Announcing Availability of the Exabeam Cloud Connector for Zoom
Usage of cloud services, in particular video conferencing apps, has exploded.
According to Okta’s Businesses @ Work (From Home) Report published in April 2020, Zoom was the fastest growing app with 110% growth in unique workforce users in March over February, 2020. To further highlight that incredible growth in users, during that same time period in 2019, Zoom’s workforce user growth was a mere 6%.
Figure 1: Logins to Zoom, Q1 2019 vs Q1 2020. Source Okta.
Prior to the sudden surge in cloud application usage this year, swaths of organizations were already executing on their hybrid cloud strategy, while many others were ‘born in the cloud’. In mid-2019 Exabeam, acknowledging this shift, made the acquisition of SkyFormation, a leading Israel-based cloud application security business and the first company to collect and feed cloud logs into any security information and event management (SIEM) tool.
The acquisition accelerated the development of Exabeam Cloud Connectors
Cloud Connectors reliably collect logs from over 40 cloud services into Exabeam Data Lake and Exabeam Advanced Analytics to enhance cloud security. Earlier this year we added Cloud Connectors support for Workday and Ping. Today we are announcing support for the collection of logs from Zoom; further supporting security teams’ need to carry out their investigations across a diverse environment. This new log source is included as part of the existing Cloud Connectors solution. Clients who are already leveraging Cloud Connectors today will be able to ingest Zoom logs at no additional cost – for those readers not familiar with how Exabeam pricing is structured, we charge per user, not per byte.
Cloud Connectors are updated automatically whenever there are API changes, eliminating the need for your security team to spend precious time coding or for you to invest in costly professional services engagements.
Figure 2: Cloud Connectors for Zoom operates in one of two ways.
Using Cloud Connectors; logs can be reliably ingested to provide the visibility needed to meet your regulatory requirements.
With regards to the Management API’s, the following audit sources and events are made available for investigations in Data Lake and Advanced Analytics.
|Zoom Audit Source (API)||Service/Module Covered|
|Operations logs report||The Operations Logs report allows you to audit admin and user activity, such as adding a new user, changing account settings, and deleting recordings.
Use this API to retrieve an operation logs report for a specified period of time.
|Sign-in/Sign-out activities report||Retrieve a list of Zoom meeting log-ins, sign-outs and other activity logs under a Zoom account|
Once the Zoom activity logs are ingested you can prepare reports to support audit, and risk and compliance requirements.
Figure 3: Out of the box reports, available via Data Lake, provide a snapshot of Zoom usage across the organization.
Figure 4: Exabeam Advanced Analytics analyses Zoom logs with other contextual data sources to identify where a user is logging in from.
Cloud Connector allows you to easily collect logs from Zoom (and 40 other cloud applications), and bring them into Advanced Analytics, where they can be combined with data from on-premises applications to improve detection of attacker tactics, techniques and procedures using behavior-based threat detection.
Behavioral analysis-based threat detection – Exabeam’s threat detection is based on the world’s most-deployed user and entity behavior analytics (UEBA) solution. Combining cloud activity data with that from your on-premises log sources, it creates baseline behaviors for all users and entities. Exabeam Smart Timelines stitches together all events from various sources and automatically identifies risky, anomalous activity that may point to threats.
While monitoring of Zoom activity is important, the real value comes when that activity is tracked in the wider context of normal and abnormal user behaviors such as account switching, remote logins, database logins, and administrative asset logins to detect anomalous activity. Enriched with additional contextual data, all Zoom events are mapped to user sessions. All risky behaviors within a session are assigned a risk score, with critical events being elevated to a higher score level and displayed as part of a timeline.
Most legacy products build a timeline that tracks a single dimension such as IP address, hostname, or username. While with time and effort, this could yield a timeline of events, it misses critical parts of the attack such as privilege escalation used to gain access to other computers, and with that access to confidential information shared via Zoom meetings.
Exabeam Smart Timelines use machine learning to automatically gather and stitch together all events that originated from a single user including privilege escalations making it easy to spot lateral movement.
Figure 5: Exabeam Advanced Analytics provides security analysts with a user-level timeline and risk score for each action taken by that user. Security analysts can pivot directly from the timeline to the raw and parsed logs for further investigation if needed.
In summary, Cloud Connectors deliver:
- Out-of-the-box cloud services connectors for your SIEM saving you expensive development or professional services
- Integration with over 40 cloud services such as AWS, GitHub, Google, Microsoft Office 365, Salesforce, Workday, Zoom and many other cloud security, identity and access management, infrastructure and business applications.
- An opportunity to broaden your investigations at a predictable per-user price point
- Integration with Advanced Analytics to create Smart Timelines which identify normal and abnormal user behaviors and halve the time for investigations
The Cloud Connector for Zoom specifically delivers
- The ability to audit admin and user activity, such as adding a new user, changing account settings, and deleting recordings.
- Retrieve Zoom meetings activity such as log-in, sign-out and more
- Reports that support audit, and risk and compliance requirements
The Results Are In…and The Return on Investment Is Clear
Auto Parser Generator Now Available for Customers (Updated)
Planning Before the Breach
An Outcome-based Approach to Use Cases: Solving for Lateral Movement
Log4j by Another Name. It’s Coming; How Can You Keep Pace?
Exabeam: A Multiplier for Any Zero Trust Strategy
Subscribe today and we'll send our latest blog posts right to your inbox, so you can stay ahead of the cybercriminals and defend your organization.
See a world-class SIEM solution in action
Most reported breaches involved lost or stolen credentials. How can you keep pace?
Exabeam delivers SOC teams industry-leading analytics, patented anomaly detection, and Smart Timelines to help teams pinpoint the actions that lead to exploits.
Whether you need a SIEM replacement, a legacy SIEM modernization with XDR, Exabeam offers advanced, modular, and cloud-delivered TDIR.
Get a demo today!