Security Description © FastViewer GmbH Seite 1 TABLE OF CONTENTS General Procedure 1 Overview of Connection Setup 3 General Security Features 4 Security Features (Modules) 5 Certificates Used (Codes) 8 Certificates Used (SSL) 9 External Certificates 10 Data Protection 11 © FastViewer GmbH 0 Seite 2 GENERAL PROCEDURE Encryption method and data security The master module first obtains a list of the actively available FastViewer communication servers from multiple redundant web servers over HTTP. The master module looks for the fastest communication server, which is used for the subsequent session. This guarantees 100% reliability. The FastViewer Customer Portal can be used to configure whether communication should occur via servers distributed worldwide, across Europe, or exclusively in Germany. The master module then connects to the selected FastViewer communication server. It does this via port 5000 (TCP), port 443 (HTTPS) or port 80 (HTTP) or an existing proxy server, if present. The 6-digit session ID is obtained via this connection. This session ID is usually transmitted to the session partner over the telephone or by e-mail. The session partner then enters the obtained session ID into the client module. The client module also obtains the list of actively available FastViewer communication servers. The client module connects to the FastViewer communication server via port 5000 (TCP), port 443 (HTTPS) or port 80 (HTTP) or via an existing proxy server, if present. The master module and the client module then negotiate a 256-bit AES key (using the Rijndael algorithm). To ensure that data cannot be read at either the FastViewer communication server or at any other point in the connection, the rest of the communication takes place only via the 256bit AES-encrypted connection. The FastViewer communication server is NOT able to decrypt the data because it is never in possession of the 256-bit AES key (see also the TÜV certificate)! The screen transfer then occurs in the desired direction. The session partner can stop the remote control at any time by pressing the "F11 key" on his or her keyboard. © FastViewer GmbH 1 Seite 3 GENERAL PROCEDURE Security features of FastViewer Secure Advisor With FastViewer Secure Advisor, a particularly intensive level of protection is required. This is ensured by triple security mechanisms: Since the installed remote client requires only an outbound connection, remote access from the outside is not visible. Consequently, no hacker attacks are possible because no incoming port is open. 1 2 FastViewer works like a debit card with a PIN. Login requires possession of the appropriate FastViewer EXE file for the client and knowledge of the right login credentials. 3 Additional protection to guarantee security is provided through the Windows login. Extended protection mechanism through SMS authentication In addition to the previously mentioned security features, an SMS authentication function is available. To enable access the overview of remote devices, it is necessary to enter a login code, which is sent to the respective registered phone number. This ensures that remote maintenance sessions on remote clients are only possible exclusively by authorized personnel. Independence through own server solution Another possibility is to use your own server solution. This solution can be used completely independently of our IT infrastructure. All sessions are handled through your own server independently of the FastViewer communication servers. This variant uses the same security standards as described above. Multiple redundant systems can guarantee reliability. Rijndael algorithm In the year 2000, the National Institute of Standards and Technology established the Rijndael algorithm as the official standard, known as the Advanced Encryption Standard (AES). Fifteen potential candidates were involved in the three-year selection process. During the competition, the encryption formulas of the individual candidates were made public so that they could be tested (attacked) publicly by the competitors. From among the finalists, the Rijndael algorithm was selected as providing the "best combination of security, performance and effectiveness." (Source: www.nist.gov ) © FastViewer GmbH 2 Seite 4 OVERVIEW SETTING UP A CONNECTION 1 Redundancy The master module looks for the fastest available communication server, which is then used for the subsequent session. If you are using your own server solution, a list of the available communication servers is stored in both the master module and the client module. If you are using multiple servers of your own, or if the FastViewer server is being used, the master module checks which server can respond the fastest to the request. This server provides the session ID and acts as the communication server for the session. This approach ensures a uniform load on the servers. The load is distributed automatically. 