{"id":49162,"date":"2022-12-06T03:00:39","date_gmt":"2022-12-06T11:00:39","guid":{"rendered":"\/us\/en\/blog\/?p=49162"},"modified":"2025-09-21T21:42:12","modified_gmt":"2025-09-22T04:42:12","slug":"what-is-end-to-end-encryption","status":"publish","type":"post","link":"\/us\/en\/blog\/what-is-end-to-end-encryption\/","title":{"rendered":"End-to-end encryption (E2EE): What it is &#038; how it works"},"content":{"rendered":"<p>As video conferencing continues to grow in importance for businesses, end-to-end encryption has never been a more critical feature for securing this communication channel.\u00a0<span style=\"font-weight: 400;\">You need to have confidence in your <a href=\"https:\/\/www.ringcentral.com\/free-conference-call.html\">conference call services<\/a> and overall collaboration solutions. Are they always available? And are they \u201csecurely available\u201d? And are your communications themselves available to you and your teams&#8230; and no one else?\u00a0<\/span><\/p>\n<p><b>End-to-end encryption (E2EE)<\/b><span style=\"font-weight: 400;\"> is the next step in secure communications. But what is E2EE, exactly? How does it secure messaging, video, and phone communications? What does it protect against? And who can access these E2EE communications? Let&#8217;s find out.\u00a0<\/span><\/p>\n<p>In this article, we&#8217;ll cover:<\/p>\n<ul>\n<li><a href=\"#one\">What is end-to-end encryption?<\/a><\/li>\n<li><a href=\"#seven\">How does end-to-end encryption work?<\/a><\/li>\n<li><a href=\"#two\">The top benefits of E2EE for cloud communications<\/a><\/li>\n<li><a href=\"#five\">End-to-end vs point-to-point encryption<\/a><\/li>\n<li><a href=\"#six\">How to choose the right encryption for your business communications<\/a><\/li>\n<li><a href=\"#four\">Coming soon: E2EE for RingCentral MVP<\/a><\/li>\n<\/ul>\n<h2 class=\"heading h2\"><a id=\"one\"><\/a>What is end-to-end encryption (E2EE)?<\/h2>\n<p><b>End-to-end encryption (E2EE)<\/b><span style=\"font-weight: 400;\">\u00a0is a powerful security and privacy control<\/span> that <b><span style=\"font-weight: 400;\">ensures your online meeting contents are confidential and secure. E2EE provides privacy for privileged conversations as well as security protection against third-party intrusion and cyber attacks.<\/span><\/b><\/p>\n<h2 class=\"heading h2\"><a id=\"seven\"><\/a>How does end-to-end encryption work?<\/h2>\n<div class=\"undefined\">\n<div id=\"chat-stream-wrapper\" class=\"sc-gvEYvI jNTiPP\" role=\"region\" data-test-automation-id=\"chat-stream-wrapper\">\n<div class=\"sc-jOIXeL eGFLDE\" role=\"region\" aria-label=\"Conversation messages\" data-test-automation-id=\"chat-stream\">\n<div class=\"sc-hxyAyv cLgLBu\" tabindex=\"-1\" aria-label=\" \">\n<div class=\"sc-gggqho iIlePk\" data-test-automation-id=\"virtualized-list\">\n<div role=\"listbox\" data-arrow-navigation=\"true\" aria-orientation=\"vertical\">\n<div class=\"sc-hCHDUi coJrqC trap-focus-container\" tabindex=\"0\" role=\"document\" data-ally-id=\"44151705600004\" aria-label=\"Roman Tobe. . 4:45 PM. Kate Vogel Great, here's the description: End-to-end encryption (E2EE) technology prevents any unauthorized third party from accessing users\u2019 communications. E2EE provides privacy for privileged conversations\u2013as well as security protection against third party intrusion and cyber attacks.\u00a0 Press Enter to explore message content, then use Escape to shift focus back to navigate through the message stream. Use up and down arrow to navigate to other messages.\" aria-describedby=\"styledConversationActionBarId44151705600004 cardHeaderRightSectionId44151705600004\">\n<div class=\"sc-dpAcNM dUfTkk \" data-name=\"conversation-card\" data-id=\"44151705600004\">\n<div class=\"conversation-card__right\">\n<div class=\"sc-ewuFVd sdGtX\" data-name=\"body\">\n<div class=\"sc-kaxkvr EoTSj\" data-name=\"text\">\n<p>End-to-end encryption (E2EE) technology prevents any unauthorized third party from accessing users\u2019 communications, whether it&#8217;s video conferencing on a <a href=\"https:\/\/www.ringcentral.com\/what-is-a-voip-phone.html\">VoIP phone<\/a>, chatting via an instant messaging service, or anything else. With E2EE,<span style=\"font-weight: 400;\"> the endpoints (sender and receiver) are able to establish encryption keys without the involvement of any intermediaries. <\/span><span style=\"font-weight: 400;\">The endpoints can then use these keys to encrypt (and decrypt) data, as seen in this diagram:<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-48963 size-full\" src=\"\/us\/en\/blog\/wp-content\/uploads\/2021\/08\/E2EE-2.png\" alt=\"end to end encryption diagram: path from sender to receiver\" width=\"930\" height=\"700\" \/><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<h2 class=\"heading h2\"><a id=\"two\"><\/a>2 major benefits of E2EE for cloud communications<\/h2>\n<p><span style=\"font-weight: 400;\">For video meetings where you want total privacy and data security, E2EE adds an extra layer to mitigate risk and shield sensitive information.