Overview

Welcome to Perimeters.

Perimeters is a SaaS security platform, a SaaS solution designed to assist organizations in identifying and addressing potential security risks in the SaaS applications they are using. Additionally, it helps ensure that businesses maintain compliance with industry regulations and standards.

Perimeters is designed to be easy and effective at managing overall SaaS security:

Cover

Misconfigurations

Continuous monitoring and detection of misconfigurations in the SaaS security configuration

Cover

Activity and Threats Monitoring

Audit SaaS activity including data shares, suspicious login attempts and AI application usage

Cover

Shadow Applications

The discovery and governance of SaaS applications that have access to the main organization applications

Cover

Identity

The discovery and governance of all the SaaS accounts and the identities that belong to organization

Cover

DLP

Get valuable insights about sensitive, bulk or public data share

Cover

Automation

One Click fast security

Cover

Compliance and Audit

Remediate compliance gaps and get timely reports.

Cover

AI Governance

Uncover AI effects on your application estate

Cover

Spend Management

Utilize your licenses effectively with valuable insights.

About this guide

This guide will help you:

  1. Quickly get started using Perimeters

  2. Implement Perimeter for your use case

  3. Find your way through the Perimeters Portal

  4. Integrate SaaS services and tools with Perimeters

If it is your first time using Perimeters and you want to directly jump in, you can go to the Quick Start section.

Once you are done with that we recommend visiting the Implementing Perimeter section to learn how to best use Perimeters for you specific use cases.

circle-info

What is SaaS Security

SaaS Security is a tool that provides businesses with a central platform to manage the security posture of their SaaS applications. It helps identify misconfigurations, secure identities, deep shadow discovery, ensure compliance with industry regulations, and appropriate notifications about threat actors, thereby reducing the associated security risks.

Last updated