Zoom

Ensuring the security of Zoom data when it is transferred between different environments

Ensuring the security of data when it is transferred between different environments is an important step in protecting sensitive information. Zoom offers several security measures that can be used to protect data when it is transferred between environments, such as encrypting data in transit and using secure file transfer protocols.
Loved by leading security teams around the world.

Ensuring the security of data when it is transferred between different environments is an important step in protecting sensitive information. Zoom offers several security measures that can be used to protect data when it is transferred between environments, such as encrypting data in transit and using secure file transfer protocols. This technical reference guide outlines the steps for ensuring the security of Zoom data when it is transferred between different environments.

Step 1: Enable encryption for data in transit

To ensure the security of data when it is transferred between environments, it is important to enable encryption for data in transit. Zoom offers several options for encrypting data in transit, including SSL/TLS and AES encryption. To enable encryption for data in transit in Zoom, follow these steps:

  • Sign in to the Zoom web portal as an administrator.
  • Click on the "Settings" icon in the top right corner of the screen, and then click "Security."
  • In the "Data Encryption" section, click the "Edit" button.
  • Follow the prompts to enable encryption for data in transit.

Step 2: Use secure file transfer protocols

To ensure the security of data when it is transferred between environments, it is also important to use secure file transfer protocols. Zoom supports several secure file transfer protocols, including SFTP and FTPS. To use a secure file transfer protocol with Zoom, follow these steps:

  • Install and set up a secure file transfer client, such as FileZilla or WinSCP.
  • Connect to your Zoom account using the secure file transfer protocol of your choice.

Step 3: Use access controls to restrict access to transferred data

In addition to encrypting data in transit and using secure file transfer protocols, it is also important to use access controls to restrict access to transferred data. Zoom offers several access controls that can be used to protect data, such as user permissions and password protection. To set up access controls in Zoom, follow these steps:

  • Sign in to the Zoom web portal as an administrator.
  • Click on the "Settings" icon in the top right corner of the screen, and then click "Security."
  • Follow the prompts to set up access controls for your Zoom account.

Ensuring the security of data when it is transferred between different environments is an important step in protecting sensitive information. By following the steps outlined in this technical reference guide, you can use encryption, secure file transfer protocols, and access controls to protect data when it is transferred between environments in Zoom.

Connect, Protect, Defend

Streamline your approach to security posture management throughout your entire company.
Get a Free Security Assessment
By installing or using the software, you acknowledge and agree to be bound by the Terms of Service.