\u00a0<\/span><\/p>\n<p>As a result, there are two really important benefits that E2EE provides for video conferencing:<\/p>\n<h3 class=\"heading h3\">1. Confidentiality (Protection against eavesdropping)<\/h3>\n<p><span style=\"font-weight: 400;\">With E2EE, data is encrypted the entire time it traverses the provider\u2019s network. Because only participants can decrypt the communications, bad actors at the provider\u2019s side\u2014or anywhere in between\u2014can\u2019t eavesdrop on your communications.<\/span><\/p>\n<h3 class=\"heading h3\">2. Integrity (Protection against modification)<\/h3>\n<p><span style=\"font-weight: 400;\">With E2EE, if someone tries to modify or tamper with your communications, you will know because they won\u2019t decrypt properly.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\t\t<\/p>\n<div class=\"download-form-widget download-cta-banner \" data-url=\"https:\/\/assets.ringcentral.com\/us\/ebook\/security-ciso-guide.pdf\" data-id=\"6a084a4085230\" id=\"6a084a4085230\" data-form-type=\"cta download banner ENTERPRISE\">\n<div class=\"rc-post-content-cta rc-post-content-cta_download orange\">\n<div class=\"img-rc-cta-download\">\n\t\t\t\t<svg width=\"290\" height=\"234\" fill=\"none\" id=\"svg--1773031339\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t<path d=\"M213.846 96.959C222.779 130.299 257.048 150.084 290.388 141.15C323.728 132.217 343.513 97.9482 334.579 64.6087C325.646 31.2691 291.377 11.4839 258.038 20.4173L203.159 35.122C200.128 35.9341 198.329 39.0494 199.141 42.0803L213.846 96.959Z\" fill=\"#002855\"\/>\n\t\t\t\t<path d=\"M153.092 88.4508C154.825 86.7179 154.825 83.9299 153.092 82.1969L81.1733 10.2785C79.4405 8.54566 76.6392 8.55885 74.9846 10.3437C35.9115 52.6218 35.9115 118.026 74.9846 160.304C76.6394 162.089 79.4535 162.089 81.1733 160.369L153.092 88.4508Z\" fill=\"#0684BC\"\/>\n\t\t\t\t<path d=\"M116.67 194.759L102.313 219.626C101.621 220.825 102.029 222.345 103.227 223.037L128.095 237.394C143.024 246.014 162.11 240.9 170.73 225.97C179.349 211.041 174.235 191.954 159.306 183.335C144.376 174.716 125.29 179.83 116.67 194.759Z\" fill=\"#FFCD00\"\/>\n\t\t\t\t<path d=\"M184.513 4.20398C184.94 5.7996 183.997 7.43423 182.401 7.86177L134.082 20.8089C132.486 21.2364 130.852 20.2926 130.424 18.697L117.477 -29.6222C117.049 -31.2178 117.993 -32.8524 119.589 -33.2799L167.908 -46.227C169.504 -46.6545 171.138 -45.7109 171.566 -44.1152L184.513 4.20398Z\" fill=\"#F6F5F1\"\/>\n\t\t\t\t<path d=\"M195.505 160.14C195.025 160.972 193.966 161.256 193.135 160.776L167.963 146.242C167.131 145.763 166.848 144.703 167.327 143.872L181.861 118.7C182.341 117.869 183.4 117.585 184.231 118.065L209.403 132.598C210.235 133.078 210.518 134.137 210.038 134.968L195.505 160.14Z\" fill=\"#205C40\"\/>\n\t\t\t\t<\/svg>\t\t\t<\/div>\n<div class=\"rc-content-cta-download\">\n<div class=\"bottom-cta-copy\">\n<div class=\"title-banner-cta-download\">Looking for a UCaaS vendor you can trust?<\/div>\n<div class=\"text-banner-cta-download\">Get the CISO guide to UCaaS security. <\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"rc-post-content-cta-footer\">\n\t\t\t\t<button tabindex=\"on\" on=\"tap:6a084a4085230.toggleClass(class='open')\" class=\"open-modal-download-action rc-button\" type=\"submit\">Get the guide<\/button>\n\t\t\t<\/div>\n<\/p><\/div>\n<div class=\"download-form-modal\">\n<div class=\"download-form-modal-body\">\n<div class=\"download-form-modal-content\">\n<div class=\"download-form-modal-title\">CISO's guide to UCaaS security, including information protection, data privacy, and compliance management<\/div>\n<form class=\"download-form ENTERPRISE\" method=\"post\">\n<div class=\"download-form-part\">\n\t\t\t\t\t\t\t<input class=\"download-form-input\" aria-label=\"Full Name\" aria-required=\"true\" aria-invalid=\"false\" type=\"text\" name=\"fullname\" placeholder=\"Full Name\" data-dl-events-hover=\"true\" data-dl-element=\"text\" data-dl-additional-info=\"enterprise download form\">\n\t\t\t\t\t\t<\/div>\n<div class=\"download-form-part\">\n\t\t\t\t\t\t\t<input class=\"download-form-input\" aria-label=\"Email (please enter a work email address)\" aria-required=\"true\" aria-invalid=\"false\" type=\"email\" autocomplete=\"on\" name=\"email\" placeholder=\"Email (please enter a work email address)\" data-dl-events-hover=\"true\" data-dl-element=\"email\" data-dl-additional-info=\"enterprise download form\">\n\t\t\t\t\t\t<\/div>\n<div>\n\t\t\t\t\t\t\t<input type=\"hidden\" name=\"popup_form\" value=\"1\">\n\t\t\t\t\t\t<\/div>\n<div>\n\t\t\t\t\t\t\t<input type=\"hidden\" name=\"Lead_Entry_Source__c\" value=\"RC Blog Enterprise\" class=\"download-form-input\"\/>\n\t\t\t\t\t\t<\/div>\n<div class=\"download-form-part\">\n\t\t\t\t\t\t\t<button class=\"download-form-submit\" type=\"submit\" data-dl-element=\"button\" data-no-auto-dl=\"true\" data-dl-additional-info=\"enterprise download form\" data-dl-name=\"Get the white paper\">Get the white paper<\/button>\n\t\t\t\t\t\t<\/div>\n<\/p><\/form>\n<p> \t\t\t\t\t<button on=\"tap:6a084a4085230.toggleClass(class='open')\" role=\"button\" tabindex=\"0\"  class=\"download-form-modal-close\"><\/button>\n\t\t\t\t<\/div>\n<div class=\"download-form-modal-thank\"> Enjoy!