Security
End-to-end Encryption
End-to-end encryption ensures that the data is encrypted by the sender, transmitted in encrypted form, and then decrypted by the intended recipient. No one in between, not even Zoho Meeting, can access the encrypted data. This ensures that the data ...
Multi Factor Authentication (MFA)
Secure your Zoho Meeting account further with multi-factor authentication (MFA). There are numerous authentication methods to choose from, as listed below. Common Options SMS-based OTP OTP authenticators Zoho OneAuth YubiKey (Hardware token) ...
Action Log Viewer
Action log viewer enables you to view and keep track of actions carried out in your organization for auditing and administration purposes. You can generate the logs for a specified time and range by applying filter parameters such as users, level, ...
Privacy Settings
Configure your privacy settings to manage the data that is collected and stored in Zoho Meeting. Right to Erasure You can choose to remove all data relating to a given user including their name, email address, action logs, and usage reports saved ...