{"id":25575,"date":"2022-12-21T15:48:53","date_gmt":"2022-12-21T15:48:53","guid":{"rendered":"\/gb\/en\/blog\/?p=25575"},"modified":"2025-10-29T20:14:40","modified_gmt":"2025-10-29T20:14:40","slug":"what-is-end-to-end-encryption","status":"publish","type":"post","link":"\/gb\/en\/blog\/what-is-end-to-end-encryption\/","title":{"rendered":"End-to-End Encryption: What It Is and Why It Matters"},"content":{"rendered":"<p class=\"p1\">As video conferencing continues to grow in importance for businesses, end-to-end encryption has never been a more critical feature for securing this communication channel. You need to have confidence in your <a href=\"https:\/\/www.ringcentral.com\/gb\/en\/video.html\">video conferencing<\/a> and overall collaboration solutions. Are they always available? And are they \u201csecurely available\u201d? And are your communications themselves available to you and your teams\u2026and no one else?<\/p>\n<p class=\"p1\"><b>End-to-end encryption (E2EE)<\/b> is the next step in secure communications. But what is E2EE, exactly? How does it secure messaging, video and phone communications? What does it protect against? And who can access these E2EE communications? Let\u2019s find out.<\/p>\n<p class=\"p1\">In this article, we\u2019ll cover:<\/p>\n<ul class=\"ul1\">\n<li class=\"li2\"><a href=\"#what\"><span class=\"s1\"><span class=\"s2\">What is end-to-end encryption?<\/span><\/span><\/a><span class=\"s3\"><br \/>\n<\/span><\/li>\n<li class=\"li2\"><a href=\"#how\"><span class=\"s1\"><span class=\"s2\">How does end-to-end encryption work?<\/span><\/span><\/a><span class=\"s3\"><br \/>\n<\/span><\/li>\n<li class=\"li2\"><a href=\"#benefits\"><span class=\"s1\"><span class=\"s2\">The top benefits of E2EE for cloud communications<\/span><\/span><\/a><span class=\"s3\"><br \/>\n<\/span><\/li>\n<li class=\"li2\"><a href=\"#point\"><span class=\"s1\"><span class=\"s2\">End-to-end vs point-to-point encryption<\/span><\/span><\/a><span class=\"s3\"><br \/>\n<\/span><\/li>\n<li class=\"li2\"><a href=\"#right\"><span class=\"s1\"><span class=\"s2\">How to choose the right encryption for your business communications<\/span><\/span><\/a><span class=\"s3\"><br \/>\n<\/span><\/li>\n<li><a href=\"#soon\">What&#8217;s coming soon?<\/a><\/li>\n<\/ul>\n<h2 id=\"what\" class=\"p3\"><b>What is end-to-end encryption (E2EE)?<\/b><\/h2>\n<p class=\"p1\"><b>End-to-end encryption (E2EE)<\/b> is a powerful security and privacy control that ensures your online meeting contents are confidential and secure. E2EE provides privacy for privileged conversations as well as security protection against third-party intrusion and cyber attacks.<\/p>\n<h2 id=\"how\" class=\"p3\"><b>How does end-to-end encryption work?<\/b><\/h2>\n<p class=\"p1\">End-to-end encryption (E2EE) technology prevents any unauthorised third party from accessing users\u2019 communications. With E2EE, the endpoints (sender and receiver) are able to establish encryption keys without the involvement of any intermediaries. The endpoints can then use these keys to encrypt (and decrypt) data, as seen in this diagram:<\/p>\n<p class=\"p1\"><img decoding=\"async\" class=\"aligncenter wp-image-24976 size-full\" src=\"\/gb\/en\/blog\/wp-content\/uploads\/2022\/12\/E2EEUK3.jpg\" alt=\"end to end encryption diagram. showing the path from sender to receiver \" width=\"2048\" height=\"1365\" \/><\/p>\n<h2 id=\"benefits\" class=\"p1\"><b>2 major benefits of E2EE for cloud communications<\/b><\/h2>\n<p class=\"p2\">For video meetings where you want total privacy and data security, E2EE adds an extra layer to mitigate risk and shield sensitive information.<\/p>\n<p class=\"p2\">As a result, there are two really important benefits that E2EE provides for video conferencing:<\/p>\n<h3 class=\"p2\">1. Confidentiality (Protection against eavesdropping)<\/h3>\n<p class=\"p2\">With E2EE, data is encrypted the entire time it traverses the provider\u2019s network. Because only participants can decrypt the communications, bad actors at the provider\u2019s side, or anywhere in between, can\u2019t eavesdrop on your communications.<\/p>\n<h3 class=\"p2\">2. Integrity (Protection against modification)<\/h3>\n<p class=\"p2\">With E2EE, if someone tries to modify or tamper with your communications, you will know because they won\u2019t decrypt properly.