4 min read
Limitations of SSO and Implementing SSO (Part 2)
In my last blog, I introduced the...
Convene was designed and developed to enable your organisation to respond to today’s pressing security challenges. Equipped with advanced security features and end-to-end encryption, Convene’s multi-layered approach offers users high levels of data protection, access control, availability, and application security.
Paper documents are not secure. They can be left at printers, photocopied, or simply forgotten elsewhere - compromising the security of your meeting. However, there are security concerns about storing sensitive documents online too.
Convene is trusted by Banks, Governments, and Healthcare organisations around the world, and our security is regularly tested by customers. We encourage regular testing as we know security threats constantly evolve. So we evolve too. Working with you ensures all stay secure.
Here are just a few of Convene's Security Features and Accreditations.
If you want to know more, but data-security jargon isn't your thing, check out our explainer document on understanding key security terms.
SSL (Secure Sockets Layer) is the industry standard for establishing an encrypted link between server & client. Without this, data would be sent in plain text, leaving it vulnerable to hackers.
Before a user can log-in to Convene, a verification code—which is securely and instantly delivered to the user’s registered mobile number—must be entered. The verification code is a unique, secondary password and is valid for one log-in session only.
Convene also supports single sign-on using SAML 2.0. to eliminate the need to repeatedly type in passwords per login.
AES or Advanced Encryption Standard is the cipher used to encrypt our clients' documents when stored on our platform. AES-256 is the standard used by the US government for their sensitive information.
Set different levels of access and editing for an individual or a group. Set individual passwords for specific files and folders. And customise read-only and read-write permissions for every meeting participant or for a whole group.
If a device is lost/stolen, any sensitive information stored in the Convene app can be deleted remotely. Additionally, any data on a lost/stolen device is automatically deleted when password guessing is detected.
Convene allows your system administrator to track log-in attempts, downloads, uploads and what permissions were granted to who and by whom. So if there is any suspicious activity, you can start taking appropriate actions immediately.
Hosting facilities in the US, Ireland, Singapore, and Australia are SSAE16- and ISO 27001-certified. Continuous network monitoring of any attempted network attacks. Our staff closely monitor servers in real-time to ensure optimum system performance.
Data is protected by three-tier key management: with random document key, user key and system key. In Convene, user keys are securely stored in the iOS Keychain and protected by iOS device-specific encryption with automatic key generation, transfer and destruction.
Having got through the 25th May...