<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<p><\/span><\/p>\n<h2 class=\"heading h2\"><a id=\"five\"><\/a>End-to-end vs point-to-point encryption (P2P)<\/h2>\n<p><span style=\"font-weight: 400;\">Encryption of data in transit, over public and private networks, uses industry standard protocols to set up encrypted channels to protect data in transit between two points (known as point-to-point (P2P) encryption). <\/span><\/p>\n<p><span style=\"font-weight: 400;\">When used with standard protocols such as TLS, SRTP, even HTTP\/S, P2P encrypted channels are established between two systems, such as the application used by the video participants and the video provider\u2019s processing systems.\u00a0<\/span><\/p>\n<p><img decoding=\"async\" class=\"size-full wp-image-49164 aligncenter\" src=\"\/us\/en\/blog\/wp-content\/uploads\/2021\/09\/Data-in-transit.png\" alt=\"\" width=\"930\" height=\"700\" \/><\/p>\n<hr \/>\n<p><b>Point-to-point<\/b> <b>data-in-transit encryption:<\/b><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The sender\u2019s channel <\/span><b>encrypts data <\/b><span style=\"font-weight: 400;\">to send to the provider (the video provider).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The receiver\u2018s channel<\/span><b> decrypts data <\/b><span style=\"font-weight: 400;\">received from the sender.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The receiver (video provider) processes (unencrypted) information.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The receiver\u2019s channel <\/span><b>encrypts data<\/b><span style=\"font-weight: 400;\"> to send to the sender.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The sender\u2019s channel <\/span><b>decrypts data<\/b><span style=\"font-weight: 400;\"> received from the receiver (the video provider).<\/span><\/li>\n<\/ol>\n<p><strong>End-to-end encryption:<\/strong><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The sender\u2019s channel <\/span><b>encrypts data <\/b><span style=\"font-weight: 400;\">to send to other participants via the video provider.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The video provider processes <\/span><b>encrypted<\/b><span style=\"font-weight: 400;\"> information.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Other participant\u2018s channels<\/span><b> decrypts data <\/b><span style=\"font-weight: 400;\">received from the sender.<\/span><\/li>\n<\/ol>\n<hr \/>\n<p><span style=\"font-weight: 400;\">P2P solutions result in the video conferencing provider setting up a P2P channel with each video conference participant. If there are 17 participants, the video conference provider has 17 P2P channels to manage with full access to all communications across these 17 channels.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This allows the video provider to provide additional features, such as virtual backgrounds, meeting transcription and closed captioning, and chat translation of the decrypted \u201din the clear\u201d communications.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">E2EE is different from standard encryption. With standard encryption, which is on by default, data in transit is encrypted using Transport Layer Security (TLS), and data at rest is encrypted with AES-256. Additionally, with standard encryption, RingCentral is able to provide additional benefits to enhance the communications to make a richer user experience &#8211; such as recordings, AI transcripts, whiteboards, and much more.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With E2EE enabled, RingCentral cannot offer these enhanced experiences but in exchange provides the utmost privacy and security for an organization&#8217;s communications.<\/span><\/p>\n<h2 class=\"heading h2\"><a id=\"six\"><\/a>How to choose the right encryption for your business communications<\/h2>\n<p><span style=\"font-weight: 400;\">Remember that there are <\/span><b>advantages and disadvantages <\/b><span style=\"font-weight: 400;\">to both <\/span><b>end-to-end<\/b><span style=\"font-weight: 400;\"> (E2EE) and <\/span><b>point-to-point <\/b>(P2P) <span style=\"font-weight: 400;\">encryption. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">With E2EE, you have total confidentiality and peace of mind that your video meeting is fully private\u2014but value-added services such as live transcripts and cloud recording won\u2019t be available.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With P2P or encrypted data-in-transit, you have protection from eavesdroppers while your communications are en route from sender to receiver; explicit provider access allows value-added services including live transcripts\/closed captioning, cloud recording, and more. If you need to uplift your security, then E2EE is the way to go.