300 ms 1 250 ms 1000 ms Closed corporate network etc. 1 Strict separation of servers If customers use their own server solution, the connection is set up only to the defined servers. If different versions are used, the FastViewer update server is accessed, unless the customers provide the versions themselves. This access can be securely prevented on request. In short, it is possible to ensure exclusive and secure communications within a defined corporate network. © FastViewer GmbH 3 Seite 5 GENERAL SECURITY FEATURES CRC check Video recording A checksum is built into the program code when compiling the EXE files. If this checksum is modified or hacked using a tool, the program can no longer be started due to a checksum error. This effectively prevents unwanted changes to the program code and ensures the functionality of all the defined security features. A video recording, which starts automatically on request, can be activated for verification purposes at both the customer and supporter ends. The video file is linked to the player in a separate, unmodifiable format and is output as an independent EXE file. This prevents subsequent manipulation. Log files Installation-free After a session, a comprehensive log is made available, which allows conclusions to be drawn about the duration (start and end), host names and IP addresses involved. This log can be exported for evaluation purposes. Access is enabled via either the FastViewer-specific customer portal or the log viewer (if you are using your own server solution). FastViewer is an application that does not have to be installed by either the supporter or the customer (except for Secure Advisor Remote Client, which is installed as a service). After a remote maintenance session, the program modules exit cleanly without any residual effects. This means that no interventions into the customer system and subsequent access to the remote system are possible. © FastViewer GmbH 4 Seite 6 SECURITY FEATURES (MODULES) 1 2 9 10 3 6 1 2 4 5 7 8 9 10 11 1 Video recording 2 The master and client modules independently enable the active session to be recorded. The video is saved in a separate format and permanently linked to our own player. At the remote end, it is always apparent when a video recording takes place. 3 User Management Information on the session being conducted is stored in an online log during a session. This information includes the FastViewer user name, session ID, number of participants, FastViewer version number, Windows login name, host names, IP addresses, free-text items and time stamp. The logs can be evaluated and exported via the customer portal or by using a separate tool if you are using your own server solution. 4 Protection functions 6 The user always retains control over the remote maintenance activities. The control rights can be withdrawn from the supporter by pressing the F11 key. The user has the option of canceling file access or the entire session at any time. 7 Black list / White list A black list or white list can be configured in the customer portal to make applications selectively available or to block access. This setting cannot be changed during the active session. © FastViewer GmbH Pause function The presenter can pause the active session at any time. This freezes image transmission. The user management can protect the master module against unauthorized access. 5 Logging Active Directory Exported user keys can also be read from an existing Active Directory. These keys protect the module from being executed outside the domain. 8 Application filter Before the remote desktop is transmitted, the presenter has the opportunity to select the specific applications to be transmitted. You can also follow the same procedure for the desktop and task bar or newly launched applications. You can, of course, also share the Security description entire desktop. 5 Seite 7 SECURITY FEATURES (MODULES) 1 2 9 10 3 6 1 2 4 5 7 8 9 10 11 9 Features All features can be configured via the customer portal. This makes it possible to customize the interaction between all security features. For example, file transfer and file storage can be prevented. Client control can also be prevented. 11 10 Ending a session The customer is able to end the session at any time. This is done by clicking on the Close button in the FastViewer sidebar. In addition, the customer has the option to stop the remote control by pressing the "F11 key" on his or her keyboard. The customer can thus actively prevent changes to his or her system and terminate access. File transfer If the remote system is accessed by file transfer during an active session, multiple security barriers go into effect. The supported customer must approve the file transfer. If the approval is not granted, the file system cannot be accessed. A shared file transfer or file system access can, of course, also be canceled at any time. © FastViewer GmbH 6 Seite 8 SECURITY FEATURES (MODULES) Secure Advisor (Remote Access) 12 12 13 16 17 14 15 Outgoing connection Especially intensive protection mechanisms, which are carried out in addition to the activities described above, are needed for the remote access (installed service) of FastViewer Secure Advisor. 13 The remote client is invisible to outside attacks due to its exclusively outgoing connection. 14 As secure as a debit card Access is enabled only through the input of a user name and the associated password. 