# Overview

Welcome to Perimeters.

Perimeters is a SaaS security platform, a SaaS solution designed to assist organizations in identifying and addressing potential security risks in the SaaS applications they are using. Additionally, it helps ensure that businesses maintain compliance with industry regulations and standards.

Perimeters is designed to be easy and effective at managing overall SaaS security:

<table data-card-size="large" data-view="cards"><thead><tr><th></th><th></th><th data-hidden data-card-cover data-type="image">Cover image</th></tr></thead><tbody><tr><td><strong>Misconfigurations</strong></td><td>Continuous monitoring and detection of misconfigurations in the SaaS security configuration </td><td><a href="https://3610768300-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGM0TqVWC9i5HdJckyrOZ%2Fuploads%2FKgzvBq89ZXebXlZiurux%2F7%20Misconfiguration.png?alt=media&#x26;token=9080112d-6920-436a-93d7-72ee9677d8b9">7 Misconfiguration.png</a></td></tr><tr><td><strong>Activity and Threats Monitoring</strong></td><td>Audit SaaS activity including data shares, suspicious login attempts and AI application usage</td><td><a href="https://3610768300-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGM0TqVWC9i5HdJckyrOZ%2Fuploads%2F5Kfz5NbK78oCJiNjMUBF%2F4%20Activity%20and%20threats.png?alt=media&#x26;token=e94c0032-dc5f-4bd9-a2bf-67001e109b05">4 Activity and threats.png</a></td></tr><tr><td><strong>Shadow Applications</strong></td><td>The discovery and governance of SaaS applications that have access to the main organization applications  </td><td><a href="https://3610768300-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGM0TqVWC9i5HdJckyrOZ%2Fuploads%2FxPZR2E6Cln84mL0kRa2G%2F2%20Shadow.png?alt=media&#x26;token=3f6c0a44-235a-468c-8510-e36a2a70e5b4">2 Shadow.png</a></td></tr><tr><td><strong>Identity</strong></td><td>The discovery and governance of all the SaaS accounts and the identities that belong to organization</td><td><a href="https://3610768300-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGM0TqVWC9i5HdJckyrOZ%2Fuploads%2Fa5IwSQkqgly1bYGyG2ch%2F1%20identity.png?alt=media&#x26;token=85a82e1f-88f9-4b7b-9e76-c518bb3c52b3">1 identity.png</a></td></tr><tr><td>DLP</td><td>Get valuable insights about sensitive, bulk or public data share</td><td><a href="https://3610768300-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGM0TqVWC9i5HdJckyrOZ%2Fuploads%2FSb2PLO7H7vNXpsgTJBQ7%2F3%20DLP.png?alt=media&#x26;token=59154422-893d-4d13-ab9b-aa963759f7be">3 DLP.png</a></td></tr><tr><td>Automation</td><td>One Click fast security</td><td><a href="https://3610768300-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGM0TqVWC9i5HdJckyrOZ%2Fuploads%2FKD8FFJiZ7R3odF9woyHW%2F5%20Automation.png?alt=media&#x26;token=80fc9426-180f-44ce-b340-071fd8d7468d">5 Automation.png</a></td></tr><tr><td>Compliance and Audit</td><td>Remediate compliance gaps and get timely reports.</td><td><a href="https://3610768300-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGM0TqVWC9i5HdJckyrOZ%2Fuploads%2Fcj3wFZoq6i2Fs63X4hEq%2F6%20Compliance.png?alt=media&#x26;token=94965d46-4443-441e-be1c-2c36c817067a">6 Compliance.png</a></td></tr><tr><td>AI Governance</td><td>Uncover AI effects on your application estate</td><td><a href="https://3610768300-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGM0TqVWC9i5HdJckyrOZ%2Fuploads%2FYA6vIR2bSpdBGiIIRVyc%2F8%20AI.png?alt=media&#x26;token=4438fe1f-ecc3-4228-9bc3-1e3f4c016f97">8 AI.png</a></td></tr><tr><td>Spend Management</td><td>Utilize your licenses effectively with valuable insights.</td><td><a href="https://3610768300-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGM0TqVWC9i5HdJckyrOZ%2Fuploads%2FZVSCxy3lyZVGgvCmjuPx%2F9%20Spend%20Management.png?alt=media&#x26;token=997e044a-747d-4bea-81f0-8140385f8271">9 Spend Management.png</a></td></tr></tbody></table>

### About this guide

This guide will help you:

1. Quickly get started using Perimeters
2. Implement Perimeter for your use case
3. Find your way through the Perimeters Portal
4. Integrate SaaS services and tools with Perimeters

If it is your first time using Perimeters and you want to directly jump in, you can go to the [Quick Start](https://support.perimeters.io/perimeters-documentation/getting-started/quick-start) section.

Once you are done with that we recommend visiting the [Implementing Perimeter](https://support.perimeters.io/perimeters-documentation/getting-started/broken-reference) section to learn how to best use Perimeters for you specific use cases.

{% hint style="info" %}
**What is SaaS Security**

SaaS  Security is a tool that provides businesses with a central platform to manage the security posture of their SaaS applications. It helps identify misconfigurations, secure identities, deep shadow discovery, ensure compliance with industry regulations, and appropriate notifications about threat actors, thereby reducing the associated security risks.
{% endhint %}


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://support.perimeters.io/perimeters-documentation/getting-started/overview.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
