Feature Spotlight: Zoom Security

Feature Spotlight: Zoom Security
Security is our highest priority. We know our customers hold video conferencing regularly over Zoom, from daily product scrums to discussing your company’s next big idea. No matter when or how you meet, you want your meeting to be secure. That’s why we continually provide a robust set of security features to meet the requirements for safe and secure video conferencing and web meetings. Today, we will spotlight key security features across our platform.

Secure Zoom Scheduling1. Secure Scheduling

There are a couple features you can access when you’re scheduling your meeting to make it more secure.

  • Password Protection: password protect your meetings by clicking Require meeting password and entering an alphanumeric password when you schedule your meeting. The password is automatically populated in the calendar invitation. This means that only people with both the meeting ID and password can join your meeting.
  • Join Before Host: When scheduling, you can also choose to not select Join before host. If you don’t select this option, no one can join the meeting without you being there to start the meeting. This gives you greater control over the meeting. If you let people join before host, you still get an email when they join, notifying you that they are in your meeting room. If nothing else, it’s a great last-minute reminder when you forget a meeting, that your participants are waiting for you!

2. In-Meeting Security Options

Locked Zoom MeetingThe meeting host has a variety of controls they can use to secure their meeting. For example,

  • Lock the Meeting: when you’re in the meeting, click Participants at the bottom of your Zoom window. In the participants pop-up box, you will see a button that says Lock Meeting. When you lock the meeting, no new participants can join, even if they have the meeting ID and password.
  • Expel a Participant: still in that participants menu, you can mouse over a participant’s name, and several options will appear, including Remove. Click that to kick a participant out of the meeting. They can’t get back in if you then click Lock Meeting.
  • Attendee On-Hold: if you need a private moment, you can put attendees on-hold. The attendee’s video and audio connections will be disabled momentarily. Click on the attendee’s video thumbnail and select Start Attendee On-Hold to activate this feature.

Other host controls include locking screen-sharing, enabling/disabling participant recording, and disabling in-meeting chat.

Secure Video Conferencing3. Built-In Security Zoom Features

Good news! All Zoom meetings are also protected by multiple security layers with flexible controls.

  • Cloud Infrastructure: Zoom meetings run on our highly reliable, scalable, secure infrastructure platform in the cloud. A distributed network of low-latency multimedia routers resides on Zoom’s communications infrastructure. All session data originating from the host’s device and arriving at the participants’ devices is dynamically switched — never stored persistently.
  • Encryption: Zoom secures session content by encrypting the web communications channel to https://zoom.us. Zoom also supports SSL/TLS (port 443) network-layer communications between the Zoom app and the multimedia router, as well as NIST AES 256 application-layer encryption.
  • Post-Meeting Security: Once the meeting is over, no session information is retained on the Zoom routers or on any participant’s devices. If a meeting is recorded, the recording is located on that customer’s local machine. Zoom communications infrastructure does not store any recorded content.

4. Advanced Security OptionsVideo Conferencing

Some of our business users have more advanced security needs for video or web conferencing. Zoom to the rescue!

  • Meeting Connector Security: the Zoom Meeting Connector is a hybrid cloud deployment method, which allows a customer to deploy Zoom within the company’s internal network. The meeting metadata is managed on Zoom’s infrastructure, but the meeting itself is hosted in the company’s internal network. All the real-time meeting traffic, including audio, video, and data sharing stays within the company’s own network. This leverages your existing network security setup to further protect your communications.
  • Single Sign-On (SSO) Security: With SSO, a user logs-in using your company’s identity provider such as Microsoft Active Directory or Google Apps to access a variety of applications. Zoom works with all SSO providers via SAML so you can easily assign who gets access to Zoom. Check out our Partners to see what SSO companies we work with.

Want more details on Zoom’s security features? Check out our security page. And try Zoom for yourself by signing up free.

Don’t forget to share this post