<\/p>\n<p><span style=\"font-weight: 400;\">\r\n\t\r\n\t<div class=\"rc-post-content-cta rc-post-content-cta_orange\">\r\n\t\t<div class=\"rc-post-content-cta-columns\">\r\n\t\t\t<div class=\"bottom-cta-img\">\r\n\t\t\t\t<img decoding=\"async\" width=\"805\" height=\"424\" src=\"\/gb\/en\/blog\/wp-content\/uploads\/2022\/08\/Infrastructure-security.png\" class=\"responsive-image\" alt=\"A diagram showing how RingCentral security infrastructure works\" srcset=\"\/gb\/en\/blog\/wp-content\/uploads\/2022\/08\/Infrastructure-security.png 805w, \/gb\/en\/blog\/wp-content\/uploads\/2022\/08\/Infrastructure-security-300x158.png 300w, \/gb\/en\/blog\/wp-content\/uploads\/2022\/08\/Infrastructure-security-640x337.png 640w, \/gb\/en\/blog\/wp-content\/uploads\/2022\/08\/Infrastructure-security-768x405.png 768w, \/gb\/en\/blog\/wp-content\/uploads\/2022\/08\/Infrastructure-security-790x415.png 790w, \/gb\/en\/blog\/wp-content\/uploads\/2022\/08\/Infrastructure-security-376x198.png 376w\" sizes=\"(max-width: 805px) 100vw, 805px\" \/>\t\t\t<\/div>\r\n\t\t\t<div class=\"bottom-cta-copy\">\r\n\t\t\t\t<div class=\"headline-copy\" style=\"text-align:left;\">Looking for a UCaaS provider you can trust?\u00a0Get the CIO&#8217;s Guide to Cloud Communications Security<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t\t\t<div class=\"rc-post-content-cta-footer\">\r\n\t\t\t<div class=\"bottom-cta-logo-container\">\r\n\t\t\t\t<div class=\"bottom-cta-logo\"><span aria-hidden=\"true\"><svg width=\"154\" height=\"34\" viewBox=\"0 0 154 34\"\r\n\t\t\t\t\t\t\tfill=\"#000\" role=\"img\" aria-labelledby=\"cta-ring-logo-1918782220\"\r\n\t\t\t\t\t\t\txmlns=\"http:\/\/www.w3.org\/2000\/svg\">\r\n\t\t\t\t\t\t\t<title id=\"cta-ring-logo-1918782220\">Ring Central Logo<\/title>\r\n\t\t\t\t\t\t\t<path d=\"M154 3.89618H150.386V26.9657H154V3.89618Z\" \/>\r\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\t\t\td=\"M141.313 11.6299C137.976 11.6299 135.388 13.2501 134.95 16.5546H138.504C138.754 15.3082 139.675 14.5591 141.313 14.5591C143.214 14.5591 144.086 15.6499 144.086 17.3647V18.1444H140.438C137.078 18.1444 134.593 19.6411 134.593 22.697C134.593 25.7529 136.619 27.3411 139.55 27.3411C141.826 27.3411 143.323 26.3721 144.133 24.8145H144.288V26.9529H147.716V17.4802C147.702 13.8276 145.833 11.6299 141.313 11.6299ZM140.58 24.5675C139.177 24.5675 138.303 23.8809 138.303 22.7339C138.303 21.4233 139.238 20.7383 140.921 20.7383H144.069L144.086 20.9549C144.088 23.2232 142.777 24.5675 140.58 24.5675Z\" \/>\r\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\t\t\td=\"M128.187 26.9657V19.2047C128.187 16.8979 129.623 15.4317 131.896 15.4317H133.321V12.0036H131.854C130.14 12.0036 128.893 12.6581 128.114 14.1243H127.988V12.0036H124.591V26.9753L128.187 26.9657Z\" \/>\r\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\t\t\td=\"M122.295 23.6627V26.9657H119.833C116.371 26.9657 114.47 25.3615 114.47 21.8997V14.9729H112.008V12.0036H114.47V8.03009H118.088V12.002H122.295V14.9713H118.088V21.4794C118.088 22.851 118.898 23.6611 120.269 23.6611H122.295V23.6627Z\" \/>\r\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\t\t\td=\"M100.161 26.9657V18.3C100.161 16.1793 101.472 14.7917 103.589 14.7917C105.615 14.7917 106.831 15.9627 106.831 18.2535V26.9657H110.452V17.6776C110.452 13.9046 108.618 11.6299 104.872 11.6299C102.593 11.6299 100.851 12.6565 100.073 14.0586H99.9444V12.0036H96.5548V26.9753L100.161 26.9657Z\" \/>\r\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\t\t\td=\"M86.8688 24.3814C84.5925 24.3814 83.0638 22.8542 83.0028 20.4528H94.0699L94.0539 19.2833C94.0539 14.2655 90.8119 11.6443 86.8512 11.6443C82.5729 11.6443 79.448 14.7002 79.448 19.4999C79.448 24.2996 82.3483 27.3555 86.8512 27.3555C90.6226 27.3555 93.085 25.3599 93.802 22.4291H90.2986C89.9103 23.5536 88.9559 24.3814 86.8688 24.3814ZM86.8544 14.6377C89.2222 14.6377 90.6258 15.9787 90.7204 17.8492H82.99C83.3317 15.9483 84.4834 14.6377 86.8544 14.6377Z\" \/>\r\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\t\t\td=\"M68.631 27.3732C74.0243 27.3732 77.0802 24.3814 77.7973 19.9395H74.1301C73.5863 21.9655 72.1105 23.836 68.6294 23.836C65.0457 23.836 62.1759 21.3912 62.1759 16.0413C62.1759 10.6914 65.0457 8.2531 68.6294 8.2531C72.2132 8.2531 73.6505 10.1236 74.1301 12.1191H77.7973C77.2037 7.6756 74.1943 4.7865 68.631 4.7865C62.6459 4.7865 58.313 8.96375 58.313 16.0927C58.313 23.2216 62.6459 27.3988 68.631 27.3988V27.3732Z\" \/>\r\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\t\t\td=\"M52.437 12.0036V14.0569H52.2654C51.4553 12.6244 49.7725 11.6282 47.3759 11.6282C43.8676 11.6282 40.7057 14.4034 40.7057 19.2978C40.7057 24.1921 43.8226 26.9978 47.3759 26.9978C49.6827 26.9978 51.043 26.0593 52.0841 24.4712H52.2493V27.625C52.2493 29.3078 51.3141 30.0874 49.7869 30.0874H42.4543V33.3085H49.718C53.7396 33.3085 55.8908 31.0627 55.8908 27.3844V12.0036H52.437ZM48.3689 23.7237C45.9674 23.7237 44.4402 22.2302 44.4402 19.2994C44.4402 16.3685 45.953 14.8719 48.3689 14.8719C50.7061 14.8719 52.2654 16.3653 52.2654 19.2994C52.2654 22.2334 50.7222 23.7237 48.3689 23.7237Z\" \/>\r\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\t\t\td=\"M28.2125 26.9657V18.3C28.2125 16.1793 29.5231 14.7917 31.6438 14.7917C33.6698 14.7917 34.8858 15.9627 34.8858 18.2535V26.9657H38.5V17.6776C38.5 