END-USER CONTROLS FOR SAFER CONFERENCING
Prevent unwanted participants from joining meetings and protect end-user privacy with security settings enabled by default or whenever required.
A randomized nine-digit ID is assigned to each meeting to keep the credentials private.
A second-level of authentication that can be enabled for each meeting.
Avoid unintended content to be seen by meeting participants with individual app share, rather than sharing the entire screen.
During the course of a meeting, the session may be locked down to only include those participants that are in attendance.
During the course of a meeting, any participant can quickly be removed from the meeting with a click of a button.
An option that forces a BlueJeans meeting to only allow end points with sufficient encryption capabilities enabled.
AIRTIGHT MANAGEMENT FOR ENTERPRISE-WIDE SECURITY
Enforce meeting security from your BlueJeans administrator dashboard and customize end-user accessibility
MEETING RECORDINGS, STORAGE, AND ENCRYPTION
Only the most basic customer data is stored in the BlueJeans database, including: username, password (SHA-256 salted hash), email, name, title, company, and profile picture.
BlueJeans delivers secure meetings through standards-based encryption, ensuring the highest levels of confidentiality and security for all your business communications, regardless of hardware environment.
Recordings are stored in secure containers in the cloud. These videos are encrypted at rest (AES-256bit) and are only accessible to the recording originator.
block illegitimate meeting participants
BlueJeans includes the following fraud detection and prevention mechanisms within our service to detect identity theft issues while logging in or joining meetings: