Zoom Integration

Zoom is a proprietary videotelephony software program developed by Zoom Video Communications. The DoControl solution integrates with Zoom to gain visibility into specific details on users and cloud recordings, enforce strong password protection for high-risk users, provide secure access to sensitive video recordings and text-based files, and establish robust data access control policies to protect sensitive data and files within the Zoom application. DoControl’s fine-grain data access controls help prevent data overexposure and exfiltration, automatically remediate the risk of insider threats, and allow for business enablement to be achieved in a secure way.
Key Features:
  • Gain End-to-End Visibility: Gain exposure into specific user details (i.e. name, department, email, etc.) to better understand who has access to the application and what is taking place within the environment. Security teams can perform event correlation to organize activities that are connected that present potential risk to the business.
  • Secure Access to Video and Text-based Recordings: Ensure strong password protection is strictly enforced across specific identities that carry higher levels of risk. The solution gains visibility into cloud recordings and their associated settings, and the recording event. The vulnerabilities within cloud recordings can be automatically identified and remediated through self-service tooling or via automated policy enforcement.
  • Implement Granular Data Access Control Policies: Establish granular Security Workflows that automatically notify the appropriate teams of policy violations and anomalies. Security Workflows can be leveraged as a preventative control to ensure sensitive data and files within Zoom are never exposed to the wrong users.
Benefits of the Integration:
  • Gain visibility and expose a full inventory of every individual user and cloud-based recordings
  • Identify vulnerabilities within cloud recordings and their associated settings (i.e. sharing status, passcode protection, participants listed in the meeting, download-ability, generated files (recording, audio, chat, transcript, etc.) 
  • Automatically scan files for Personally Identifiable Information (PII), Payment Card Industry (PCI) and Personal Health Information (PHI), and remove unauthorized access to them
  • Automated notification to individual actors and security teams on policy violations or anomalies that present material risk to the business
  • Implement automated remediation of high-risk Zoom files such as changing recording visibility, delete recordings, as well as specific entities such as chats, transcripts, and more
View more integrations
Establish Webhooks in a Few Simple Clicks

Additional Resources