Report
Last updated
Last updated
1. Inventory Information Download
This report provides a detailed, downloadable snapshot of the organization's SaaS (Software as a Service) inventory in a CSV format. It offers visibility into the applications and users within the SaaS ecosystem to help with tracking, analysis, and compliance efforts. The inventory is divided into two key categories:
1.a) Applications and Users Inventory Snapshot
This section lists all identified SaaS applications along with details about their associated users.
It helps in understanding which users are utilizing specific SaaS applications, aiding in user access reviews and monitoring software usage across the organization.
1.b) Shadow SaaS Inventory Snapshot
This snapshot focuses on "shadow IT" — applications that are being used without the knowledge or approval of IT administrators.
Identifying shadow SaaS usage is critical for reducing security risks, as these applications may bypass corporate security policies or lack proper safeguards. This report has separate entry for each user.
2. Weekly Posture Overview
This report provides a concise summary of the organization's SaaS security posture, delivered every Monday.
It is designed to give all users of the Perimeters platform a clear overview of any security issues, trends, or changes in the SaaS environment over the past week.
Key metrics might include compliance violations, misconfigurations, most frequented apps, and other actionable insights to ensure a proactive security stance.