• Home
  • / Blog
  • / Wireless Privacy, Encryption, and Safety in a BYOD World

Wireless Privacy, Encryption, and Safety in a BYOD World

Crestron · Craig Heiman · Jan 19, 16

Wireless Privacy, Encryption, and Safety in a BYOD World

wireless encryption

As wireless collaboration tools become the norm in conference and meeting rooms, ensuring privacy and security between guest and corporate owned devices and installed AV systems has become a topic of concern. Leading manufactures such as Creston and Kramer have made it a priority to create dependable technology to address this issue.

Crestron - AirMedia

Most weakness are due to the vulnerabilities in web browsers and servers, which Crestron equipment generally limits, when needed, they use industry standard SSL encryption as well as built-in web browsers. Also, their systems are specially put together to limit man-in-the-middle attacks, which is where an attacker relays messages between the victims while they believe to be talking directly over a private connection.

Crestron also disables unused ports making the system invisible to network scans while allowing common ports to be moved and hidden, preventing unauthorized connections.

Control systems can only be accessed with the specific IP address, user name and password as well as specific port number. Crestron’s consistency in updating their firmware, software and apps in order to stay ahead of possible susceptibilities further emphasizes their commitment to security.

Kramer – VIA Connect PRO

Kramer has also implemented rigorous security measures to ensure privacy. The VIA Connect PRO features a strict user authentication process where a moderator can grant participant permissions as needed.

So what about encryption? Encryption has been used since the time of the ancient Egyptians, Mayans, and Greeks who would encode messages into what seems like a meaningless format to avoid unauthorized access to information… and it’s basically the same principle we use with data today.

The strength of encryption is also an important factor, and it’s why Kramer equips its solution with 1024-bit encryption of all content and dynamic room codes used to block unauthorized access to meetings.

The ability to host various gadgets in a BYOD setting to upload to the cloud, or transfer files to others, all while establishing a reliable connection between control systems is a must have, and when AV Planners sets up a conference room, we seek solutions that are safe, secure and reliable using dependable technology

To learn more about keeping your system up to date with the latest in privacy encryption, contact us at info@avplanners.com, call us at 800-409-3587, tweet us @AVPlanners.

Read our other posts

Partner Product Highlight: A Closer Look at QSC's TSC Series Generation 3 Control Panel
11 April 2024

Partner Product Highlight: A Closer Look at QSC's TSC Series Generation 3 Control Panel

Case Study: Enhancing The Resident Experience at AMLI Old Pasadena with Advanced AV Solutions
4 April 2024

Case Study: Enhancing The Resident Experience at AMLI Old Pasadena with Advanced AV Solutions

Overview AMLI Old Pasadena, a high-end apartment complex in the heart of Pasadena, CA, wanted to elevate the...

From Fireside Chats to X: The Evolution of Presidential Communication
16 February 2024

From Fireside Chats to X: The Evolution of Presidential Communication

Highlights from ISE 2024: Top Tech Trends and Innovations
13 February 2024

Highlights from ISE 2024: Top Tech Trends and Innovations

Highlights from ISE 2024: Top Tech Trends and Innovations The Integrated Systems Europe (ISE) tradeshow is...

Get closer to your goal now

Schedule a consultation for cost and timeframe details.