Perimeters Inc.
Perimeters is a powerful yet simple solution SaaS security posture management solution designed to help your security teams effectively manage SaaS security with ease and efficiency.
Clarity and Control: Perimeters brings clarity to your organization's SaaS security configurations. It provides a clear overview of your security landscape, enabling you to understand and maintain a secure and compliant environment.
Seamless Integration: Perimeters seamlessly integrates with popular applications like Zoom, leveraging their APIs to identify and highlight any security misconfigurations. Through the Zoom marketplace app and user consent, Perimeters securely accesses Zoom's inventory and settings data.
Key Features:
Priority-Driven Issues: Perimeters automatically scans your SaaS applications to identify security misconfigurations, presenting them in a prioritized list. This helps your team focus on addressing the most critical issues efficiently.
Global Configuration Rules: Take control of your security posture by establishing global secure configuration rules across all your SaaS applications. This ensures consistency and adherence to predefined security parameters.
Actions & Automations: Streamline issue resolution with Perimeters' automation capabilities. You can assign predefined actions, such as ticketing and alerting, to resolve security issues automatically. Define triggers to execute these actions, saving time and reducing manual effort.
Compliance Center: Stay ahead of compliance requirements with Perimeters' Compliance Center. It provides a comprehensive view of your compliance posture, highlighting areas that need attention according to defined controls.
With Perimeters, you can efficiently manage your SaaS security, focus on prioritized issues, and maintain compliance without unnecessary complexity. Experience the benefits of a user-friendly and effective SaaS security solution with Perimeters.
For more details, please visit: https://perimeters.io/
May include administrator name, account email address, billing information, and account plan information.
May include user name, display name, picture, email address, phone number, job information, stated locale, account, user ID, contact lists added by the account or user (which may include contact information a user imports from a third-party app), and other profile information.
May include access to calendar of scheduled Zoom meetings and webinars, and related details about those meetings and webinars.
Preferences and settings, which may include whether a passcode or a waiting room is required, permitted event capacity, screen sharing settings, and other settings and configuration information.
May include name, display name, email address, phone number, user ID, and other profile information.
Content generated in Zoom products, which may include audio, video, messages, transcriptions, feedback, responses to polls and Q&A, and files, and related context , such as invitation details, meeting or chat name, and meeting agenda.
Information about how people and their devices interact with Zoom products, which may include when participants join/leave, whether participants sent messages and who they message with, performance data, and other usage information and metrics.
User
user:read:admin
Account
account:read:admin
Group
group:read:admin
Role
role:read:admin
Team Chat
chat_channel:read:admin