co browsing software Security - Tagove

Good News! Tagove Launches Its Own CRM to Manage Live Chat Conversations & Leads Read More

Introduction

Security is always a top priority when doing business over the web.Due to the fact that breaches of security can pose major risks to online businesses, Tagove has implemented a multi-tiered approach to securing its services by following core principles:

A multi layer physical infrastructure, network, application and system components

Robust and flexible security solutions to support customer requirements


Application level security

CHAT SESSION SECURITY

The main service that Tagove protects is live chat. This includes monitoring visitors on any Web page that has been ‘tagged’ with Tagoves tracking code, as well all chat sessions between your chat agents and visitors.

Data is transferred from the visitor’s browser to Web server using the protocol of the Web page. Meanwhile, the agent console software deployed on your chat agents PCs continiously communicates with the web servers, notifying it of each agents availability to accept chats.When visitors request a chat via a click-to-chat button, the web server forwards the request to the appropriate application server. Part of this is accomplished through firewall applications and 2048bit encryption.

Once the server receives a valid request, it will initiate a parallel request with an appropriate and available chat agent. Both sides will then communicate in a chat session which is peer-to-peer and fully encrypted.

This has the following advantages:

- Visitors do not need to install any software on their PCs as all communication are browser based

- No direct connection between your LAN and your visitors are required

- All sessions are fully encrypted

- Firewall application filter all communication prior to establishing a chat session


Web vulnerabilities resistance

Convenience, familiarity and broad availability make the Web the most ideal platform for hosting applications. The Application Service Provider (ASP) and Software as a Service (Saas) models provide maximum flexibility for the broadest swatch of potential customers worldwide.

The challend for all ASP-based services is to build security features directly into the application itself rather than relying on third party systems for protection.

- Restricted redirection. Many Tagove agents need to re-direct customers to other pages of the web domain. Therefore, customers canot be re-directed to a third-party domain. Restricting customers being sent to malicious domains

- IP restrictions. The simplest way to stop unauthorized users from gaining access to your system is to create a predefined list of IP addresses which can be blocked.


Chat agent security

User management is a key element to security. User authentication, user permission levels and activity trails are all vital for when it comes to security. Tagove enables customer to define the level of security within the application. This determines the users management features.

Login policy

Direct users of Tagove are the chat agents and administrators who access the system. Each user is assigned a unique account and specific authorization & permission level, as controlled by the account administrator.

Password policy

Operators and users authenticate Tagove with a username and password. The password is configurable and can be customised to match your organizations corporate password policy. Authentication is established over HTTPS encrypted protocol and passwords that are subsequently stored in a database that is encrypted.


Data collected by the application

As an Application Service Provider, Tagove collects information from visitors on behalf of customers. Unless configured otherwise, Tagove logs the visitor’s browsing information (e.g. IP addresses, browser types, referring page).

Tagove can also deply a pre-chat and exit survey which are both optional. If set-up it will prompt visitors to provide information about themselves as configured by the site admin (e.g. name, email, phone).

At the conclusion of the chat, the user will be prompted to complete an exit survey in order to obtain their feedback regarding the experience. This is completley voluntary.


Masking non-public information

All information handled by Tagove is considered private. Tagove has the ability to support your organizations security and privacy requirements.

Secure storage

All chat transcripts and recordings gathered from Tagove are stored within Tagoves database, unless configured otherwise. Each Tagove customer is assigned with a unique ID, and the access control mechanisms embedded in the application and in the database to prevent unauthorised access. Although it may be stored on a shared database server, the data is logically protected and segregated in a way that ensures online authorised entities will be able to access.

Encrypted storage

Encryption is the final layer of protection. It is implemented in order to prevent potential attackers who may have gained access to your information from actually using it.


What can be encrypted

Tagove encrypts all chat transcripts, survey answers and "custom variables".

Tagove uses AES encryption. The AES algorithm is a well-accepted encryption method used by many enterprise companies. The advantage of using a well-known encryption algorithm is that is has been subjected to numerous penetration tests and improvement processes by the community of encryption experts.

Tagove uses a Security Hash Algorithm (SHA2) for all password entries.

Management of the encryption keys is as important as the encryption itself. The key management strategy focuses on secured key generation and storage, utilization of a unique encryption key for each customer, limited and controlled access to stored keys, segregation of duties between encryption and decryption permissions and re-generation of keys in compliance with your security requirements.


Infrastructure security

Tagoves network, infrastructure and archistecture have multiple protection layers that ensure the highest levels of security and control, which include:

- Network and communication security, including firewalls and access control lists

- Content filtering and validation via firewalls

- Logical security, including access control to all media and systems, server hardening and patch management

- 24/7 network, infrastructure and service monitoring

Network security

All communications with the outside world passes through access-list enabled routers. Only HTTP and HTTPS protocols are allowed to into or out of Tagoves service network.

Logical security

Tagoves security ensures that one customer cannot see anothers data. Customer data is logically protected and segregated in a way that ensures only authorized entities are able to access it. Access goals mechanisms have been implemented to efficitently support this goal.


Datacenter

Secure and trusted service providers

Tagoves services are hosted in advanced data center operated by a recognized industry leader (OVH). Tagove has selected this vendor based on their proven leadership in hosting services for high-capacity businesses. Our vendor adhere to the highest industry standards of quality, security and reliability. Their commitment enables Tagove to deliver 24-hour service, 365 days a year to our customers.

Security

The OVH datacenters have been awarded the following international standards, providing the highest level of international security.

OVH is certified ISO 27001::2005

for providing and operating dedicated cloud computing infrastructures

OVH is based on the ISO 27002 and ISO 27005

security management and risk assessment norms and associated processes

OVH has obtained SOC 1 and 2 type II certifications

for 3 datacentres in France and 1 in Canada, which certifies the security level for OVH Dedicated Cloud


Physical and environmental security

Secure and trusted service providers

Tagoves datacenter utilize an advanced array of security equipment and procedures to prevent unauthorized access to it’s facilities. The servers are located in a private, restricted cage. All access anywhere, is monitored.

To protect integrity of its systems, most of the security controls within the datacanters are confidential. Some of the visible is monitored and recorded.

- Excellent exterior and interior intrusion and tamper-prevention systems

- Advanced array of closed circuit TV camera and recording systems (CCTV)

- Comprehensive security audits and tests

- Strict security policies