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\t\t\t<\/p>\n<div class=\"rc-bottom-cta rc-bottom-cta__landscape\" style=\"background-image: url(\/us\/en\/blog\/wp-content\/themes\/ringcentral\/assets\/images\/temp\/rc-bottom-cta-bg.png);\">\n<div class=\"bottom-cta-img\">\n\t\t\t\t\t<img decoding=\"async\" width=\"930\" height=\"700\" src=\"\/us\/en\/blog\/wp-content\/uploads\/2020\/08\/99999.png\" class=\"responsive-image\" alt=\"What 99.999% ...\" \/>\t\t\t\t<\/div>\n<div class=\"bottom-cta-copy\">\n<div class=\"rc-bottom-cta__text\" style=\"\">\n<h3\n\t\t\t\t\t\t\t\tclass=\"rc-bottom-cta__title headline-copy\"\n\t\t\t\t\t\t\t\tstyle=\"\"\n\t\t\t\t\t\t><strong>What 99.999% uptime really means for your business<\/strong><\/h3>\n<\/p><\/div>\n<div class=\"rc-bottom-cta__btn-wrapper\" style=\"\">\n\t\t\t\t\t\t<a\n\t\t\t\t\t\t\t\tclass=\"btn btn-primary btn-lg rc-bottom-cta__link\"\n\t\t\t\t\t\t\t\ttitle=\"Read the blog\"\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/in-a-work-from-home-world-service-level-agreements-for-cloud-communications-take-center-stage\/\"\n\t\t\t\t\t\t\t\tdata-dl-name=\"Read the blog\"\n\t\t\t\t\t\t\t\tdata-dl-element=\"button\"\n\t\t\t\t\t\t\t\tdata-dl-additional-info=\"bottom cta banner\"\n\t\t\t\t\t\t\t\tdata-no-auto-dl=\"true\"\n\t\t\t\t\t\t\t\tstyle=\"\"\n\t\t\t\t\t\t\t\tonmouseover=\"\"\n\t\t\t\t\t\t\t\tonmouseout=\"this.style.backgroundColor='';this.style.borderColor='';this.style.color='';\"\n\t\t\t\t\t\t>Read the blog<\/a>\n\t\t\t\t\t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<p>\t<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Of course, how you approach each video meeting will be different. For example, a monthly all-hands meeting might benefit from services like closed captioning. A meeting to discuss sensitive financial or legal information, however, requires total privacy and deserves the uplifted security of <\/span><b>end-to-end encryption<\/b><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When coupled with RingCentral\u2019s high availability (<\/span><a href=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/in-a-work-from-home-world-service-level-agreements-for-cloud-communications-take-center-stage\/\"><b>99.999% uptime<\/b><\/a><span style=\"font-weight: 400;\">, or less than 5 minutes of unplanned downtime a year), RingCentral\u2019s E2EE video conferences provide unparalleled security and data protection with confidentiality, integrity, and availability.\u00a0<\/span><\/p>\n<h2><b><a id=\"four\"><\/a>Coming soon: <a href=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/ringcentral-update-e2ee-2022\">End-to-end encryption for all of RingCentral MVP\u00a0<\/a><\/b><\/h2>\n<p>In 2021, RingCentral launched <a href=\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/dynamic-end-to-end-encryption\/\">end-to-end encryption for our video conferencing<\/a>. Now, we&#8217;re expanding E2EE to our <a href=\"https:\/\/www.ringcentral.com\/lp\/small-business-phone-service.html\">business phone<\/a> and <a href=\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/what-is-team-messaging\/\">team messaging<\/a> solutions.<\/p>\n<p><span style=\"font-weight: 400;\">Today, we\u2019re announcing end-to-end encryption for phone and messaging (E2EE) will be available in a closed beta for select customers in its flagship RingCentral MVP\u00ae product in December 2022. RingCentral\u2019s E2EE provides security and privacy for privileged conversations and protection against 3rd-party intrusion and attacks. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">E2EE removes the need for multiple encryption products, modernizes the user experience and reduces privacy concerns within privileged conversations.<\/span><\/p>\n<h3 class=\"heading h3\"><span style=\"font-weight: 400;\">Best-in-class, end-to-end encryption<\/span><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Coming soon for phone and messaging (<\/span><a href=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/dynamic-end-to-end-encryption\/\"><span style=\"font-weight: 400;\">E2EE for video launched in 2021<\/span><\/a><span style=\"font-weight: 400;\">)\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Goes beyond 1:1 calls and chats and supports large groups<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Available on multiple modalities &#8211; desktop app, mobile app and web browser<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Available whether the conversation is ongoing, scheduled, or spontaneous<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">With E2EE, no unauthorized 3rd party can access communication content: including RingCentral. Think of us as the conduit between two or more parties but the communication content travels through RingCentral. We cannot read, see or hear what\u2019s being communicated.