Threats

Software as a Service (SaaS) applications offer a convenient and scalable way to conduct business. However, this ease of cloud-based services also enhances exposure to threats.

Open Threats

This section captures the events that need your attention.

  • Rule - Names of the open threats along with the security domain these fall into.

  • Severity - This indicated the potential this threat holds to hamper the security posture of the organization.

  • Application - The application through which this threat was discovered

  • Account - The user account associated with the threat

  • Created - The time of occurance.

  • Status - Updates the status of rule

Last updated