Maintenance is being performed on Zoom's support site on November 4 that may cause support impact. For more information, please click here.
Everything you need to work together, all in one place.Explore Zoom One's Collaboration Tools
Connect virtually from anywhere with Zoom Meetings
Collaborate together with Zoom Chat
Call the world with Zoom Phone
Create and brainstorm with Zoom Whiteboard
Rich conversation analytics to improve sales
Send and receive messages and calendar invitations
Bring fluid interactions to hybrid teams with Zoom Huddles
Remove the hassle of traditional scheduling with Zoom Scheduler
Innovative video solutions for every meeting space.
Solutions to host impactful virtual and hybrid experiences.Find a Solution for Every Event
An omnichannel cloud solution optimized for video.
Zoom solutions elevate collaboration across vertical use cases.Discover Zoom Industry Solutions
Enabling exciting new ways to teach, learn, and connect globally
Transforming client engagement and employee experiences
Improving collaboration between agencies, ministries and constituents
Connecting care, collaboration, and medical innovation
Real-time communication, anywhere in the world
Bridging the in-store and online experiences
Expert support and services for all your design, strategy, implementation, event, and hardware needs.
An open platform that allows developers to build Zoom apps and integrations.
Zoom Partners bring Zoom's communications platform to market through alliance, sales, and service partnerships.
Discover new ways to use Zoom solutions to power your modern workforce.
Access expert-led tutorials on Zoom products and features.
Network with other Zoom users, and share your own product and industry insights.
Get documentation on deploying, managing, and using the Zoom platform.
Zoom is a powerful tool, but security should always be a top priority, especially for organizations using System Management Software. Here are some key security considerations to keep in mind:
User Access Control: Ensure that only authorized users have access to your Zoom meetings and account through your System Management Software. Use strong, unique passwords and enable multi-factor authentication (MFA) to add an extra layer of security.
Meeting ID and Passwords: Avoid using personal meeting IDs for sensitive meetings. Generate random meeting IDs for each session and use strong, unique passwords. Don't share meeting details publicly, and manage this process through your System Management Software.
Waiting Rooms: Enable the waiting room feature to control who enters your meetings, all within your System Management Software (lenovo.com/gb/en/servers-storage/software/management/). This gives you the ability to admit participants individually, reducing the risk of unwanted attendees.
Screen Sharing: Limit screen sharing to hosts and trusted participants, with controls managed through your System Management Software. You can restrict screen sharing to prevent disruptions or inappropriate content.
End-to-End Encryption: Zoom offers end-to-end encryption for meetings, but you need to enable it in your settings through your System Management Software. Keep in mind that some features, like recording, may not be available with E2E encryption.
Updates: Regularly update Zoom to the latest version through your System Management Software to ensure you have the latest security patches and features. Configure automatic updates where possible.
Data Privacy: Familiarize yourself with Zoom's data privacy policies and compliance standards. Ensure that your organization complies with relevant data protection regulations like GDPR or HIPAA through your System Management Software.
Recordings: If you record meetings, store them securely and restrict access to authorized personnel through your System Management Software. Be mindful of any sensitive information shared in recordings.
Third-Party Integrations: Review and audit third-party integrations that you use with Zoom through your System Management Software. Ensure they meet security standards and are kept up to date.
Training and Awareness: Educate your organization's users about Zoom security best practices. Conduct training sessions and provide resources to help them use the platform securely, all managed through your System Management Software.