# Overview

Welcome to Perimeters.

Perimeters is a SaaS security platform, a SaaS solution designed to assist organizations in identifying and addressing potential security risks in the SaaS applications they are using. Additionally, it helps ensure that businesses maintain compliance with industry regulations and standards.

Perimeters is designed to be easy and effective at managing overall SaaS security:

<table data-card-size="large" data-view="cards"><thead><tr><th></th><th></th><th data-hidden data-card-cover data-type="image">Cover image</th></tr></thead><tbody><tr><td><strong>Misconfigurations</strong></td><td>Continuous monitoring and detection of misconfigurations in the SaaS security configuration </td><td><a href="https://3610768300-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGM0TqVWC9i5HdJckyrOZ%2Fuploads%2FKgzvBq89ZXebXlZiurux%2F7%20Misconfiguration.png?alt=media&#x26;token=9080112d-6920-436a-93d7-72ee9677d8b9">7 Misconfiguration.png</a></td></tr><tr><td><strong>Activity and Threats Monitoring</strong></td><td>Audit SaaS activity including data shares, suspicious login attempts and AI application usage</td><td><a href="https://3610768300-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGM0TqVWC9i5HdJckyrOZ%2Fuploads%2F5Kfz5NbK78oCJiNjMUBF%2F4%20Activity%20and%20threats.png?alt=media&#x26;token=e94c0032-dc5f-4bd9-a2bf-67001e109b05">4 Activity and threats.png</a></td></tr><tr><td><strong>Shadow Applications</strong></td><td>The discovery and governance of SaaS applications that have access to the main organization applications  </td><td><a href="https://3610768300-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGM0TqVWC9i5HdJckyrOZ%2Fuploads%2FxPZR2E6Cln84mL0kRa2G%2F2%20Shadow.png?alt=media&#x26;token=3f6c0a44-235a-468c-8510-e36a2a70e5b4">2 Shadow.png</a></td></tr><tr><td><strong>Identity</strong></td><td>The discovery and governance of all the SaaS accounts and the identities that belong to organization</td><td><a href="https://3610768300-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGM0TqVWC9i5HdJckyrOZ%2Fuploads%2Fa5IwSQkqgly1bYGyG2ch%2F1%20identity.png?alt=media&#x26;token=85a82e1f-88f9-4b7b-9e76-c518bb3c52b3">1 identity.png</a></td></tr><tr><td>DLP</td><td>Get valuable insights about sensitive, bulk or public data share</td><td><a href="https://3610768300-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGM0TqVWC9i5HdJckyrOZ%2Fuploads%2FSb2PLO7H7vNXpsgTJBQ7%2F3%20DLP.png?alt=media&#x26;token=59154422-893d-4d13-ab9b-aa963759f7be">3 DLP.png</a></td></tr><tr><td>Automation</td><td>One Click fast security</td><td><a href="https://3610768300-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGM0TqVWC9i5HdJckyrOZ%2Fuploads%2FKD8FFJiZ7R3odF9woyHW%2F5%20Automation.png?alt=media&#x26;token=80fc9426-180f-44ce-b340-071fd8d7468d">5 Automation.png</a></td></tr><tr><td>Compliance and Audit</td><td>Remediate compliance gaps and get timely reports.</td><td><a href="https://3610768300-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGM0TqVWC9i5HdJckyrOZ%2Fuploads%2Fcj3wFZoq6i2Fs63X4hEq%2F6%20Compliance.png?alt=media&#x26;token=94965d46-4443-441e-be1c-2c36c817067a">6 Compliance.png</a></td></tr><tr><td>AI Governance</td><td>Uncover AI effects on your application estate</td><td><a href="https://3610768300-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGM0TqVWC9i5HdJckyrOZ%2Fuploads%2FYA6vIR2bSpdBGiIIRVyc%2F8%20AI.png?alt=media&#x26;token=4438fe1f-ecc3-4228-9bc3-1e3f4c016f97">8 AI.png</a></td></tr><tr><td>Spend Management</td><td>Utilize your licenses effectively with valuable insights.</td><td><a href="https://3610768300-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGM0TqVWC9i5HdJckyrOZ%2Fuploads%2FZVSCxy3lyZVGgvCmjuPx%2F9%20Spend%20Management.png?alt=media&#x26;token=997e044a-747d-4bea-81f0-8140385f8271">9 Spend Management.png</a></td></tr></tbody></table>

### About this guide

This guide will help you:

1. Quickly get started using Perimeters
2. Implement Perimeter for your use case
3. Find your way through the Perimeters Portal
4. Integrate SaaS services and tools with Perimeters

If it is your first time using Perimeters and you want to directly jump in, you can go to the [Quick Start](https://support.perimeters.io/perimeters-documentation/getting-started/quick-start) section.

Once you are done with that we recommend visiting the [Implementing Perimeter](https://support.perimeters.io/perimeters-documentation/getting-started/broken-reference) section to learn how to best use Perimeters for you specific use cases.

{% hint style="info" %}
**What is SaaS Security**

SaaS  Security is a tool that provides businesses with a central platform to manage the security posture of their SaaS applications. It helps identify misconfigurations, secure identities, deep shadow discovery, ensure compliance with industry regulations, and appropriate notifications about threat actors, thereby reducing the associated security risks.
{% endhint %}
