PUBlished on
April 27, 2020
updated on
November 5, 2025

Conference Confidently on Zoom with Obsidian

OBSIDIAN SECURITY

We are thrilled to announce support for Zoom in the Obsidian CDR platform. Obsidian now enables organizations to safely embrace the leading video communications service as the business critical application it has become. Security teams can get visibility into how Zoom is being used and discover security risks resulting from weak configuration and inappropriate use of video conferencing.

Video Communications Are Now Business Critical

Video communications solutions have become ubiquitous in recent weeks, as essentially all meetings have gone virtual.  All the board meetings, employee training sessions, water cooler conversations, happy hours, preschool classes, and virtual goat yoga classes are happening on video. The numbers are staggering. Zoom usage went from 10 million daily users in December to over 200 million in March, according to Zoom founder and CEO Eric Yuan. In a few short weeks, video communications have morphed from a business enabler to a vital communication tool as critical to businesses as email.

Organizations that hadn’t invested in company-wide services and usage policies are under pressure to fill the gap. With the rush to adopt and increasing usage, many security teams are discovering the risks associated with improper configuration and misuse of video communications. While Zoom is the poster child of these risks, they are by no means the only platform with security and privacy challenges. SaaS-based communications applications have often been overlooked by security, but are now front and center.

Security Challenges

Many first-time users are still figuring out how to translate in-person meeting experiences to virtual platforms. Questions that are straightforward to answer in physical meetings, become challenging to track on a video conference;

Many users haven’t figured out how to “close the doors” of their virtual meeting rooms while making it easy for the right folks to participate. Unfortunately, bad actors are taking advantage of this situation to launch attacks. Cybersecurity researchers recently discovered more than 500,000 Zoom passwords on the dark web for less than a cent each. Some of these accounts for sale belonged to well-known financial services as well as educational institutions.

Zoom exploits are grabbing the headlines

Over the past few weeks, everyone is talking about unauthorized people joining Zoom meetings and posting inappropriate or lewd messages. Zoombombing, while a serious issue, is just the tip of the iceberg when it comes to damage potential. How about if someone joins a management team call or a board meeting and quietly listens in and records the meeting? These attacks can easily be automated with bots that join unprotected corporate meetings automatically and send recordings to the cloud. Now that is scary.

Secure Collaboration with Obsidian

While businesses are concerned about vulnerabilities in the cloud applications services they are using, an overwhelming majority of security failures are the result of avoidable human error. In order to protect against risks and breaches caused by admins and users, security teams must have visibility. They must ensure that SaaS applications are configured properly and are being used appropriately according to security best practices. Across an organization’s many SaaS apps, this is a big responsibility.

Obsidian helps customers tackle this challenge with posture management and activity monitoring. The Obsidian Cloud Detection and Response platform aggregates, normalizes and enriches data around user access and activity from an organization’s SaaS applications. Obsidian has built deep integrations with leading SaaS-based communications and collaboration platforms such as Slack, G Suite, Microsoft Office 365, and now Zoom. Security teams can monitor users’ activity to protect against accidental oversharing and insider threat, and to detect and respond to account compromise and data breaches.

Obsidian’s Zoom integration lets security teams not only monitor who is using the service, but how they are using it. Obsidian generates insights and alerts related to a variety of risks and threats, including:

This integration between Obsidian and Zoom is the latest addition to a set of rich integrations that Obsidian has built with SaaS-based products such as G Suite, Office 365, Box, Dropbox, Slack, GitHub, and Salesforce to enable secure collaboration in a cloud-first world. Obsidian helps security teams identify permissive or overly broad file sharing, dangerous third party application access, and other data risks.

Frequently Asked Questions (FAQs)

How does Obsidian Security help protect Zoom meetings from unauthorized access?

Obsidian Security’s integration with Zoom gives security teams enhanced visibility into meeting activity, allowing them to detect and respond to unauthorized access. By aggregating and analyzing user activity data, Obsidian can identify suspicious logins, unwanted guest participation, and potential account compromises, helping organizations quickly secure their virtual meetings.

What types of Zoom-related risks can Obsidian detect and alert on?

Obsidian generates alerts on a range of risks specific to Zoom usage, such as application misconfigurations, risky user behaviors, and signs of account takeover or insider threats. These insights help organizations catch issues like accidental meeting exposure, insecure settings, and suspicious activity before they lead to security incidents.

Is it possible to monitor who attends and records Zoom meetings with Obsidian?

Yes, Obsidian’s Zoom integration tracks detailed user activity, including meeting attendance and recording actions. Security teams can review who joined meetings, when they joined, and whether anyone recorded the session, providing full audit trails to support security and compliance needs.

Can Obsidian identify improper Zoom configurations that could lead to security incidents?

Obsidian specifically analyzes Zoom application settings across the organization to highlight configurations that violate security best practices. This helps security teams quickly spot and remediate weak or risky settings, such as open meeting links or inadequate access controls, reducing the chances of incidents like Zoombombing or data leakage.

You May Also Like

Get Started

Start in minutes and secure your critical SaaS applications with continuous monitoring and data-driven insights.

get a demo