Zoom's solution and security architecture provides encryption and meeting access controls so data in transit cannot be intercepted

Trusted By

wu-logo.png
1LogoUber.jpg
 

Features


Encryption

End-to-End Chat Encryption allows for a secured communication where only the intended recipient can read the secured message. Zoom uses both asymmetric and symmetric algorithms to encrypt the chat session. Session keys are generated with a device-unique hardware ID to avoid data being read from other devices. This ensures that the session can not be eavesdropped on or tampered with.

For technical details read Zoom’s Security White Paper

Custom Security Settings

We’ve configured our platform to only use the highest level of security so that you can be sure your communications are safe.

Using both a Meeting ID and Password provides security against anyone without the link we send you. However, upon request, we can also enable:

  • Waiting Rooms. Even if your guest has the Meeting ID and Password they will still need to be admitted manually.

  • Locked Rooms. Once everyone has joined we can lock the room, so even individuals with the Meeting ID and Password cannot get in.

Trusted Supplier

“Globally, 2,000 institutions ranging from the world's largest financial services companies to leading telecommunications providers, government agencies, universities, healthcare and telemedicine practices have done exhaustive security reviews of our user, network and data centre layers confidently selecting Zoom for complete deployment.” - Zoom