13.9046 36.6664 11.6299 32.9207 11.6299C30.6444 11.6299 28.8846 12.6565 28.105 14.0586H27.9799V12.0036H24.5967V26.9753L28.2125 26.9657Z\" \/>\r\n\t\t\t\t\t\t\t<path d=\"M21.5423 12.0036H17.9282V26.9673H21.5423V12.0036Z\" \/>\r\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\t\t\td=\"M11.6302 16.6477V16.5017C13.8424 15.8905 15.339 14.4051 15.339 11.0684C15.339 7.64031 12.782 5.14423 8.04169 5.14423H0V26.9657H3.73931V18.3H8.29354C10.4143 18.3 11.4746 19.3604 11.4746 21.4811V26.9817H15.2139V21.4811C15.2139 18.3946 13.9033 17.1482 11.6302 16.6477ZM7.84117 14.9329H3.73931V8.51618H7.83956C9.86562 8.51618 11.4233 9.35998 11.4233 11.7277C11.4233 14.0955 9.85119 14.9329 7.84117 14.9329Z\" \/>\r\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\t\t\td=\"M19.7329 9.60219C20.2077 9.60219 20.6729 9.46262 21.0676 9.19794C21.4638 8.93485 21.7718 8.55948 21.9531 8.11994C22.1359 7.68039 22.1824 7.19754 22.091 6.73233C21.998 6.26552 21.7702 5.83721 21.4333 5.50194C21.0964 5.16506 20.6697 4.93727 20.2029 4.84423C19.7361 4.75119 19.2532 4.79931 18.8153 4.98219C18.3758 5.16506 18.002 5.47306 17.7373 5.86769C17.4742 6.26231 17.333 6.72752 17.3347 7.20235C17.3298 7.67879 17.4694 8.144 17.7325 8.54023C17.9956 8.93646 18.3726 9.24446 18.8137 9.42412C19.1041 9.54604 19.4169 9.6054 19.7329 9.60219Z\" \/>\r\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\t\t\td=\"M16.9769 0.548269C16.101 0.914019 15.307 1.44981 14.6364 2.12196L16.332 3.81756C16.7764 3.37 17.3041 3.01548 17.8865 2.77325C18.4688 2.53102 19.0928 2.40429 19.7232 2.40269C20.3537 2.40108 20.9777 2.523 21.5616 2.76362C22.1439 3.00264 22.6749 3.35556 23.1225 3.79991L24.8181 2.10431C23.8106 1.1001 22.5289 0.415123 21.1333 0.139206C19.7377 -0.139919 18.2907 0.00285184 16.9769 0.548269Z\" \/>\r\n\t\t\t\t\t\t<\/svg><\/span><\/div>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"bottom-cta-link\">\r\n\t\t\t\t<a href=\"https:\/\/assets.ringcentral.com\/uk\/guide\/security-ciso-guide.pdf\" class=\"view-all view-all-brown\" target=\"_blank\"\r\n\t\t\t\t\trel=\"noopener noreferrer\" data-dl-name=\"Download the guide\" data-dl-element=\"button\"\r\n\t\t\t\t\tdata-dl-additional-info=\"bottom cta banner\" data-no-auto-dl=\"true\">Download the guide\t\t\t\t\t<span class=\"svg-icon\" aria-hidden=\"true\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"\r\n\t\t\t\t\t\t\tfill=\"#000\" role=\"img\" aria-labelledby=\"cta-ring-arrow-1918782220\"\r\n\t\t\t\t\t\t\txmlns=\"http:\/\/www.w3.org\/2000\/svg\">\r\n\t\t\t\t\t<title id=\"cta-ring-arrow-1918782220\">Ring Central Logo<\/title>\r\n\t\t\t\t\t<path\r\n\t\t\t\t\t\td=\"M0 11.5C0 11.2239 0.223858 11 0.5 11H21.6797C21.9559 11 22.1797 11.2239 22.1797 11.5V12.5C22.1797 12.7761 21.9559 13 21.6797 13H0.5C0.223858 13 0 12.7761 0 12.5V11.5Z\"><\/path>\r\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\td=\"M21.1718 12.0001L15.8086 6.63691C15.6134 6.44165 15.6134 6.12506 15.8086 5.9298L16.5157 5.22269C16.711 5.02743 17.0276 5.02743 17.2228 5.22269L23.6467 11.6465C23.8419 11.8418 23.8419 12.1584 23.6467 12.3536L17.2228 18.7775C17.0276 18.9727 16.711 18.9727 16.5157 18.7775L15.8086 18.0704C15.6134 17.8751 15.6134 17.5585 15.8086 17.3633L21.1718 12.0001Z\"><\/path>\r\n\t\t\t\t<\/svg><\/span><\/a>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n\r\n\t<\/span><\/p>\n<h2 id=\"point\" class=\"p1\"><b>End-to-end vs point-to-point encryption (P2P)<\/b><\/h2>\n<p class=\"p2\">Encryption of data in transit, over public and private networks, uses industry standard protocols to set up encrypted channels to protect data in transit between two points (known as point-to-point (P2P) encryption).<\/p>\n<p class=\"p2\">When used with standard protocols such as TLS, SRTP, even HTTP\/S, P2P encrypted channels are established between two systems, such as the application used by the video participants and the video provider\u2019s processing systems.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-24976 size-full\" src=\"\/gb\/en\/blog\/wp-content\/uploads\/2022\/12\/E2EEUK8.jpg\" alt=\"data in transition diagram showing the path from sender to receiver\" width=\"2048\" height=\"1365\" \/><\/p>\n<h3><b>Point-to-point<\/b> <b>data-in-transit encryption:<\/b><\/h3>\n<ol class=\"ol1\">\n<li class=\"li1\">The sender\u2019s channel <b>encrypts data <\/b>to send to the provider (the video provider).<\/li>\n<li class=\"li1\">The receiver\u2018s channel<b> decrypts data <\/b>received from the sender.<\/li>\n<li class=\"li1\">The receiver (video provider) processes (unencrypted) information.<\/li>\n<li class=\"li1\">The receiver\u2019s channel <b>encrypts data<\/b> to send to the sender.<\/li>\n<li class=\"li1\">The sender\u2019s channel <b>decrypts data<\/b> received from the receiver (the video provider).