Security is our highest priority. We know our customers hold video conferencing regularly over Zoom, from daily product scrums to discussing your company’s next big idea. No matter when or how you meet, you want your meeting to be secure. That’s why we continually provide a robust set of security features to meet the requirements for safe and secure video conferencing and web meetings. Today, we will spotlight key security features across our platform.
1. Secure Scheduling
There are a couple features you can access when you’re scheduling your meeting to make it more secure.
- Password Protection: password protect your meetings by clicking Require meeting password and entering an alphanumeric password when you schedule your meeting. The password is automatically populated in the calendar invitation. This means that only people with both the meeting ID and password can join your meeting.
- Join Before Host: When scheduling, you can also choose to not select Join before host. If you don’t select this option, no one can join the meeting without you being there to start the meeting. This gives you greater control over the meeting. If you let people join before host, you still get an email when they join, notifying you that they are in your meeting room. If nothing else, it’s a great last-minute reminder when you forget a meeting, that your participants are waiting for you!
2. In-Meeting Security Options
The meeting host has a variety of controls they can use to secure their meeting. For example,
- Lock the Meeting: when you’re in the meeting, click Participants at the bottom of your Zoom window. In the participants pop-up box, you will see a button that says Lock Meeting. When you lock the meeting, no new participants can join, even if they have the meeting ID and password.
- Expel a Participant: still in that participants menu, you can mouse over a participant’s name, and several options will appear, including Remove. Click that to kick a participant out of the meeting. They can’t get back in if you then click Lock Meeting.
- Attendee On-Hold: if you need a private moment, you can put attendees on-hold. The attendee’s video and audio connections will be disabled momentarily. Click on the attendee’s video thumbnail and select Start Attendee On-Hold to activate this feature.
Other host controls include locking screen-sharing, enabling/disabling participant recording, and disabling in-meeting chat.
3. Built-In Security Zoom Features
Good news! All Zoom meetings are also protected by multiple security layers with flexible controls.
- Cloud Infrastructure: Zoom meetings run on our highly reliable, scalable, secure infrastructure platform in the cloud. A distributed network of low-latency multimedia routers resides on Zoom’s communications infrastructure. All session data originating from the host’s device and arriving at the participants’ devices is dynamically switched — never stored persistently.
- Encryption: Zoom secures session content by encrypting the web communications channel to https://zoom.us. Zoom also supports SSL/TLS (port 443) network-layer communications between the Zoom app and the multimedia router, as well as NIST AES 256 application-layer encryption.
- Post-Meeting Security: Once the meeting is over, no session information is retained on the Zoom routers or on any participant’s devices. If a meeting is recorded, the recording is located on that customer’s local machine. Zoom communications infrastructure does not store any recorded content.
Some of our business users have more advanced security needs for video or web conferencing. Zoom to the rescue!