Please select a location to view content specific to your country

Experience Convene

Learn how Convene can give you a great meeting experience. Get a 30-day free trial with no cost or obligation.

United Kingdom (+44)
(+44) *

All fields marked with * are required

Convene Video Conferencing

Convene Video Conferencing

A new innovation for our award-winning board meeting software has arrived! Azeus Convene’s new video conferencing feature supports everything required to hold a successful and productive remote meeting.

Learn More

User Accounts and System Security Preferences

User Accounts and System Security Preferences

  • Business Continuity Measures

    Account Management

    Easily add and remove users from the system, assign them as General Users or System Administrators and divide them into groups for easier management.

  • Incident Management

    User Logs and Activities

    Track application and Admin Portal activity such as logins, document access, meeting changes, and profile updates. Generate usage reports through Audit Trail.

  • Password Policies

    Password Policies

    Ensure account security with customized password policies and password expiration periods.

  • 24/7 Intrusion Detection System (IDS)

    Session Timeout and Sign-in Retries

    Set session timeouts and limit sign-in retries to prevent unauthorized access to Convene.

  • Personnel Security

    Role Based Access Control

    • User Roles
      Configure system settings, customize access rights, and manage user accounts based on User Roles (General User or System Administrator).
    • Meeting Roles
      Define and limit what meeting participants can do during Live Meetings and with the board material by assigning Meeting Roles.
Document Security and Digital Rights Management (DRM)

Document Security and Digital Rights Management (DRM)

  • Cloud Data Availability

    Copy Restrictions

    Prevent the copying of document content to other applications so as to minimize exposure of user data.

  • Back-Up and Recovery

    Watermarks

    Selectively add customizable watermarks to documents in order to discourage misuse of sensitive material.

  • Document Security and Digital Rights Management (DRM)

    Secure Document Signing

    To prevent signature fraud, Convene requires users to provide their credentials before signing with an E-Signature. Users can also set Convene to timestamp their signatures.

  • 24/7 Intrusion Detection System (IDS)

    Scheduled Archival and Disposal

    Schedule the archival and disposal of documents to avoid unauthorized access of files in specific Meetings, Review Rooms or Resolutions.

  • Device Security

    Multi-Level Encryption

    • Data at Rest
      Documents are protected with AES 256-bit encryption when stored in Convene’s local storage and web portal.
    • Data in Transit
      Wireless network transmissions to and from Convene are protected with RSA 2048-bit Transport Layer Security (TLS) encryption.
    • Key Management
      Documents are secured with the use of three-tier key management with a random document key, user key, and system key.
  • Enterprise-Grade Cloud Hosting

    Document Access

    • Document Library
      Limit who can view, download or edit individual files or folders in the Document Library.
    • Meetings
      Assign Meeting Roles to limit who can view, download, forward, export, and print specific agenda items and documents from meetings.
    • Secure Agenda Contribution
      Meeting participants and organizers can be restricted from viewing classified or sensitive agenda items within a meeting.
Device Security

Device Security

  • Secure User Authentication

    On-the-fly Decryption Model

    When a user needs to access encrypted files on storage, only the needed parts are decrypted into memory.

  • Device Security

    Jailbreak and Root Detection

    Convene is able to detect whether a mobile device has been jailbroken or rooted and will not run on these devices.

  • Document Security and Digital Rights Management (DRM)

    Measures to Secure Lost or Stolen Devices

    • Remote Data Wipe and Automatic Purge
      Remotely delete stored offline data downloaded to a device in case it is lost or stolen.
    • Re-Authentication
      In the case of lost or stolen devices, session timeouts render data inaccessible unless the device is re-authenticated.
Secure User Authentication

Secure User Authentication

  • Password Policies

    User ID and Password

    Convene only allows members with registered user accounts to log in to the system using their own unique password.

  • Enterprise-Grade Cloud Hosting

    SAML Single Sign-On (SSO)

    Eliminate the need to repeatedly type in passwords per login through a streamlined single sign-on process using SAML 2.0.

  • Incident Management

    Biometric Authentication

    Do away with the inconvenience of typing login information with Touch ID or Face ID (iOS) or fingerprint scanning (Android) for mobile devices.

  • Cloud Data Availability

    Active Directory Integration

    Through Active Directory (AD) integration, users no longer have to remember another set of credentials, while organizations can ensure that only registered users have access to Convene.

  • 24/7 Intrusion Detection System (IDS)

    Multi-Factor Authentication

    • One-time Pin (OTP)
      Receive and enter a one-time verification code, which is securely and instantly delivered to your registered mobile number, before logging in to Convene.
    • Device Registration
      Selectively restrict access to Convene to previously registered devices and/or browsers.
    • Time-Based One-Time Password (TOTP)
      Use the authenticator application of your choice to secure your Convene account.
Back To Security Features

Experience Convene

Learn how Convene can give you a great meeting experience. Get a 30-day free trial with no cost or obligation.

United Kingdom (+44)
(+44) *

All fields marked with * are required