<\/li>\n<\/ol>\n<h3 class=\"p1\"><b>End-to-end encryption:<\/b><\/h3>\n<ol class=\"ol1\">\n<li class=\"li1\">The sender\u2019s channel <b>encrypts data <\/b>to send to other participants via the video provider.<\/li>\n<li class=\"li1\">The video provider processes <b>encrypted<\/b> information.<\/li>\n<li class=\"li1\">Other participant\u2018s channels<b> decrypts data <\/b>received from the sender.<\/li>\n<\/ol>\n<p class=\"p1\">P2P solutions result in the video conferencing provider setting up a P2P channel with each video conference participant. If there are 17 participants, the video conference provider has 17 P2P channels to manage with full access to all communications across these 17 channels.<\/p>\n<p class=\"p1\">This allows the video provider to provide additional features, such as virtual backgrounds, meeting transcription and closed captioning and chat translation of the decrypted \u201din the clear\u201d communications.<\/p>\n<p class=\"p1\">E2EE is different from standard encryption. With standard encryption, which is on by default, data in transit is encrypted using Transport Layer Security (TLS), and data at rest is encrypted with AES-256. Additionally, with standard encryption, RingCentral is able to provide additional benefits to enhance the communications to make a richer user experience \u2013 such as recordings, AI transcripts, whiteboards and much more.<\/p>\n<p class=\"p1\">With E2EE enabled, RingCentral cannot offer these enhanced experiences but in exchange provides the utmost privacy and security for an organisation\u2019s communications.<\/p>\n<p><span style=\"font-weight: 400;\">\r\n\t\r\n\t<div class=\"rc-post-content-cta rc-post-content-cta_green\">\r\n\t\t<div class=\"rc-post-content-cta-columns\">\r\n\t\t\t<div class=\"bottom-cta-img\">\r\n\t\t\t\t<img decoding=\"async\" width=\"1199\" height=\"629\" src=\"\/gb\/en\/blog\/wp-content\/uploads\/2022\/09\/Cloud-Connector-Abstract.png\" class=\"responsive-image\" alt=\"Cloud Connector Abstract-995\" srcset=\"\/gb\/en\/blog\/wp-content\/uploads\/2022\/09\/Cloud-Connector-Abstract.png 1199w, \/gb\/en\/blog\/wp-content\/uploads\/2022\/09\/Cloud-Connector-Abstract-300x157.png 300w, \/gb\/en\/blog\/wp-content\/uploads\/2022\/09\/Cloud-Connector-Abstract-640x336.png 640w, \/gb\/en\/blog\/wp-content\/uploads\/2022\/09\/Cloud-Connector-Abstract-768x403.png 768w, \/gb\/en\/blog\/wp-content\/uploads\/2022\/09\/Cloud-Connector-Abstract-790x415.png 790w, \/gb\/en\/blog\/wp-content\/uploads\/2022\/09\/Cloud-Connector-Abstract-376x198.png 376w\" sizes=\"(max-width: 1199px) 100vw, 1199px\" \/>\t\t\t<\/div>\r\n\t\t\t<div class=\"bottom-cta-copy\">\r\n\t\t\t\t<div class=\"headline-copy\" style=\"text-align:left;\">Learn even more about security and privacy with RingCentral<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t\t\t<div class=\"rc-post-content-cta-footer\">\r\n\t\t\t<div class=\"bottom-cta-logo-container\">\r\n\t\t\t\t<div class=\"bottom-cta-logo\"><span aria-hidden=\"true\"><svg width=\"154\" height=\"34\" viewBox=\"0 0 154 34\"\r\n\t\t\t\t\t\t\tfill=\"#000\" role=\"img\" aria-labelledby=\"cta-ring-logo-676461462\"\r\n\t\t\t\t\t\t\txmlns=\"http:\/\/www.w3.org\/2000\/svg\">\r\n\t\t\t\t\t\t\t<title id=\"cta-ring-logo-676461462\">Ring Central Logo<\/title>\r\n\t\t\t\t\t\t\t<path d=\"M154 3.89618H150.386V26.9657H154V3.89618Z\" \/>\r\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\t\t\td=\"M141.313 11.6299C137.976 11.6299 135.388 13.2501 134.95 16.5546H138.504C138.754 15.3082 139.675 14.5591 141.313 14.5591C143.214 14.5591 144.086 15.6499 144.086 17.3647V18.1444H140.438C137.078 18.1444 134.593 19.6411 134.593 22.697C134.593 25.7529 136.619 27.3411 139.55 27.3411C141.826 27.3411 143.323 26.3721 144.133 24.8145H144.288V26.9529H147.716V17.4802C147.702 13.8276 145.833 11.6299 141.313 11.6299ZM140.58 24.5675C139.177 24.5675 138.303 23.8809 138.303 22.7339C138.303 21.4233 139.238 20.7383 140.921 20.7383H144.069L144.086 20.9549C144.088 23.2232 142.777 24.5675 140.58 24.5675Z\" \/>\r\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\t\t\td=\"M128.187 26.9657V19.2047C128.187 16.8979 129.623 15.4317 131.896 15.4317H133.321V12.0036H131.854C130.14 12.0036 128.893 12.6581 128.114 14.1243H127.988V12.0036H124.591V26.9753L128.187 26.9657Z\" \/>\r\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\t\t\td=\"M122.295 23.6627V26.9657H119.833C116.371 26.9657 114.47 25.3615 114.47 21.8997V14.9729H112.008V12.0036H114.47V8.03009H118.088V12.002H122.295V14.9713H118.088V21.4794C118.088 22.851 118.898 23.6611 120.269 23.6611H122.295V23.6627Z\" \/>\r\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\t\t\td=\"M100.161 26.9657V18.3C100.161 16.1793 101.472 14.7917 103.589 14.7917C105.615 14.7917 106.831 15.9627 106.831 18.2535V26.9657H110.452V17.6776C110.452 13.9046 108.618 11.6299 104.872 11.6299C102.593 11.6299 100.851 12.6565 100.073 