Database security

Certified authentication module completed standard including ISO 27001, ISO 27017, ISO 27018, SOC 1, SOC 2, SOC 3.
Certified realtime database completed standard including 27001, SOC 1, SOC 2, SOC 3.
Certified database cloud service.

Network security

Remo client connects via HTTPS (port 443/TLS) to Remo servers to obtain information required.

Video and audio streaming security and encryption

In the TRIAL and paid version of the Service, we will use a dedicated server infrastructure to allow more people in conversation, and better stability. Your stream will be sent through video router servers which transmits it to the other participants in the call, and also transmits their streams to you. Streams will always be encrypted (AES-128 or AES-256 algorithm) in transit, but will be decrypted and re-encrypted when passing through the video routers. We operate an infrastructure of video routers distributed across the world, and you will be automatically routed to the closest one. The video router servers and all of our infrastructure adhere to strict security measures, preventing any eavesdropping or interruption of the video/audio streams.

All media traffic is encrypted no matter the endpoint you use (web or mobile) or the session setup you choose (P2P or multiparty).
Remo use the AES cipher with 128-bit keys to encrypt audio and video, and HMAC-SHA1 to verify data integrity.
Camera is turned off once user closes all Remo pages/tabs in the browser.

Event security

Role-based permissions control.
Secured event that prevent non-authorized user to access.
User whitelist for private event access control, only whitelisted user can be join event.

Was this article helpful?
Cancel
Thank you!