announced Zoom platform revealed a list of new security features that users can take advantage of as the school year begins and millions continue to work and learn remotely.
At the Zoomtopia conference, the company announced that end-to-end encryption, which was introduced last October at Zoom Meetings, is now available for Zoom Phone users.
Zoom Phone users can upgrade to end-to-end encryption during individual phone calls that occur through the platform client.
During the call, users can click More to find the option to enable end-to-end encryption. Upgrade takes less than a second and helps users get security protection against server intrusion.
She added: Users can optionally exchange security codes over the voice channel to exclude an intruder in the middle. And the E2EE feature for Zoom Phone will be available next year.
The platform also announced two features designed to enhance its security: Bring Your BYOK Key and Verified Identity.
The BYOK feature is designed to help customers who have to deal with stringent compliance requirements or data location needs.
The tool allows users to manage encryption keys and create a system in which people own and manage a key management system on AWS. The system contains a client master key that the platform cannot access or see.
“We interact with the customer’s KMS to obtain the data keys for encryption and decryption, and use these data keys to encrypt and decrypt the customer’s assets before writing these assets into long-term storage,” the platform said.
She added: We will not store the keys of plain text data in long-term data storage.
BYOK is a separate offering from E2EE, and is not designed for real-time use cases such as video streaming.
Also Read: How Zoom Helps Create Hybrid Business Concept
Zoom unveils new security features
BYOK is best used for secure storage of larger assets, such as recording files. It is rolling out as beta software in the coming months for Zoom Meetings recordings, Zoom Video Webinars, voice mail, Zoom Phone recordings and Zoom Rooms calendar.
The verified identity was created to help tackle the growing sophistication of social engineering and phishing attacks. Identity Verification allows users to determine if the meeting guest is the same person.
The platform said that the tool helps users who deal with confidential information, specialized services, and more.
Multi-factor authentication is used to screen users who enter the meeting. The tool asks you to specify your position in the organization, your credentials, and the network you are using. It also provides information about your device, authentication apps, codes, biometrics, and email addresses.
It also uses passwords, security questions, and profile information to verify users.
To make authentication and authentication an integral part of the platform experience, it works with Okta to help verify users as they join Zoom Meetings.
Once they are in a meeting, the user has a check mark next to their name and can share their verified account information with the meeting participants.
Meeting hosts can use the security controls during the meeting to remove a participant if for some reason it has not been verified, or if the information displayed appears incorrect.
Viewing account information verified by Okta will be available sometime next year. It is the beginning of the long-term certification and verification initiative strategy.
Read also: Zoom announces focus mode that prevents students from getting distracted