14.0586H99.9444V12.0036H96.5548V26.9753L100.161 26.9657Z\" \/>\r\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\t\t\td=\"M86.8688 24.3814C84.5925 24.3814 83.0638 22.8542 83.0028 20.4528H94.0699L94.0539 19.2833C94.0539 14.2655 90.8119 11.6443 86.8512 11.6443C82.5729 11.6443 79.448 14.7002 79.448 19.4999C79.448 24.2996 82.3483 27.3555 86.8512 27.3555C90.6226 27.3555 93.085 25.3599 93.802 22.4291H90.2986C89.9103 23.5536 88.9559 24.3814 86.8688 24.3814ZM86.8544 14.6377C89.2222 14.6377 90.6258 15.9787 90.7204 17.8492H82.99C83.3317 15.9483 84.4834 14.6377 86.8544 14.6377Z\" \/>\r\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\t\t\td=\"M68.631 27.3732C74.0243 27.3732 77.0802 24.3814 77.7973 19.9395H74.1301C73.5863 21.9655 72.1105 23.836 68.6294 23.836C65.0457 23.836 62.1759 21.3912 62.1759 16.0413C62.1759 10.6914 65.0457 8.2531 68.6294 8.2531C72.2132 8.2531 73.6505 10.1236 74.1301 12.1191H77.7973C77.2037 7.6756 74.1943 4.7865 68.631 4.7865C62.6459 4.7865 58.313 8.96375 58.313 16.0927C58.313 23.2216 62.6459 27.3988 68.631 27.3988V27.3732Z\" \/>\r\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\t\t\td=\"M52.437 12.0036V14.0569H52.2654C51.4553 12.6244 49.7725 11.6282 47.3759 11.6282C43.8676 11.6282 40.7057 14.4034 40.7057 19.2978C40.7057 24.1921 43.8226 26.9978 47.3759 26.9978C49.6827 26.9978 51.043 26.0593 52.0841 24.4712H52.2493V27.625C52.2493 29.3078 51.3141 30.0874 49.7869 30.0874H42.4543V33.3085H49.718C53.7396 33.3085 55.8908 31.0627 55.8908 27.3844V12.0036H52.437ZM48.3689 23.7237C45.9674 23.7237 44.4402 22.2302 44.4402 19.2994C44.4402 16.3685 45.953 14.8719 48.3689 14.8719C50.7061 14.8719 52.2654 16.3653 52.2654 19.2994C52.2654 22.2334 50.7222 23.7237 48.3689 23.7237Z\" \/>\r\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\t\t\td=\"M28.2125 26.9657V18.3C28.2125 16.1793 29.5231 14.7917 31.6438 14.7917C33.6698 14.7917 34.8858 15.9627 34.8858 18.2535V26.9657H38.5V17.6776C38.5 13.9046 36.6664 11.6299 32.9207 11.6299C30.6444 11.6299 28.8846 12.6565 28.105 14.0586H27.9799V12.0036H24.5967V26.9753L28.2125 26.9657Z\" \/>\r\n\t\t\t\t\t\t\t<path d=\"M21.5423 12.0036H17.9282V26.9673H21.5423V12.0036Z\" \/>\r\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\t\t\td=\"M11.6302 16.6477V16.5017C13.8424 15.8905 15.339 14.4051 15.339 11.0684C15.339 7.64031 12.782 5.14423 8.04169 5.14423H0V26.9657H3.73931V18.3H8.29354C10.4143 18.3 11.4746 19.3604 11.4746 21.4811V26.9817H15.2139V21.4811C15.2139 18.3946 13.9033 17.1482 11.6302 16.6477ZM7.84117 14.9329H3.73931V8.51618H7.83956C9.86562 8.51618 11.4233 9.35998 11.4233 11.7277C11.4233 14.0955 9.85119 14.9329 7.84117 14.9329Z\" \/>\r\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\t\t\td=\"M19.7329 9.60219C20.2077 9.60219 20.6729 9.46262 21.0676 9.19794C21.4638 8.93485 21.7718 8.55948 21.9531 8.11994C22.1359 7.68039 22.1824 7.19754 22.091 6.73233C21.998 6.26552 21.7702 5.83721 21.4333 5.50194C21.0964 5.16506 20.6697 4.93727 20.2029 4.84423C19.7361 4.75119 19.2532 4.79931 18.8153 4.98219C18.3758 5.16506 18.002 5.47306 17.7373 5.86769C17.4742 6.26231 17.333 6.72752 17.3347 7.20235C17.3298 7.67879 17.4694 8.144 17.7325 8.54023C17.9956 8.93646 18.3726 9.24446 18.8137 9.42412C19.1041 9.54604 19.4169 9.6054 19.7329 9.60219Z\" \/>\r\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\t\t\td=\"M16.9769 0.548269C16.101 0.914019 15.307 1.44981 14.6364 2.12196L16.332 3.81756C16.7764 3.37 17.3041 3.01548 17.8865 2.77325C18.4688 2.53102 19.0928 2.40429 19.7232 2.40269C20.3537 2.40108 20.9777 2.523 21.5616 2.76362C22.1439 3.00264 22.6749 3.35556 23.1225 3.79991L24.8181 2.10431C23.8106 1.1001 22.5289 0.415123 21.1333 0.139206C19.7377 -0.139919 18.2907 0.00285184 16.9769 0.548269Z\" \/>\r\n\t\t\t\t\t\t<\/svg><\/span><\/div>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"bottom-cta-link\">\r\n\t\t\t\t<a href=\"https:\/\/www.ringcentral.com\/gb\/en\/trust-centre.html\" class=\"view-all view-all-white \" target=\"_blank\"\r\n\t\t\t\t\trel=\"noopener noreferrer\" data-dl-name=\"Go to our trust centre\" data-dl-element=\"button\"\r\n\t\t\t\t\tdata-dl-additional-info=\"bottom cta banner\" data-no-auto-dl=\"true\">Go to our trust centre\t\t\t\t\t<span class=\"svg-icon\" aria-hidden=\"true\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"\r\n\t\t\t\t\t\t\tfill=\"#000\" role=\"img\" aria-labelledby=\"cta-ring-arrow-676461462\"\r\n\t\t\t\t\t\t\txmlns=\"http:\/\/www.w3.org\/2000\/svg\">\r\n\t\t\t\t\t<title id=\"cta-ring-arrow-676461462\">Ring Central Logo<\/title>\r\n\t\t\t\t\t<path\r\n\t\t\t\t\t\td=\"M0 11.5C0 11.2239 0.223858 11 0.5 11H21.6797C21.9559 11 22.1797 11.2239 22.1797 11.5V12.5C22.1797 12.7761 21.9559 13 21.6797 13H0.5C0.223858 13 0 12.7761 0 12.5V11.5Z\"><\/path>\r\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\td=\"M21.1718 12.0001L15.8086 6.63691C15.6134 6.44165 15.6134 6.12506 15.8086 5.9298L16.5157 5.22269C16.711 5.02743 17.0276 5.02743 17.2228 5.22269L23.6467 11.6465C23.8419 11.8418 23.8419 12.1584 23.6467 12.3536L17.2228 18.7775C17.0276 18.9727 16.711 18.9727 16.5157 18.7775L15.8086 18.0704C15.6134 17.8751 15.6134 17.5585 15.8086 17.3633L21.1718 12.0001Z\"><\/path>\r\n\t\t\t\t<\/svg><\/span><\/a>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n\r\n\t<\/span><\/p>\n<h2 id=\"right\" class=\"p1\"><b>How to choose the right encryption for your business communications<\/b><\/h2>\n<p class=\"p2\">Remember that there are <b>advantages and disadvantages <\/b>to both <b>end-to-end<\/b> (E2EE) and <b>point-to-point <\/b>(P2P) encryption.