Zoom Technical Requirements
Zoom manages bandwidth proactively on a per-connection basis. For example if one participant is on a poor connection, their view will be scaled down from High Definition without affecting any other users in the meeting. Typical bandwidth requirements are outlined in the following table:
|High Quality one-to-one||600 kbps|
|High Definition one-to-one||1.2 Mbps|
|High Quality Group||1.2 Mbps|
|High Definition Group||1.5 Mbps|
|With video thumbnail||50 – 150 kpbs|
|Without video thumbnail||50 – 75 kbps|
|Voice over IP (through computer speakers)||60-80 kbps|
Zoom offers a multi-level Security model. From the basics of Scheduling to secure Infrastructure hosting, your privacy and confidentiality are of the highest importance.
1. Secure Scheduling
There are a couple features you can access when you’re scheduling your meeting to make it more secure.
Password Protection: password protect your meetings by clicking “Require meeting password” and entering an alphanumeric password when you schedule your meeting. The password is automatically populated in the calendar invitation. This means that only people with both the meeting ID and password can join your meeting.
2. In-Meeting Security Options
Locked Zoom Meeting: The meeting host has a variety of controls they can use to secure their meeting. For example,
Lock the Meeting: when you’re in the meeting, click Participants at the bottom of your Zoom window. In the participants pop-up box, you will see a button that says Lock Meeting. When you lock the meeting, no new participants can join, even if they have the meeting ID and password.
Expel a Participant: still in that participants menu, you can mouse over a participant’s name, and several options will appear, including Remove. Click that to kick a participant out of the meeting. They can’t get back in if you then click Lock Meeting.
Attendee On-Hold: if you need a private moment, you can put attendees on-hold. The attendee’s video and audio connections will be disabled momentarily. Click on the attendee’s video thumbnail and select Start Attendee On-Hold to activate this feature.
Other host controls include locking screen-sharing, enabling/disabling participant recording, and disabling in-meeting chat.
3. Built-In Security Zoom Features
Good news! All Zoom meetings are also protected by multiple security layers with flexible controls.
Cloud Infrastructure: Zoom meetings run on our highly reliable, scalable, secure infrastructure platform in the cloud. A distributed network of low-latency multimedia routers resides on Zoom’s communications infrastructure. All session data originating from the host’s device and arriving at the participants’ devices is dynamically switched — never stored persistently.
Encryption: Zoom secures session content by encrypting the web communications channel to https://zoom.us. Zoom also supports SSL/TLS (port 443) network-layer communications between the Zoom app and the multimedia router, as well as NIST AES 128 application-layer encryption.
Post-Meeting Security: Once the meeting is over, no session information is retained on the Zoom routers or on any participant’s devices. If a meeting is recorded, the recording is located on that customer’s local machine. Zoom communications infrastructure does not store any recorded content.