Skip to main content

MeetingSphere Whitepapers

Please download our whitepapers which address important topics in depth.

The Surprising Power of Anonymity

How to enable people to contribute at their best.

Many executives believe that their organization has an open culture, a belief that is often shared by their employees. Yet employees and managers alike report that their people somehow clam up and underperform in meetings. This can impede sound decision-making.

This paper argues that attempts to create openness without addressing the fundamental challenges which individuals face in meetings are unlikely to work.

An effective way of overcoming these challenges is the use of meeting solutions which offer anonymity. The results are both positive and surprising. In hundreds of organizations around the world, in virtually all industries, anonymity has removed obstacles to disclosure and sources of prejudice, leading to a dramatic improvement in trust, engagement, and productivity.

Get the whitepaper

MeetingSphere Security and Information Assurance

Security impact classification - Privacy assessment - Security controls - Hardened deployment.

This security and information assurance addresses the information requirements of IT professionals who need to assess how MeetingSphere’s various deployment options fit in with their organization’s information and security policies and requirements.

Chapter 1 discusses MeetingSphere’s security impact classification. It focuses on potential breaches of confidentiality with data integrity and availability as important but secondary concerns. Chapter 2 gives a privacy assessment of MeetingSphere and explains that MeetingSphere holds only the bare minimum of personally identifyable information (PII) and how that information is protected. Chapter 3 discusses the customer’s deployment options from a security perspective. All deployments offer essentially the same functionally but differ greatly in accessibility (Isolated LAN, Intranet, Internet) or where and how the data is held (Cloud, customer’s data center or Portable Server appliance). Chapter 4 presents the security features and controls of the software and explains differences of the various product lines (deployment options). Appendix A “Security features and controls by product line” gives an overview of these differences. Chapter 5 details how MeetingSphere protects the confidentiality, integrity and availability of customer deployments in the cloud.

Get the whitepaper