4 Keys to Zoom Security

Logo
Presented by

Michael Watson, IR Collaborate Product Manager | Kate Daley, Content Marketing Manager

About this talk

Over the last 12 months Zoom has become one of the most popular collaboration tools, helping keep workforces connected and businesses in operation, becoming a household name almost overnight. And with that level of popularity came some very well publicized security issues – “Zoom-bombing” entered our vernacular, there were reports of data leaks, and privacy breaches. Zoom has taken big strides to address these issues, improving security to provide peace of mind, introducing a range of measures – like password protection, encryption, joining restrictions – and you can apply settings at various levels – accounts, groups and users. While this is both comforting – and necessary – the security settings are not exactly easy to manage or get visibility into. Do you actually know how secure your Zoom environment is? And, more importantly, what can you do to make sure that you’re ticking all your security boxes, and staying compliant with company policies or regulations? Join this session to learn the 4 keys to Zoom Security.
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (215)
Subscribers (24086)
The modern world relies on a complex array of technologies to keep turning. IR’s aim is to simplify that complexity. More than 1,000 organizations in over 60 countries rely on IR’s experience management solutions to optimize their business-critical systems. We provide insights, monitoring and support to keep payment hubs, unified communications ecosystems and contact centers running as they should. For further information on IR, visit www.ir.com.