Airtame Airtame 2 Manuel de déploiement - Page 14
Parcourez en ligne ou téléchargez le pdf Manuel de déploiement pour {nom_de_la_catégorie} Airtame Airtame 2. Airtame Airtame 2 16 pages.
Également pour Airtame Airtame 2 : Manuel d'installation (8 pages)
Airtame & Security
Cyber Security
● When you stream using Airtame, the stream itself never leaves your network, meaning
that it will never be on the internet. Additionally, Airtame will not collect or store any
information regarding the content of the stream.
● The Airtame stream is not encrypted within your network but it is encrypted by your
network. This means that no one off of the network can capture your stream, but if
someone is already on the network, they could pose a threat if they take the time to
snoop the network traffic and reverse engineer Airtame's protocol.
● Airtame supports two networks on one device. One is via Ethernet and the other via
WiFi. Usually, the internal network would be connected via Ethernet and Guest - via
WiFi. These two connections come via separate interfaces and therefore they cannot
be bridged.
● Airtame's settings panel can be locked with a password from within the device's
settings.
● When applying settings, HTTP encryption is used between the managing computer
and the Airtame being managed.
Airtame Cloud Security
● Airtame Cloud sends information over the internet. Extra security measures are taken
to ensure no information is ever at risk, in addition to passwords and web URLs never
being sent to the cloud.
● The Airtame Cloud solution is hosted on Amazon Web Services. Airtame uses the AWS
datacenter in Germany. User account information and passwords are stored on the
server and are bcrypt-hashed for maximum security.
● All communication between a user's device, the cloud portal, and Airtame devices are
SSL encrypted (HTTPS). Communication between the airtame device and cloud portal
uses standard WebSocket communication established by the device.
● The information sent is restricted to non-sensitive information such as basic device
settings, which means that no passwords are ever sent over the internet.
● Images are only sent to cloud accounts that have enabled "Homescreen".
● You can disable sharing images of devices homescreen per-device.
● The images are stored in AWS.
● Each Image sent is stored for one minute then deleted permanently.
Physical Security
Airtame 2 is equipped with different physical security features than its predecessor:
●
Airtame 2's Kensington lock slot means being able to secure devices in classrooms or
big meeting rooms that have a lot of traffic.
●
The magnetic wall mount keeps the device hidden behind the TV screen and makes it
harder to physically remove.
The non-removable adhesive allows Aircord and the magnetic wall mount to be
●
permanently attached to the wall, thus making it harder or impossible to use it
elsewhere.
Enterprise Deployment Guide
13