<\/p>\n<p class=\"p2\">With E2EE, you have total confidentiality and peace of mind that your video meeting is fully private, but value-added services such as live transcripts and cloud recording won\u2019t be available.<\/p>\n<p class=\"p2\">With P2P or encrypted data-in-transit, you have protection from eavesdroppers while your communications are en route from sender to receiver; explicit provider access allows value-added services including live transcripts\/closed captioning, cloud recording and more. If you need to uplift your security, then E2EE is the way to go.<\/p>\n<p class=\"p2\">Of course, how you approach each video meeting will be different. For example, a monthly all-hands meeting might benefit from services like closed captioning. A meeting to discuss sensitive financial or legal information, however, requires total privacy and deserves the uplifted security of <b>end-to-end encryption<\/b>.<\/p>\n<p class=\"p2\">When coupled with RingCentral\u2019s high availability (<a href=\"https:\/\/www.ringcentral.com\/gb\/en\/blog\/cost-unplanned-outage\/\"><span class=\"s1\"><b>99.999% uptime<\/b><\/span><\/a>, or less than 5 minutes of unplanned downtime a year), RingCentral\u2019s E2EE video conferences provide unparalleled security and data protection with confidentiality, integrity, and availability.<\/p>\n<h2 class=\"p2\">Best-in-class, end-to-end encryption<\/h2>\n<ul class=\"ul1\">\n<li class=\"li2\">Coming soon for phone and messaging (E2EE for video launched in 2021)<\/li>\n<li class=\"li2\">Goes beyond 1:1 calls and chats and supports large groups<\/li>\n<li class=\"li2\">Available on multiple modalities \u2013 desktop app, mobile app and web browser<\/li>\n<li class=\"li2\">Available whether the conversation is ongoing, scheduled or spontaneous<\/li>\n<\/ul>\n<p class=\"p2\">With E2EE, no unauthorised 3rd party can access communication content: including RingCentral. Think of us as the conduit between two or more parties but the communication content travels through RingCentral. We cannot read, see or hear what\u2019s being communicated.<\/p>\n<p class=\"p2\">This functionality will be available to all RingCentral MVP users, whether they are inside a company communicating with each other or interacting with external guests, as long as they are signed into a RingCentral account.<\/p>\n<p class=\"p2\"><img decoding=\"async\" class=\"aligncenter wp-image-24976 size-full\" src=\"\/gb\/en\/blog\/wp-content\/uploads\/2022\/12\/E2EEUK7.jpg\" alt=\"illustration demonstrates that with end to end encryption, no unauthorised third party can access company communication content\" width=\"2048\" height=\"1365\" \/><\/p>\n<h2 id=\"soon\" class=\"p1\"><b>End-to-end encryption for RingCentral Phone<\/b><\/h2>\n<h3 class=\"p2\">Functionality available (closed beta starting December 2022):<\/h3>\n<ul class=\"ul1\">\n<li class=\"li2\">Turn on\/off at the organisational level<\/li>\n<li class=\"li2\">Available for 1:1 calls, supports large groups in H1 2023<\/li>\n<li class=\"li2\">Supports soft phones (desktop and mobile app)<\/li>\n<li class=\"li2\">Ability to convert non-E2EE calls to E2EE<\/li>\n<li class=\"li2\">Ability to convert E2EE calls to E2EE video meeting<\/li>\n<\/ul>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-24976 size-full\" src=\"\/gb\/en\/blog\/wp-content\/uploads\/2022\/12\/E2EEUK6.gif\" alt=\"A gif showing the user interface in the RingCentral phone app. A person switches on end to end encryption in a call \" width=\"2048\" height=\"1365\" \/><\/p>\n<h3 class=\"p1\">Functionality unavailable:<\/h3>\n<ul class=\"ul1\">\n<li class=\"li1\">Call recordings<\/li>\n<li class=\"li1\">Guests (not signed into a RingCentral account)<\/li>\n<li class=\"li1\">Callers from PSTNs<\/li>\n<li class=\"li1\">Callers from hard phones<\/li>\n<\/ul>\n<h2 class=\"p1\">End-to-end encryption for <b>RingCentral Messaging<\/b><\/h2>\n<h3 class=\"p1\">Functionality available (closed beta starting December 2022):<\/h3>\n<ul class=\"ul1\">\n<li class=\"li1\">Turn on\/off at the organisational level<\/li>\n<li class=\"li1\">Ability for IT admins to manage within the RingCentral