<\/span><\/p>\n<div class=\"sc-BvaAx dOouYq\" data-name=\"text\">\n<p>This functionality will be available to all RingCentral MVP users\u2014whether they are inside a company communicating with each other or interacting with external guests\u2014as long as they are signed into a RingCentral account.<\/p>\n<\/div>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-53591 size-full\" src=\"\/us\/en\/blog\/wp-content\/uploads\/2022\/11\/E2EE-Image-1.png\" alt=\"\" width=\"2048\" height=\"1147\" \/><\/p>\n<h3 class=\"heading h3\">End-to-end encryption for RingCentral Phone<\/h3>\n<h4 class=\"heading h4\"><span style=\"font-weight: 400;\">Functionality available (closed beta starting December 2022):<\/span><\/h4>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Turn on\/off at the organizational level<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Available for 1:1 calls, supports large groups in H1 2023<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Supports soft phones (desktop and mobile app)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ability to convert non-E2EE calls to E2EE<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ability to convert E2EE calls to E2EE video meeting<\/span><\/li>\n<\/ul>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-53577 size-full\" src=\"\/us\/en\/blog\/wp-content\/uploads\/2021\/09\/Tip_End_to_End_Encryption_for_Phone_.gif\" alt=\"end to end encryption for phone with RingCentral\" width=\"1920\" height=\"1080\" \/><\/p>\n<h4 class=\"heading h4\"><span style=\"font-weight: 400;\">Functionality unavailable:<\/span><\/h4>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Call recordings<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Guests (not signed into a RingCentral account)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Callers from PSTNs<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Callers from hard phones<\/span><\/li>\n<\/ul>\n<h3 class=\"heading h3\">End-to-end encryption for <b>RingCentral Messaging<\/b><\/h3>\n<h4 class=\"heading h4\"><span style=\"font-weight: 400;\">Functionality available (closed beta starting December 2022):<\/span><\/h4>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Turn on\/off at the organizational level<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ability for IT admins to manage within the RingCentral desktop app<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Supports soft phones (desktop and mobile app)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Create team chats for up to 50 participants<\/span><\/li>\n<\/ul>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-53607 size-full\" src=\"\/us\/en\/blog\/wp-content\/uploads\/2022\/11\/Image-3-1.png\" alt=\"end to end encryption for messaging with RingCentral\" width=\"1920\" height=\"1080\" \/><\/p>\n<h4 class=\"heading h4\"><span style=\"font-weight: 400;\">Functionality unavailable:<\/span><\/h4>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Sending GIFs<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Creating tasks, events, notes<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Code snippets\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Third-party apps<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Guests (external users \/ email addresses) cannot join E2EE team chats<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Sharing team disabled<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Notification previews<\/span><\/li>\n<\/ul>\n<h3 class=\"heading h3\">Key management<\/h3>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-53582\" src=\"\/us\/en\/blog\/wp-content\/uploads\/2021\/09\/Screen-Shot-2022-11-15-at-4.52.52-PM.png\" alt=\"\" width=\"1228\" height=\"690\" \/><\/p>\n<p><span style=\"font-weight: 400;\">With E2EE cryptography, the private keys are stored on the endpoint devices and E2EE messages can only be decrypted using these keys.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Let\u2019s use an example of video or voice. A RingCentral user generates audio or video streams that are encrypted, packetized, and then sent to the backend RingCentral servers. The backend then sends it further to the recipients. But only the recipients can decrypt it.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The key management is completely outside of the backend even though it distributed them. The backend works directly with the endpoints for key distribution.\u00a0<\/span><\/p>\n<h3 class=\"heading h3\">Scalability through Message Layer Security (MLS)<\/h3>\n<p><span style=\"font-weight: 400;\">We built our E2EE using Message Layer Security (MLS). MLS is a security layer for encrypting messages in groups of size two to many. It is designed to be efficient, practical and secure. In contrast, other popular consumer and business applications that utilize E2EE technology use the Signal protocol, which is a non-federated cryptographic protocol that can be used to provide end-to-end encryption for any <a href=\"https:\/\/www.ringcentral.com\/how-does-a-virtual-phone-call-work.html\">virtual call<\/a> or instant messaging conversation.