Adaptive Shield

Adaptive Shield

Adaptive Shield

How it works: Adaptive Shield
How it works: Adaptive Shield
How it works: Adaptive Shield
How it works: Adaptive Shield
How it works: Adaptive Shield
How it works: Adaptive Shield
Overview

Each SaaS platform has a set of security configurations and native controls


Securing the enterprise data and users across these systems in a streamlined and consistent way is becoming ever challenging, with an unprecedented rate of change in the corporate environment, changes made by the SaaS platforms themselves and dramatic changes in the macro-environment (e.g. WFH)


Adaptive Shield provide:

  • Aggregating and monitoring all users (including 3rd party entities) across Zoom platform, their level of privileged access and exposure
  • Stacking Zoom security posture against compliance frameworks (e.g. ISO 27001, SOC 2) and best practices (NIST, CIS) in an automated way
  • Providing a prioritized and actionable remediation plan.
  • Alerting on security configuration drifts as soon as they occur, allowing an immediate action


Developer Resources
Privacy & Compliance
Requirements
User role
Account admins or Users with required privileges
Zoom account eligibility
Login to check
Permissions - App can view information
Associated with your account and others you're allowed to access

May include administrator name, account email address, billing information, and account plan information.

May include user name, display name, picture, email address, phone number, job information, stated locale, account, user ID, contact lists added by the account or user (which may include contact information a user imports from a third-party app), and other profile information.

Information about participants’ computers, phones, and other devices, which may include information about speakers, microphone, and camera, OS version, hard disk ID, PC name, MAC address, IP address (and general location at the country level derived from it), and other device information.

May include access to calendar of scheduled Zoom meetings and webinars, and related details about those meetings and webinars.

Preferences and settings, which may include whether a passcode or a waiting room is required, permitted event capacity, screen sharing settings, and other settings and configuration information.

Associated with your account, others you're allowed to access, and others included in that information.

May include name, display name, email address, phone number, user ID, and other profile information.

Content generated in Zoom products, which may include audio, video, messages, transcriptions, feedback, responses to polls and Q&A, and files, and related context , such as invitation details, meeting or chat name, and meeting agenda.

Information people provide when registering for a Zoom meeting, webinar or recording, which may include name and contact information, responses to registration questions, and other registration information.

Information about how people and their devices interact with Zoom products, which may include when participants join/leave, whether participants sent messages and who they message with, performance data, and other usage information and metrics.

Permissions - App can manage information
Associated with your account and others you're allowed to access

Manage your account, which may include creating sub-accounts or changing account plan options.

This app can access the following information anytime including outside of a Zoom experience and when the app is not actively in use.
Scopes

User

user:read:admin

Account

account:read:admin

Devices (H323)

h323:read:admin

Marketplace

marketplace_app:read:admin

Report

report:read:admin

Room

room:read:admin

SCIM2

scim2

NEW
Essential Apps
These apps have paid features that are available for free for Pro, Business, and Business+ accounts.