
RXV81 MTR on Android Video Collaboration Bar
User's & Administrator's Manual
16
Document #: LTRT-18251
Sandboxing
AudioCodes Native Teams devices use Android Application Sandbox so that each application
can access its own data and is isolated from other applications. This prevents a malicious app
from accessing the code or the data of other applications in the system.
Keystore
With AudioCodes Native Teams devices, the certificate keys are encrypted on the device file
system.
Device Certificate
AudioCodes Native Teams devices are shipped with a unique certificate which is signed by
AudioCodes Root CA.
Data Protection
AudioCodes Native Teams devices run Android which has integral procedures for protecting and
securing user data.
Device File System
The device file system is encrypted on the RXV81 device – customers may enforce a policy of
device encryption via Microsoft Intune.
Debugging Interface
The device leverages SSH as a debugging interface.
AudioCodes recommends that customers disable SSH on the device – this can be done via
the AudioCodes Device Manager (OVOC).
AudioCodes recommends changing the Admin password from the default, which can be
done via Teams Admin Center or AudioCodes Device Manager (OVOC).
When debugging of a specific device is required, the user can enable SSH on specific
device/s, access SSH with the new Admin password for debugging phase and disable SSH
once debugging has been completed.
1.5.3 Android Security Updates
In addition to all the above, AudioCodes regularly adopts and integrates the Android security