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, Signal-built E2EE solutions are not as scalable when compared to MLS-built ones. As a result, they will have performance issues such as CPU usage, memory issues and lag when going beyond 1:1 conversations &#8211; a limitation that does not exist with RingCentral E2EE as a result of using MLS.<\/span><\/p>\n<h3 class=\"heading h3\">Privacy by design<\/h3>\n<div class=\"sc-BvaAx dOouYq\" data-name=\"text\">\n<p><span style=\"font-weight: 400;\">For compliance minded organizations, IT administrators can turn E2EE on\/off at any time. Additionally, IT administrators have cryptographic access to messaging data and can export messaging data if needed. RingCentral also plans to empower customers to enable content capture and supervision with select partners for E2EE voice, chat, and video next year.<\/span><\/p>\n<\/div>\n<h3 class=\"heading h3\">Our vision for enterprise-grade E2EE<\/h3>\n<p><span style=\"font-weight: 400;\">\u201cWith RingCentral\u2019s E2EE for video, and soon, phone calls and messaging, organizations can leverage RingCentral\u2019s native capabilities to simplify their technology stack with one offering. We believe our approach to end-to-end encryption across message, video, and phone is truly differentiated, and represents the most complete deployment of E2EE for enterprise communications, to date,\u201d said Michael Armer, chief information security officer at RingCentral. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cPeople exchange millions of calls and messages a day on RingCentral\u2019s platform. With our new E2EE, we\u2019re extending enterprise-grade privacy and security controls for our customers, giving them the freedom to have confidential conversations across any mode.\u201d<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As video conferencing continues to grow in importance for businesses, end-to-end encryption has never been a more critical feature for securing this communication channel.\u00a0You need to have confidence in your conference call services and overall collaboration solutions. Are they always available? And are they \u201csecurely available\u201d? And are your communications themselves available to you and &#8230;<\/p>\n","protected":false},"author":1148,"featured_media":51432,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18391,23732],"tags":[41378,1640],"class_list":["post-49162","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-leadership","category-security","tag-encryption","tag-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v19.3 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>End-to-end encryption (E2EE): What it is &amp; how it works | RingCentral Blog<\/title>\n<meta name=\"description\" content=\"End-to-end encryption is an important level of security for business communications. Learn why it&#039;s critical and how to achieve it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/what-is-end-to-end-encryption\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"End-to-end encryption (E2EE): What it is &amp; how it works\" \/>\n<meta property=\"og:description\" content=\"End-to-end encryption is an important level of security for business communications. Learn why it&#039;s critical and how to achieve it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/what-is-end-to-end-encryption\/\" \/>\n<meta property=\"og:site_name\" content=\"RingCentral Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ringcentral\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-06T11:00:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-22T04:42:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/wp-content\/uploads\/2022\/03\/End-to-end-encryption.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Roman Tobe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ringcentral\" \/>\n<meta name=\"twitter:site\" content=\"@ringcentral\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roman Tobe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/what-is-end-to-end-encryption\/#article\",\"isPartOf\":{\"@id\":\"\/us\/en\/blog\/what-is-end-to-end-encryption\/\"},\"author\":{\"name\":\"Roman Tobe\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/cd4eeced3d5890ae81689ec5218ec7c4\"},\"headline\":\"End-to-end encryption (E2EE): What it is &#038; how it works\",\"datePublished\":\"2022-12-06T11:00:39+00:00\",\"dateModified\":\"2025-09-22T04:42:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"\/us\/en\/blog\/what-is-end-to-end-encryption\/\"},\"wordCount\":1757,\"publisher\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/what-is-end-to-end-encryption\/#primaryimage\"},\"thumbnailUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2022\/03\/End-to-end-encryption.png\",\"keywords\":[\"encryption\",\"security\"],\"articleSection\":[\"IT leadership\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"\/us\/en\/blog\/what-is-end-to-end-encryption\/\",\"url\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/what-is-end-to-end-encryption\/\",\"name\":\"End-to-end encryption (E2EE): What it is & how it works | RingCentral Blog\",\"isPartOf\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/what-is-end-to-end-encryption\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/what-is-end-to-end-encryption\/#primaryimage\"},\"thumbnailUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2022\/03\/End-to-end-encryption.png\",\"datePublished\":\"2022-12-06T11:00:39+00:00\",\"dateModified\":\"2025-09-22T04:42:12+00:00\",\"description\":\"End-to-end encryption is an important level of security for business communications. Learn why it's critical and how to achieve it.