Zoom introduces new security features
Zoom introduces new security features

Zoom announced a number of new security features that users can take advantage of early in the school year, and millions of people continue to work and study remotely.

At the Zoomtopia conference, the company announced that end-to-end encryption, which was introduced at Zoom meetings last October, is now available for Zoom Phone users.

Zoom Phone users can switch to end-to-end encryption for personal phone calls made via the platform client.

During the call, the user can click more to find the option to enable end-to-end encryption. Upgrading takes less than a second and helps users get security protection against intruders from the server.

"Users can exchange security tokens via voice channels to keep intruders in the middle," she added. The E2EE feature will be introduced on the Zoom Phone next year.

The platform also announced two features to improve security: Bring your own BYOK key and verified identity.

BYOK is designed to help customers who face stringent compliance or data situation requirements.

This tool allows users to manage encryption keys and create a system in which people own and manage the key management system on AWS. The system contains a client master key that the platform cannot access or see.

“We interact with the customer’s KMS to obtain the data keys for encryption and decryption, use these data keys to encrypt and decrypt the customer’s assets and then write those assets for long-term storage,” the platform said.

She added: We will not store the keys of plain text data in long-term data storage.

BYOK is a standalone product from E2EE and is not designed for real-time use cases such as video streaming.

Zoom introduces new security features

BYOK is best used to securely store large assets, such as: b for filing. It will be released as beta software for Zoom Meeting Recording, Zoom Video Webinar, Voicemail, Zoom Phone Recording, and Zoom Rooms Calendar in the coming months.

Verified identities are created to solve increasingly sophisticated social engineering and phishing attacks. Authentication allows users to determine if the invitee in the meeting is the same person.

The platform says that the tool can help users deal with sensitive information, professional services, etc.

Multi-factor authentication is used to filter users who join the meeting. The tool requires you to provide your location in the organization, your credentials, and the network you are using. It also includes information about your device, authentication app, passcode, biometrics, and email address.

It also uses passwords, security questions, and profile information to authenticate users.

To make authentication and identity verification an integral part of the platform experience, it has partnered with Okta to verify that users attend Zoom meetings.

Once they join the meeting, a check mark will appear next to the username and the verified account information can be shared with the meeting attendees.

The meeting organizer can use security checks during the meeting to remove attendees who have not been verified for any reason or if information is displayed incorrectly.

The account information verified by Okta will be shown to you in the next year. This is the beginning of a long-term strategy for the Accreditation and Verification Initiative.



Save 80.0% on select products from RUWQ with promo code 80YVSNZJ, through 10/29 while supplies last.

HP 2023 15'' HD IPS Laptop, Windows 11, Intel Pentium 4-Core Processor Up to 2.70GHz, 8GB RAM, 128GB SSD, HDMI, Super-Fast 6th Gen WiFi, Dale Red (Renewed)
Previous Post Next Post