Start Hosting Secure Online Meetings


At The Heart Of Every Great Team Is Great Collaboration

In today’s hyper-competitive business environment, the ability to make better decisions faster is critical to any organization’s success. And there’s simply no substitute for face-to-face collaboration when it comes to making those decisions.

GBHCloud CONNECT_small

Experience Better Collaboration: Employees connect anytime, anywhere on any device.

Enhance Internal and External Communication: Communicate face-to-face with vendors and partners across the globe.

Increase Cost Savings On Travel: Decrease the amount of travel through virtual collaboration.

Recruit, Train and Retain Top Talent: Host video screening interviews, record training sessions, and keep employees engaged through enhanced communication.

Improve Employee Work/Life Balance: Give employees the opportunity to work from home and stay connected to work.

Increase Speed to Market: Our Manufacturing Video Inspection carts connect global manufactures to assembly lines for faster product approval cycles.


Lock your meetings and secure confidential conversations.

Schedule meetings with Outlook

Add a Meeting link and dial-in details so guests can join from their Outlook calendar.

Any device

Set up and join from any device - PC/Mac, iPhone, iPad, and Android.

Scalable & Reliable

Guaranteed uptime. Easily deploy and administer across the enterprise.

Collaboration Tools

Record meetings, add attachments, share screens and documents.


Join from Microsoft Lync®, mobile devices, and video conference systems.

Try GBH Cloud Connect

Try GBH Cloud Connect

connect_screenshot 1





Do you know who's listening in on your confidential conference calls?

Conference call bridges are not thought of as openings where sensitive data may leak from your organization, but just because you don't think of it doesn't mean it's not happening - anyone with access to dial-in numbers and participant codes is able to join the call. Not knowing who's on means you don't know for sure whether someone is listening in who shouldn't be.

In 2012, the FBI admitted that hackers listened in on a conference call it had with Scotland Yard and other foreign police agencies about a joint investigation of the hacker group and its allies. Even more surprisingly, the eavesdroppers didn't actually hack into the call. They obtained an email containing the conference call login information.

Back-to-Back Meetings

You schedule one meeting immediately after another on the same conference bridge and you have participants on the call who shouldn't be there. This happens because the first meeting runs long, or participants invited to the second meeting join early.

Recurring Meetings

You host recurring meetings and anyone with those dial-in details and knowledge of the time of the meeting will be able to join – even if their participation is no longer required or more importantly, they are no longer with the company.

Employee Turnover

When employees leave, they inadvertently keep hold of the participant conference call details for calls they attended in the past. The participant codes aren't changed frequently and these calls are open indefinitely to eavesdropping from former employees.

Vendors and Contractors

Vendors, short term employees/contractors or third-party personnel have access to conference codes for recurring meetings often related to product development, go-to-market strategies, and sales/marketing initiatives.

Shared Conferencing

You share a set of dial-in and participant codes but run the risk of accidentally scheduling calls at the same time leading to two sets of participants joining at once or participants invited to one user's call turning up on the line uninvited.

Large Number of Participants

The host is relying on the "beeps" to signal participants joining and leaving, keeping track of who is on the call becomes extremely difficult, unwanted participants pass unnoticed and leading to that conferencing call classic, "who just left?"