15 Service settings The user must activate the service to grant access (configurable). © FastViewer GmbH Windows protection Additional protection is provided by the upstream Windows application of the client (subject to the respective Windows security settings). FastViewer works like a debit card with a PIN. Login requires possession of the appropriate FastViewer EXE file for the client and knowledge of the right login data. 16 Access restriction 17 Timeout A timeout can be set. The customer decides whether or not access is granted after this timeout. 7 Seite 9 CERTIFICATES USED (CODE) Thawte code signing A thawte code-signing certificate is strongly recommended for all publishers who distribute code or content over the Internet or corporate extranets and who must ensure the integrity and authorship of that code. Features and benefits Online certificate status Signing of active content such as ActiveX, macros, MIDlet (J2ME) and Java Applets for secure electronic distribution via the Internet. This authenticated digital signature is used to efficiently verify your software source before it is downloaded: This ensures that your active content or code cannot be maliciously modified, grants your users access to the responsible publisher and offers the advantage of the secure thawte certification procedure on a global level. A major software vendor has released a beta version of its browser, which automatically checks the certificate status. This new testing protocol will accelerate thawte certificate validation, while reducing the misuse of invalid certificates and displaying the company data immediately to the end user. thawte has invested in its infrastructure and now offers a new "online certificate status protocol (OCSP)" instead of the old "certificate revocation lists (CRL)". Not all CAs can offer and support this service. For more information, visit www.thwate.de. © FastViewer GmbH 8 Seite 10 CERTIFICATES USED (SSL) Server certificate requests By default, FastViewer communication occurs over TCP 5000 or over HTTPS 443 or HTTP 80 as alternatives. Customers who use their own server solution of FastViewer can decide which ports to use for the communication. Operating FastViewer exclusively over HTTPS provides enhanced security, since this makes it possible to verify the "authenticity" of the tunnel server(s) by the standard SSL encryption method. The communication server requires an IP address and an SSL certificate to operate using HTTPS. Viewers can check which protocol is connecting them to the tunnel server in the FastViewer connection. It is possible to allow only valid HTTPS connections on a proxy server or firewall, which means that a connection will only be established if valid SSL certificates are recorded on the tunnel server. The SSL certificate can be easily checked by calling it from Internet Explorer. e.g.: https://tunnel6.FastViewer.com -> Right mouse button: Properties -> Certificates Authentication Authentication is used so that each party can verify the identity of the other party to the connection - a problem that is becoming more and more significant due to phishing attacks. © FastViewer GmbH HTTPS HTTPS is used for encrypting and authenticating communication between web servers and browsers on the World Wide Web. Syntax HTTPS is syntactically identical to the scheme for HTTP; the additional encryption of data is done via SSL/TLS: a protected identification and authentication of the communicating parties is initially performed using the SSL handshake protocol. A shared symmetrical session key is then exchanged using asymmetrical encryption or the DiffieHellman key exchange. This method is ultimately used to encrypt the user data. 9 Seite 11 EXTERNAL CERTIFICATES TÜV Süd BISG We require our communication solution to meet the strictest data security standards. We subjected our software to one of the toughest tests so that the people you deal with will have complete confidence in you and the solution you have deployed. FastViewer is the world's first desktop sharing solution that has received the TÜV SÜD certificate for data security and functionality. The German Federal Association of IT Experts and Consultants (BISG) has awarded FastViewer its prestigious seal of quality and describes the product's performance as "very good." In particular, the testers praised the product's lean architecture, installationfree use, outstanding handling and excellent stability. The testers also praised the fact that the user interface is transparently designed for users and thus avoids a steep learning curve. All in all, it is rated as an excellent product. FastViewer offers all options for connection types as well, including, for example, an HTTP client for tunnel connections (even behind firewalls), secure direct connections (encrypted) and direct connections. Since FastViewer never acts as a server, it also meets modern security guidelines without sacrificing balanced performance. The German Federal Association made the following concluding comments: FastViewer Instant Meeting (formerly Confered) and Secure Advisor (formerly Supported) were meticulously tested for functionality and data security according to the guidelines: ISO/IEC 25051:2014 (functionality), PPP 13011:2008 (data security & safety) "In summary, FastViewer is a product that is impressive in its flexibility and user-friendliness". © FastViewer GmbH 10 Seite 12 DATA PROTECTION BDSG excerpt 3. Access control The following is an overview of the data protection aspects relevant to FastViewer, as regulated in Section 9, Technical and Organizational Measures, of the BDSG (German Federal Data Protection Act). Steps must be taken to ensure that persons authorized to use a data processing system have access only to the data they are authorized to access, and that personal data cannot be read, copied, altered or removed without authorization during processing, use and after recording. 