desktop app<\/li>\n<li class=\"li1\">Supports soft phones (desktop and mobile app)<\/li>\n<li class=\"li1\">Create team chats for up to 50 participants<\/li>\n<\/ul>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-24976 size-full\" src=\"\/gb\/en\/blog\/wp-content\/uploads\/2022\/12\/E2EEUK2.png\" alt=\"An image showing how to create a team with end to end encryption turned on \" width=\"2048\" height=\"1365\" \/><\/p>\n<h3 class=\"p1\">Functionality unavailable:<\/h3>\n<ul class=\"ul1\">\n<li class=\"li1\">Sending GIFs<\/li>\n<li class=\"li1\">Creating tasks, events and notes<\/li>\n<li class=\"li1\">Code snippets<\/li>\n<li class=\"li1\">Third-party apps<\/li>\n<li class=\"li1\">Guests (external users \/ email addresses) cannot join E2EE team chats<\/li>\n<li class=\"li1\">Sharing team disabled<\/li>\n<li class=\"li1\">Notification previews<\/li>\n<\/ul>\n<h2 class=\"p1\">Encryption key management<\/h2>\n<p class=\"p1\"><img decoding=\"async\" class=\"aligncenter wp-image-24976 size-full\" src=\"\/gb\/en\/blog\/wp-content\/uploads\/2022\/12\/E2EEUK1.png\" alt=\"A picture showing a key in someone's hand\" width=\"2048\" height=\"1365\" \/><\/p>\n<p class=\"p1\">With E2EE cryptography, the private keys are stored on the endpoint devices and E2EE messages can only be decrypted using these keys.<\/p>\n<p class=\"p1\">Let\u2019s use an example of video or voice. A RingCentral user generates audio or video streams that are encrypted, packetised, and then sent to the backend RingCentral servers. The backend then sends it further to the recipients. But only the recipients can decrypt it.<\/p>\n<p class=\"p1\">The key management is completely outside of the backend even though it distributed them. The backend works directly with the endpoints for key distribution.<\/p>\n<h2 class=\"p1\">Scalability through Message Layer Security (MLS)<\/h2>\n<p class=\"p1\">We built our E2EE using Message Layer Security (MLS). MLS is a security layer for encrypting messages in groups of size two to many. It is designed to be efficient, practical and secure. In contrast, other popular consumer and business applications that use E2EE technology use the Signal protocol, which is a non-federated cryptographic protocol that can be used to provide end-to-end encryption for voice calls and instant messaging conversations.<\/p>\n<p class=\"p1\">However, Signal-built E2EE solutions are not as scalable when compared to MLS-built ones. As a result, they will have performance issues such as CPU usage, memory issues and lag when going beyond 1:1 conversations \u2013 a limitation that does not exist with RingCentral E2EE as a result of using MLS.<\/p>\n<h2 class=\"p1\">Privacy by design<\/h2>\n<p class=\"p1\">For compliance minded organisations, IT administrators can turn E2EE on\/off at any time. Additionally, IT administrators have cryptographic access to messaging data and can export messaging data if needed. RingCentral also plans to empower customers to enable content capture and supervision with select partners for E2EE voice, chat and video next year.<\/p>\n<h2 class=\"p1\">Our vision for enterprise-grade E2EE<\/h2>\n<p class=\"p1\">\u201cWith RingCentral\u2019s E2EE for video, and soon, phone calls and messaging, organisations can use RingCentral\u2019s native capabilities to simplify their technology stack with one offering. We believe our approach to end-to-end encryption across message, video and phone is truly differentiated, and represents the most complete deployment of E2EE for enterprise communications, to date,\u201d said Michael Armer, chief information security officer at RingCentral.<\/p>\n<p class=\"p1\">\u201cPeople exchange millions of calls and messages a day on RingCentral\u2019s platform. With our new E2EE, we\u2019re extending enterprise-grade privacy and security controls for our customers, giving them the freedom to have confidential conversations across any mode.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As video conferencing continues to grow in importance for businesses, end-to-end encryption has never been a more critical feature for securing this communication channel. You need to have confidence in &hellip; <a href=\"\/gb\/en\/blog\/what-is-end-to-end-encryption\/\" class=\"more-link\">Read more<span class=\"screen-reader-text\"> &#8220;End-to-End Encryption: What It Is and Why It Matters&#8221;<\/span><\/a><\/p>\n","protected":false},"author":249,"featured_media":25596,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[264],"tags":[74,90],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>End-to-End Encryption: What It Is and Why It Matters | RingCentral UK Blog<\/title>\n<meta name=\"description\" content=\"With E2EE, no unauthorised 3rd party can access communication content: including RingCentral. Think of us as the conduit between two or more parties but the communication content travels through RingCentral.