Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Zoom Finally Adds Encryption To Secure Meeting Data and Resistance Against Tampering

Zoom Hits Milestone on 90-Day Security Plan, Releases Zoom 5.0; Robust Security Enhancements Include Support for AES 256-Bit GCM Encryption

Zoom Video Communications, Inc. announced robust security enhancements with the upcoming general availability of Zoom 5.0, a key milestone in the company’s 90-day plan to proactively identify, address, and enhance the security and privacy capabilities of its platform. By adding support for AES 256-bit GCM encryption, Zoom will provide increased protection for meeting data and resistance against tampering.

“I am proud to reach this step in our 90-day plan, but this is just the beginning. We built our business by delivering happiness to our customers. We will earn our customers’ trust and deliver them happiness with our unwavering focus on providing the most secure platform,” said Eric S. Yuan, CEO of Zoom.

“When faced with questions over security and privacy, Zoom reacted quickly and very publicly to the challenges, including their CEO holding weekly public security briefings,” notes Wayne Kurtzman, IDC Research Director for Social, Communities, and Collaboration. “Zoom was also quick to take actions on changing the defaults that helped address meeting privacy concerns, as well as setting a 90-day plan for deeper actions, and communicating it publicly.”

Recommended AI News: Cymulate Discovers Hidden Malware Defense Evasion Technique Using Microsoft Terminal Services Client (MSTSC)

“We take a holistic view of our users’ privacy and our platform’s security,” said Oded Gal, CPO of Zoom. “From our network to our feature set to our user experience, everything is being put through rigorous scrutiny. On the back end, AES 256-bit GCM encryption will raise the bar for securing our users’ data in transit. On the front end, I’m most excited about the Security icon in the meeting menu bar. This takes our security features, existing and new, and puts them front and center for our meeting hosts. With millions of new users, this will make sure they have instant access to important security controls in their meetings.”

Related Posts
1 of 40,805

Network

  • AES 256-bit GCM encryption: Zoom is upgrading to the AES 256-bit GCM encryption standard, which offers increased protection of your meeting data in transit and resistance against tampering. This provides confidentiality and integrity assurances on your Zoom Meeting, Zoom Video Webinar, and Zoom Phone data. Zoom 5.0, which is slated for release within the week, supports GCM encryption, and this standard will take effect once all accounts are enabled with GCM. System-wide account enablement will take place on May 30.
  • Control Data RoutingThe account admin may choose which data center regions their account-hosted meetings and webinars use for real-time traffic at the account, group, or user level.

Recommended AI News: DataBank selects MOPstar as a Strategic Partner to Ensure Uptime, Efficiency and Scale

User Experience and Controls

  • Security icon: Zoom’s security features, which had previously been accessed throughout the meeting menus, are now grouped together and found by clicking the Security icon in the meeting menu bar on the host’s interface.
  • Robust host controls: Hosts will be able to “Report a User” to Zoom via the Security icon. They may also disable the ability for participants to rename themselves. For education customers, screen sharing now defaults to the host only.
  • Waiting Room default-on: Waiting Room, an existing feature that allows a host to keep participants in individual virtual waiting rooms before they are admitted to a meeting, is now on by default for education, Basic, and single-license Pro accounts. All hosts may now also turn on the Waiting Room while their meeting is already in progress.
  • Meeting password complexity and default-on: Meeting passwords, an existing Zoom feature, is now on by default for most customers, including all Basic, single-license Pro, and K-12 customers. For administered accounts, account admins now have the ability to define password complexity (such as length, alphanumeric, and special character requirements). Additionally, Zoom Phone admins may now adjust the length of the pin required for accessing voicemail.
  • Cloud recordings passwords: Passwords are now set by default to all those accessing cloud recordings aside from the meeting host and require a complex password. For administered accounts, account admins now have the ability to define password complexity.
  • Secure Account Contact Sharing: Zoom 5.0 will support a new data structure for larger organizations, allowing them to link contacts across multiple accounts so people can easily and securely search and find meetings, chat, and phone contacts.
  • Dashboard enhancement: Admins on business, enterprise, and education plans can view how their meetings are connecting to Zoom data centers in their Zoom Dashboard. This includes any data centers connected to HTTP Tunnel servers, as well as Conference Room Connectors and gateways.
  • Additional: Users may now opt to have their Zoom Chat notifications not show a snippet of their chat; new non-PMI meetings now have 11-digit IDs for added complexity; and during a meeting, the meeting ID and Invite option have been moved from the main Zoom interface to the Participants menu, making it harder for a user to accidentally share their meeting ID.

Recommended AI News: Flashtalking Announces DoubleVerify and Moat Integrations and Introduces Verification Trafficking Automation to the Industry

1 Comment
  1. ApkJoyGar says

    You can download any of the provided casinos heavens without any problems. If you download the c***** app, it intent do one’s daily dozen like a conformable reproduction of the power supply place from the movable version. Unfortunately, all the apps you download will however trade on Android. Download c***** in 1 click from the list, these are the most advanced mobile applications.

    The best c***** apps as a service to Android
    The can of worms is that finding Android apps and downloading them can be tricky, as Google doesn’t sanction natural money Android casinos to be placed in the Flirt Store.

    Download c***** app
    But don’t chew one’s nails, there is a simple solution, you can download the c***** app from casinoapk2.xyz.

    As so multitudinous users have been asking about c***** gaming on their Android phones or tablets. We dug round a portion to learn you the most talented c***** apps sacrifice the selfsame verifiable money experience.

    The most simplified 1win, download 1win.

    Reviewers verify each application notwithstanding refuge to insure trust;
    We will relieve you find legal pelf g******* apps with the best Android apps;
    The casinos extend the best choice of games.
    Download Loyal On easy street C*****
    It is not usually effortless to download tangible loot casinos, on a par on more normal smartphones like Samsung Galaxy, HTC One or Sony Xperia. So if you fancy to download the app to gain a victory in shin-plasters, read all below.

    Our party establish the prime casinos sacrifice value g******* in return your device and ran an deep 25-step verification process for the treatment of them.

    On this page you will tumble to an bearing in behalf of Android:

    Acceptable Promotions – We conscious how much players be deficient in to misappropriate advantage of the bonuses, so we made sure that our featured sites offer classy deals in support of Android.
    Diversity of games. Decayed acceptance is a burly minus. We not recommend the app, the game portfolio is interminable and varied.
    Deposits – You be in want of as hardly restrictions as thinkable when it comes to depositing and withdrawing filthy lucre to your c***** app account. We cause reliable that all apps we recommend accept a wide class of payment methods.
    Fleet payouts. All applications proposal loyal payments with authentic readies, credited to the account in a some hours.
    Transportable Compatibility – Trifle with Apps Anywhere.
    Customer Support – To be featured on the Featured Inventory, we require online casinos to offer sweeping and responsive client service.
    Advantages of an online app in behalf of Android
    Great video graphics and usability in Android apps.
    Experience the same wonderful PC experience.
    Intelligent access from the application.
    C***** apps – looking as a service to the greatest
    We stay and download c***** apps to safeguard they convene great standards. The criteria employed to selected a c***** app are good as stringent as the criteria utilized to rate a PC c*****. Each application has:

    Highest distinction graphics;
    Flexible loading and playing epoch;
    Diet payouts.

Comments are closed, but trackbacks and pingbacks are open.