• About
  • Subscribe
  • Contact
Friday, January 16, 2026
    Login
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
No Result
View All Result
Home Technology

Zoom Workplace now includes post-quantum end-to-end encryption

FutureCIO Editors by FutureCIO Editors
June 10, 2024
Photo by Matilda Wormwood: https://www.pexels.com/photo/woman-in-blue-denim-jacket-using-macbook-pro-4099099/

Photo by Matilda Wormwood: https://www.pexels.com/photo/woman-in-blue-denim-jacket-using-macbook-pro-4099099/

Zoom Video Communications, Inc. announced the global availability of post-quantum end-to-end encryption (E2EE) for Zoom Workplace, specifically Zoom Meetings, making it the first unified communications-as-a-service company to offer a post-quantum E2EE solution for video conferencing. 

Michael Adams

Michael Adams, Zoom's chief information security officer, said, "With the launch of post-quantum E2EE, we are doubling down on security and providing leading-edge features for users to help protect their data. At Zoom, we continuously adapt as the security threat landscape evolves, with the goal of keeping our users protected."

Post-quantum E2E encryption

To prevent the "harvest now, decrypt later" scenario to capture encrypted traffic in the present, intending to decrypt it in the future when quantum computers have become more advanced, Zoom's offering uses public key cryptography to mitigate potential future threats.

The participants' machines, not servers from Zoom, generate the keys for each Zoom meeting. Zoom explained on its website, "Encrypted data relayed through Zoom's servers is indecipherable by Zoom since Zoom's servers do not have the necessary decryption key. This key management strategy is similar to most E2EE messaging platforms today."

Limited functionality

Zoom further explained that E2EE can enhance privacy and data protection and serve as an additional layer of risk mitigation and protection of sensitive meeting content.

However, enabling Zoom's E2EE in meetings turns off features such as joining before the host, cloud recording, Zoom Whiteboard, AI Companion features, streaming, live transcription, and polling.

"Individual Zoom users should determine whether they need these features before enabling E2EE in their meetings," Zoom explained in the article.

Related:  88% of knowledge workers in Hong Kong use GenAI at work, a joint study finds. 
Tags: cybersecurityquantum safetyZoomZoom Video Communications
FutureCIO Editors

FutureCIO Editors

No Result
View All Result

Recent Posts

  • Ready to grow: upgrading ERP systems
  • OpenAI integrates voice AISG’s transcriber for Southeast Asian languages in its ASR system
  • Agoda launches AI-powered booking bot for simpler, faster, more intuitive CX
  • F5 accelerates AI security with integrated runtime protection for enterprise AI at scale
  • Forging Tomorrow: An APAC leader’s compass to the AI-native enterprise

Live Poll

Categories

  • AI and Machine Learning
  • Artificial Intelligence
  • Big Data, Analytics & Intelligence
  • Business Applications & Databases
  • Business-IT Alignment
  • Careers
  • Case Studies
  • CISO
  • CISO strategies
  • Cloud, Virtualization, Operating Environments and Middleware
  • Computer, Storage, Networks, Connectivity
  • Corporate Social Responsibility
  • Customer Experience / Engagement
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity operations
  • Data Protection
  • Education
  • Education
  • Finance
  • Finance & Insurance
  • FutureCISO
  • General
  • Governance, Risk and Compliance
  • Government and Public Services
  • Growth Strategies
  • Hospitality & Tourism
  • HR, education and Training
  • Industry Verticals
  • Infrastructure & Platforms
  • Insider threats
  • IT-OT integration
  • Latest Stories
  • Logistics & Transportation
  • Management Leadership
  • Manufacturing
  • Media and Telecommunications
  • News Stories
  • Operations
  • Opinion
  • Opinions
  • People
  • Process
  • Remote work
  • Retail & Wholesale
  • Sales & Marketing
  • Security
  • Sustainability
  • Tactics and Strategies
  • Technology
  • Utilities
  • Videos
  • Vulnerabilities and threats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCIO is about enabling the CIO, his team, the leadership and the enterprise through shared expertise, know-how and experience - through a community of shared interests and goals. It is also about discovering unknown best practices that will help realize new business models.

Quick Links

  • Videos
  • Resources
  • Subscribe
  • Contact

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

[wpli_login_link]

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe