Don't miss a thing! Sign up to be notified about new blog posts.
In today’s “Ask Eric Anything” webinar, Zoom founder and CEO Eric S. Yuan provided more progress updates on our 90-day security plan, including exciting announcements about Zoom 5.0 and surpassing 300 million daily Zoom meeting participants.
Eric was joined by Zoom CPO Oded Gal, Zoom CTO Brendan Ittelson, Alex Stamos, who is a security adviser to Zoom, and Lea Kissner, the former Global Lead of Privacy Technology at Google, who is consulting with Zoom on privacy and encryption.
Some updates from the past week and on what’s coming:
Data routing control
Zoom admins and owners of paid accounts can opt in or out of any data center region (apart from their home region) at the account, group, or user level. Read our blog on data control routing for more details.
Zoom 5.0 announcement
Set to release this weekend, Zoom 5.0 includes two new features to help Zoom users host secure meetings and protect their data:
Introducing Lea Kissner
Eric introduced Lea Kissner, the former Global Lead of Privacy Technology at Google and Chief Privacy Officer of Humu, who has joined Zoom as a security consultant. With her expertise in privacy, protecting users, and encryption, Lea will play an instrumental role in helping Zoom create a more secure platform.
Here are some of the topics that were addressed live from webinar attendees this week:
How does Zoom’s new encryption compare to other technology providers’?
Lea explained that Zoom’s new 256-bit GCM encryption will be comparable to that used by many leading technology companies.
Will data centers get overloaded if everyone opts into the same ones?
Even with data center customization available, Zoom is designed to scale to meet heavy usage demands. We’ve been adding capacity in our data centers and working with our public cloud partners to scale as needed to ensure reliability, even with more than 300 million daily meeting participants.
Can Waiting Rooms, meeting registration, and meeting passwords be used together?
Meeting registration, passwords, and the Waiting Room feature can all be used for the same Zoom Meeting, and users who are hosting sensitive meetings should use them all for the most secure environment.
How can users secure their Personal Meeting ID (PMI)?
Securing a Personal Meeting ID is similar to a professor holding office hours; you can keep your PMI open for trusted parties to join, but you must “keep the office door closed” by enabling the Waiting Room and meeting password.
How can hosts prevent users from joining with another person’s name?
Hosts can require all participants to register for the meeting, where they enter their first name, last name, email address, and other information, which the host can then confirm. Hosts can also use the Security icon to disable the ability for participants to rename themselves.
We continue to be very appreciative of all of our customers’ support in our journey to a more secure Zoom platform. It makes us very proud to know that millions of people around the world are using Zoom during this challenging time.
If you missed this week’s session, you can watch the recording here:
Edit 4/29/20: This blog originally referred to meeting participants as “users” and “people.” This was an oversight on our part.
4/30/20: The 4/22 blog also correctly used the term participants, but not consistently. The oversight was corrected on 4/23.