• About
  • Subscribe
  • Contact
Saturday, July 12, 2025
    Login
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
No Result
View All Result
Home Technology

Zoom Workplace now includes post-quantum end-to-end encryption

FutureCIO Editors by FutureCIO Editors
June 10, 2024
Photo by Matilda Wormwood: https://www.pexels.com/photo/woman-in-blue-denim-jacket-using-macbook-pro-4099099/

Photo by Matilda Wormwood: https://www.pexels.com/photo/woman-in-blue-denim-jacket-using-macbook-pro-4099099/

Zoom Video Communications, Inc. announced the global availability of post-quantum end-to-end encryption (E2EE) for Zoom Workplace, specifically Zoom Meetings, making it the first unified communications-as-a-service company to offer a post-quantum E2EE solution for video conferencing. 

Michael Adams

Michael Adams, Zoom's chief information security officer, said, "With the launch of post-quantum E2EE, we are doubling down on security and providing leading-edge features for users to help protect their data. At Zoom, we continuously adapt as the security threat landscape evolves, with the goal of keeping our users protected."

Post-quantum E2E encryption

To prevent the "harvest now, decrypt later" scenario to capture encrypted traffic in the present, intending to decrypt it in the future when quantum computers have become more advanced, Zoom's offering uses public key cryptography to mitigate potential future threats.

The participants' machines, not servers from Zoom, generate the keys for each Zoom meeting. Zoom explained on its website, "Encrypted data relayed through Zoom's servers is indecipherable by Zoom since Zoom's servers do not have the necessary decryption key. This key management strategy is similar to most E2EE messaging platforms today."

Limited functionality

Zoom further explained that E2EE can enhance privacy and data protection and serve as an additional layer of risk mitigation and protection of sensitive meeting content.

However, enabling Zoom's E2EE in meetings turns off features such as joining before the host, cloud recording, Zoom Whiteboard, AI Companion features, streaming, live transcription, and polling.

"Individual Zoom users should determine whether they need these features before enabling E2EE in their meetings," Zoom explained in the article.

Related:  Podchats for FutureCIO: Simplifying the story of data management
Tags: cybersecurityquantum safetyZoomZoom Video Communications
FutureCIO Editors

FutureCIO Editors

No Result
View All Result

Recent Posts

  • Study finds Singapore invests in AI but businesses struggle to scale
  • Qlik releases Trust Score for AI in Talend Cloud
  • New ABB circuit breaker aims to enhance AI data centres and advanced manufacturing resilience
  • Alibaba Cloud marks 10 years of operations in Singapore with new infrastructure investments
  • Digital Realty highlights advancements in sustainability goals in new report

Live Poll

Categories

  • Big Data, Analytics & Intelligence
  • Business Applications & Databases
  • Business-IT Alignment
  • Careers
  • Case Studies
  • CISO
  • CISO strategies
  • Cloud, Virtualization, Operating Environments and Middleware
  • Computer, Storage, Networks, Connectivity
  • Corporate Social Responsibility
  • Customer Experience / Engagement
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity operations
  • Education
  • Education
  • Finance
  • Finance & Insurance
  • FutureCISO
  • General
  • Governance, Risk and Compliance
  • Government and Public Services
  • Growth Strategies
  • Hospitality & Tourism
  • HR, education and Training
  • Industry Verticals
  • Infrastructure & Platforms
  • Insider threats
  • Latest Stories
  • Logistics & Transportation
  • Management Leadership
  • Manufacturing
  • Media and Telecommunications
  • News Stories
  • Operations
  • Opinion
  • Opinions
  • People
  • Process
  • Remote work
  • Retail & Wholesale
  • Sales & Marketing
  • Security
  • Tactics and Strategies
  • Technology
  • Utilities
  • Videos
  • Vulnerabilities and threats
  • White Papers
Show More

Strategic Insights for Chief Information Officers

FutureCIO is about enabling the CIO, his team, the leadership and the enterprise through shared expertise, know-how and experience - through a community of shared interests and goals. It is also about discovering unknown best practices that will help realize new business models.

Quick Links

  • Videos
  • Resources
  • Subscribe
  • Contact

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

Select Category
    • Privacy Policy
    • Terms of Use
    • Cookie Policy

    Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

    Login to your account below

    or

    Not a member yet? Register here

    Forgotten Password?

    Fill the forms bellow to register

    All fields are required. Log In

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In
    No Result
    View All Result
    • Management Leadership
      • Growth Strategies
      • Finance
      • Operations
      • Sales and Marketing
      • Careers
    • Technology
      • Infrastructure and Platforms
      • Business Applications and Databases
      • Big Data, Analytics and Intelligence
      • Security
    • Industry Verticals
      • Finance and Insurance
      • Manufacturing
      • Logistics and Transportation
      • Retail and Wholesale
      • Hospitality and Tourism
      • Government and Public Services
      • Utilities
      • Media and Telecommunications
    • Resources
      • Whitepapers
      • PodChats
      • Videos
    • Events
    Login

    Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

    Subscribe