\",\"breadcrumb\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/what-is-end-to-end-encryption\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/what-is-end-to-end-encryption\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/what-is-end-to-end-encryption\/#primaryimage\",\"url\":\"\/us\/en\/blog\/wp-content\/uploads\/2022\/03\/End-to-end-encryption.png\",\"contentUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2022\/03\/End-to-end-encryption.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/what-is-end-to-end-encryption\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"End-to-end encryption (E2EE): What it is &#038; how it works\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website\",\"url\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/\",\"name\":\"RingCentral Blog\",\"description\":\"Intelligent Communications\",\"publisher\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization\",\"name\":\"RingCentral\",\"url\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/\",\"url\":\"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png\",\"contentUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png\",\"width\":2048,\"height\":309,\"caption\":\"RingCentral\"},\"image\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ringcentral\",\"https:\/\/x.com\/ringcentral\",\"https:\/\/www.linkedin.com\/company\/ringcentral\/\",\"https:\/\/www.instagram.com\/ringcentral\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/cd4eeced3d5890ae81689ec5218ec7c4\",\"name\":\"Roman Tobe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/39626c3167bc3f17d3bfdab2cf2c29e5286658908d1cc5d2896c1c9d7b697e20?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/39626c3167bc3f17d3bfdab2cf2c29e5286658908d1cc5d2896c1c9d7b697e20?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/39626c3167bc3f17d3bfdab2cf2c29e5286658908d1cc5d2896c1c9d7b697e20?s=96&d=mm&r=g\",\"caption\":\"Roman Tobe\"},\"description\":\"Roman Tobe is the Director of Product Marketing for RingCentral Global Trust, focused on AI, security and compliance in the unified communications space. He has guided product marketing strategy for numerous cybersecurity companies in the Bay Area.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/romantobe\/\"],\"url\":\"\/us\/en\/blog\/author\/roman-tobe\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"End-to-end encryption (E2EE): What it is & how it works | RingCentral Blog","description":"End-to-end encryption is an important level of security for business communications. Learn why it's critical and how to achieve it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ringcentral.com\/us\/en\/blog\/what-is-end-to-end-encryption\/","og_locale":"en_US","og_type":"article","og_title":"End-to-end encryption (E2EE): What it is & how it works","og_description":"End-to-end encryption is an important level of security for business communications. Learn why it's critical and how to achieve it.","og_url":"https:\/\/www.ringcentral.com\/us\/en\/blog\/what-is-end-to-end-encryption\/","og_site_name":"RingCentral Blog","article_publisher":"https:\/\/www.facebook.com\/ringcentral","article_published_time":"2022-12-06T11:00:39+00:00","article_modified_time":"2025-09-22T04:42:12+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.ringcentral.com\/us\/en\/blog\/wp-content\/uploads\/2022\/03\/End-to-end-encryption.png","type":"image\/png"}],"author":"Roman Tobe","twitter_card":"summary_large_image","twitter_creator":"@ringcentral","twitter_site":"@ringcentral","twitter_misc":{"Written by":"Roman Tobe","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/what-is-end-to-end-encryption\/#article","isPartOf":{"@id":"\/us\/en\/blog\/what-is-end-to-end-encryption\/"},"author":{"name":"Roman Tobe","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/cd4eeced3d5890ae81689ec5218ec7c4"},"headline":"End-to-end encryption (E2EE): What it is &#038; how it works","datePublished":"2022-12-06T11:00:39+00:00","dateModified":"2025-09-22T04:42:12+00:00","mainEntityOfPage":{"@id":"\/us\/en\/blog\/what-is-end-to-end-encryption\/"},"wordCount":1757,"publisher":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization"},"image":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/what-is-end-to-end-encryption\/#primaryimage"},"thumbnailUrl":"\/us\/en\/blog\/wp-content\/uploads\/2022\/03\/End-to-end-encryption.png","keywords":["encryption","security"],"articleSection":["IT