1. Access control Unauthorized persons must be prevented from accessing data processing systems with which personal data is processed or used. The server room of FastViewer can only be accessed by persons authorized to enter the server room. The lock on the steel door to this room prevents unauthorized access by external or third parties. Personal data can be edited only by administrators using their access authorization. Employees cannot edit or copy personal data stored in the system or manipulate this data in any other unauthorized manner. Employees are divided into groups that have different access authorizations for the data records. This is guaranteed by a Windows server structure in conjunction with the "Active Directory." 2. Access control Steps must be taken to prevent unauthorized third parties from using data processing systems. Access to the premises of the data processing equipment is protected, and all equipment and IT systems are provided with constantly changing passwords. These passwords are changed on a monthly basis. If a user does not change the password, the system will force him or her to do so. © FastViewer GmbH 11 Seite 13 DATA PROTECTION 4. Disclosure control 6. Input control Steps must be taken to ensure that personal data cannot be read, copied, altered or removed without authorization during electronic transfer or transport or while being recorded onto data storage media, and that it is possible to determine and check to which entities personal data is to be transferred using data transmission facilities. Steps must be taken to ensure that it is possible after the fact to check and ascertain whether personal data has been entered into, altered or removed from data processing systems and if so, by whom. Personal data from the IT system is protected against unauthorized copying to data media. In the case of FastViewer, data is generally not copied to data media and used outside the company. If an employee works in the field over a VPN connection, access is protected by a firewall and corresponding antivirus, spyware removal and anti-hacker software. Protection is provided from both the server and the user computers by installing corresponding software. Antivirus software: Sophos Endpoint Security and Control Hardware firewall: Sophos UTM9 (Internet gateway with incoming and outgoing virus scans as well as spyware checks). © FastViewer GmbH Every modification, deletion or processing of data and data records is stored in the FastViewer IT system (Selectline inventory management system). It is possible to track which user has made what change and when, etc., at any time. This report is visible only to administrators and is analyzed and monitored on a weekly basis. 6. Job control Steps must be taken to ensure that personal data processed on behalf of others is processed strictly in compliance with the controller's instructions. Only administrators have the authorization to edit personal data. These administrators can edit the relevant data in accordance with the written instructions of the client. 12 Seite 14 DATA PROTECTION 7. Availability control 8. Separation control Steps must be taken to ensure that personal data is protected against accidental destruction or loss. Steps must be taken to ensure that data collected for different purposes can be processed separately. The servers are backed up fully on a daily basis. All servers have mirrored hard drives in RAID systems and are equipped with redundant components. The equipment used can be remotely serviced and administered at any time via the FastViewer software solution. The communication servers used for this purpose are located in highly secure data centers. For the connections themselves, one of the highest quality encryption methods is used to ensure an appropriate security standard. (256 bit AES) Our system guarantees that data collected for different purposes can also be processed separately. This data is stored in the inventory management system (Selectline). All critical systems are subject to permanent monitoring through the monitoring software of the manufacturer Paessler. If critical values regarding the availability or performance of the networks or used devices are reached, the supervising administrators are notified immediately by email/SMS. The targeted monitoring of system components and processes helps prevent system bottlenecks, congestion and failures. Due to the comprehensive functionality of the monitoring systems by Paessler, it is possible to monitor and document the overall status of the network as well as the individual devices 24 hours a day. The monitoring report is regularly evaluated by an authorized administrator. © FastViewer GmbH 13 Seite 15
© Copyright 2025 Paperzz