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ringcentral.com\/gb\/en\/blog\/what-is-end-to-end-encryption\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bryan Peddie\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"End-to-End Encryption: What It Is and Why It Matters | RingCentral UK Blog","description":"With E2EE, no unauthorised 3rd party can access communication content: including RingCentral. Think of us as the conduit between two or more parties but the communication content travels through RingCentral.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ringcentral.com\/gb\/en\/blog\/what-is-end-to-end-encryption\/","twitter_misc":{"Written by":"Bryan Peddie","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":":\/gb\/en\/blog\/what-is-end-to-end-encryption\/#article","isPartOf":{"@id":"\/gb\/en\/blog\/what-is-end-to-end-encryption\/"},"author":{"name":"Bryan Peddie","@id":"\/gb\/en\/blog\/#\/schema\/person\/5e3adf81a15cd65f2945b68938543539"},"headline":"End-to-End Encryption: What It Is and Why It Matters","datePublished":"2022-12-21T15:48:53+00:00","dateModified":"2025-10-29T20:14:40+00:00","mainEntityOfPage":{"@id":"\/gb\/en\/blog\/what-is-end-to-end-encryption\/"},"wordCount":1631,"commentCount":0,"publisher":{"@id":"\/gb\/en\/blog\/#organization"},"keywords":["cloud communications","security"],"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":[":\/gb\/en\/blog\/what-is-end-to-end-encryption\/#respond"]}]},{"@type":"WebPage","@id":"\/gb\/en\/blog\/what-is-end-to-end-encryption\/","url":":\/gb\/en\/blog\/what-is-end-to-end-encryption\/","name":"End-to-End Encryption: What It Is and Why It Matters | RingCentral UK Blog","isPartOf":{"@id":"\/gb\/en\/blog\/#website"},"datePublished":"2022-12-21T15:48:53+00:00","dateModified":"2025-10-29T20:14:40+00:00","description":"With E2EE, no unauthorised 3rd party can access communication content: including RingCentral. Think of us as the conduit between two or more parties but the communication content travels through RingCentral.","breadcrumb":{"@id":":\/gb\/en\/blog\/what-is-end-to-end-encryption\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":[":\/gb\/en\/blog\/what-is-end-to-end-encryption\/"]}]},{"@type":"BreadcrumbList","@id":":\/gb\/en\/blog\/what-is-end-to-end-encryption\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"RingCentral Blog","item":"\/gb\/en\/blog\/"},{"@type":"ListItem","position":2,"name":"Security"}]},{"@type":"WebSite","@id":"\/gb\/en\/blog\/#website","url":"\/gb\/en\/blog\/","name":"RingCentral UK Blog","description":"RingCentral News and Tips","publisher":{"@id":"\/gb\/en\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"\/gb\/en\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"\/gb\/en\/blog\/#organization","name":"RingCentral UK","url":"\/gb\/en\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"\/gb\/en\/blog\/#\/schema\/logo\/image\/","url":"\/gb\/en\/blog\/wp-content\/uploads\/2021\/11\/ringcentral-logo.png","contentUrl":"\/gb\/en\/blog\/wp-content\/uploads\/2021\/11\/ringcentral-logo.png","width":1921,"height":416,"caption":"RingCentral UK"},"image":{"@id":"\/gb\/en\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"\/gb\/en\/blog\/#\/schema\/person\/5e3adf81a15cd65f2945b68938543539","name":"Bryan Peddie","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"\/gb\/en\/blog\/#\/schema\/person\/image\/","url":"\/gb\/en\/blog\/wp-content\/uploads\/2022\/12\/Bryan-headshot-150x150.png","contentUrl":"\/gb\/en\/blog\/wp-content\/uploads\/2022\/12\/Bryan-headshot-150x150.png","caption":"Bryan Peddie"},"description":"Bryan is a Product Marketing Manager with experience in transforming the employee and customer journey across digital and physical channels in retailers and financial institutions. Bryan is responsible for the MVP product line, and the Global solutions for the international business.","url":"\/gb\/en\/blog\/author\/bryan-peddie\/"}]}},"_links":{"self":[{"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/posts\/25575"}],"collection":[{"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/users\/249"}],"replies":[{"embeddable":true,"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/comments?post=25575"}],"version-history":[{"count":0,"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/posts\/25575\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/media\/25596"}],"wp:attachment":[{"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/media?parent=25575"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/categories?post=25575"},{"taxonomy":"post_tag","embeddable":true,"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/tags?post=25575"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}