leadership","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"\/us\/en\/blog\/what-is-end-to-end-encryption\/","url":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/what-is-end-to-end-encryption\/","name":"End-to-end encryption (E2EE): What it is & how it works | RingCentral Blog","isPartOf":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/what-is-end-to-end-encryption\/#primaryimage"},"image":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/what-is-end-to-end-encryption\/#primaryimage"},"thumbnailUrl":"\/us\/en\/blog\/wp-content\/uploads\/2022\/03\/End-to-end-encryption.png","datePublished":"2022-12-06T11:00:39+00:00","dateModified":"2025-09-22T04:42:12+00:00","description":"End-to-end encryption is an important level of security for business communications. Learn why it's critical and how to achieve it.","breadcrumb":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/what-is-end-to-end-encryption\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/what-is-end-to-end-encryption\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/what-is-end-to-end-encryption\/#primaryimage","url":"\/us\/en\/blog\/wp-content\/uploads\/2022\/03\/End-to-end-encryption.png","contentUrl":"\/us\/en\/blog\/wp-content\/uploads\/2022\/03\/End-to-end-encryption.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/what-is-end-to-end-encryption\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/"},{"@type":"ListItem","position":2,"name":"End-to-end encryption (E2EE): What it is &#038; how it works"}]},{"@type":"WebSite","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website","url":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/","name":"RingCentral Blog","description":"Intelligent Communications","publisher":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization","name":"RingCentral","url":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/","url":"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png","contentUrl":"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png","width":2048,"height":309,"caption":"RingCentral"},"image":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ringcentral","https:\/\/x.com\/ringcentral","https:\/\/www.linkedin.com\/company\/ringcentral\/","https:\/\/www.instagram.com\/ringcentral"]},{"@type":"Person","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/cd4eeced3d5890ae81689ec5218ec7c4","name":"Roman Tobe","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/39626c3167bc3f17d3bfdab2cf2c29e5286658908d1cc5d2896c1c9d7b697e20?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/39626c3167bc3f17d3bfdab2cf2c29e5286658908d1cc5d2896c1c9d7b697e20?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/39626c3167bc3f17d3bfdab2cf2c29e5286658908d1cc5d2896c1c9d7b697e20?s=96&d=mm&r=g","caption":"Roman Tobe"},"description":"Roman Tobe is the Director of Product Marketing for RingCentral Global Trust, focused on AI, security and compliance in the unified communications space. He has guided product marketing strategy for numerous cybersecurity companies in the Bay Area.","sameAs":["https:\/\/www.linkedin.com\/in\/romantobe\/"],"url":"\/us\/en\/blog\/author\/roman-tobe\/"}]}},"rc_img_url":"\/us\/en\/blog\/wp-content\/uploads\/2022\/03\/End-to-end-encryption.png","rcblog_by_author":"<a href=\"\/us\/en\/blog\/author\/roman-tobe\/amp\" data-dl-events-click=\"true\" data-dl-element=\"link\"><span class=\"image\"><img src=\"https:\/\/secure.gravatar.com\/avatar\/39626c3167bc3f17d3bfdab2cf2c29e5286658908d1cc5d2896c1c9d7b697e20?s=96&d=mm&r=g\" alt=\"\" width=\"30\" height=\"30\" layout=\"fixed\"><\/img><\/span><span class=\"by-author-name\">Roman Tobe<\/span><\/a>","rc_author_full_name":"Roman Tobe","rc_author_avatar":"\/us\/en\/blog\/wp-content\/uploads\/2022\/07\/roman-tobe.jpg","rc_author_link":"\/us\/en\/blog\/author\/roman-tobe\/amp","rc_post_categories":"<a href=\"\/us\/en\/blog\/category\/it-leadership\/amp\">IT leadership<\/a><a href=\"\/us\/en\/blog\/category\/security\/amp\">, Security<\/a>","amp_link":"\/us\/en\/blog\/what-is-end-to-end-encryption\/amp","excerpt_title":"End-to-end encryption (E2EE): What it is &#038; how it works","_links":{"self":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/posts\/49162","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/users\/1148"}],"replies":[{"embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/comments?post=49162"}],"version-history":[{"count":0,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/posts\/49162\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/media\/51432"}],"wp:attachment":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/media?parent=49162"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/categories?post=49162"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/tags?post=49162"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}