Integrations
Overview
Managing SaaS security involves overseeing two main categories of applications that together constitute the complete SaaS estate:
Known Applications: These are applications officially recognized and managed by an organization.
Shadow Applications: These are unsanctioned, unofficial applications identified through their use of credentials of known services.
Perimeters helps in managing the security of both Known Applications as well as Shadow Applications.
In the Perimeters portal, 'Known Applications' are referred to as 'Integrated Applications'.
When an application is integrated, it grants Perimeters the permission to fetch security-related information from it. This information, which includes the configuration of security parameters, is assessed and displayed to help govern the application's SaaS security.
Once integrated, Perimeters will be able to continuously fetch the required information from each integrated SaaS application.
To simplify the process of integrating your applications with Perimeters, we have created convenient walkthroughs that guide you through each integration process. You can access these walkthrough guides in the "Connecting Perimeters" section of the documentation under "SaaS Applications".
The collected information from all applications will be assembled into a view of your organization's inventory. Perimeters will then evaluate this inventory together against a security policy and compliance requirements to assess the posture and identify misconfigurations.
Integrating your SaaS applications with Perimeters is the basis to assessing your SaaS security posture and maximizing the benefits of using Perimeters.
Last updated