust us, the video conferencing provider.” 

There’s littleΒ for organisations to choose fromΒ in the market inΒ betweenΒ theΒ insecure, free services and corporate IT-level encryption from a specialist vendor that is based on zero trust,Β but Lifesize thinks there should be other means to be assured of encryption.Β Β 

β€œOur goal is to be the safeΒ video conferencingΒ and unified communicationsΒ provider,” saidΒ Beckmann. β€œThe issue really is about the authentication of encryption and the level of encryption provided. It’s a question of what security is used – did I lick the envelope or padlock the box? Also, we need to take into account who touched it in the middle of transport.”

β€œThere is no Band-Aid of encryption. If you don’t have controlsΒ in place across the board,Β noneΒ of the individual points matter” 

Now, as the pandemic causes more people to work from home,Β the security models of large companies are being eroded. β€œThere are machines out there that are connected to corporate networks and they should not be,” addedΒ Beckmann. β€œYour kid’s laptop is probably not the most secure device to use…There’s a level of loss of control that is happening outside the company that needs to be considered, and solutions like ours provide a means to easily authenticate that encryption is in place and help secure your communications.”

Β 

Security and ComplianceVideo Conferencing
Featured

Share This Post