[{"data":1,"prerenderedAt":4062},["ShallowReactive",2],{"application-flags":3,"navbar":7,"always-visible-banner":95,"navbar-about-highlight":155,"navbar-resource-highlight":211,"use-case-page":256,"blog/manage-third-party-data-access":1276},[4],{"name":5,"enabled":6},"maintenanceMode",false,[8,59,76],{"createdDate":9,"id":10,"name":11,"modelId":12,"published":13,"stageModifiedSincePublish":6,"query":14,"data":15,"variations":50,"lastUpdated":51,"firstPublished":52,"testRatio":33,"createdBy":53,"lastUpdatedBy":53,"folders":54,"meta":55,"rev":58},1742213002749,"efff2a27faf4408e9f908eba4b5542fe","inductive-automation","1c6207a5f24948ab82d4a0b17f251193","published",[],{"testimonial":16,"description":43,"type":19,"link":44,"title":47,"testimonialLink":48,"image":49},{"@type":17,"id":18,"model":19,"value":20},"@builder.io/core:Reference","f028f2b685bb47cd8bf9e82a26dd5a79","testimonial",{"query":21,"folders":22,"createdDate":23,"id":18,"name":24,"modelId":25,"published":13,"data":26,"variations":30,"lastUpdated":31,"firstPublished":32,"testRatio":33,"createdBy":34,"lastUpdatedBy":34,"meta":35,"rev":42},[],[],1735823466309,"We found Push to be more accurate when compared to competitors and the browser agent offered features that others couldn’t match.","42035571a56940ac98bff4544aa79aa5",{"author":27,"jobTitle":28,"quote":24,"image":29},"Jason Waits","\u003Cp>CISO at Inductive Automation\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Ff04c0c0689ce4a89ac0f0708d78c0a07",{},1735910703862,1735823501152,1,"ST0tXQM8slWpFrmioqKHmENB2qe2",{"kind":36,"lastPreviewUrl":37,"breakpoints":38,"hasAutosaves":41},"data","",{"small":39,"medium":40},640,768,true,"3v32gocrrqz","Join the industry's top security minds as they break down the browser attack landscape.",{"url":45,"text":46},"https://pushsecurity.com/webinar/state-of-browser-security","Save Your Spot","State of Browser Attacks Series","/customer-stories/inductive-automation","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fe94fca10aa7b46ac8052b7ea22de54cd",{},1776257019270,1742221533648,"CydmZnOWU1XuAaLhEDCoYNM4Z8W2",[],{"breakpoints":56,"kind":36,"lastPreviewUrl":37,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},320,"motto9r9yg",{"createdDate":60,"id":61,"name":62,"modelId":12,"published":13,"query":63,"data":64,"variations":69,"lastUpdated":70,"firstPublished":71,"testRatio":33,"createdBy":53,"lastUpdatedBy":72,"folders":73,"meta":74,"rev":58},1742208588866,"1c7a4e423bf54ac1a328bb4063459ef2","Banner",[],{"type":65,"url":66,"text":67,"link":68},"web-banner","https://pushsecurity.com/resources/browser-attacks-report","Get our latest report analyzing browser attack techniques in 2026",{},{},1774258294825,1742208637545,"jKjF9r5jcvXU8tzZEfFQm31Iyvr2",[],{"kind":36,"lastPreviewUrl":37,"breakpoints":75,"hasAutosaves":41},{"xsmall":57,"small":39,"medium":40},{"createdDate":77,"id":78,"name":79,"modelId":12,"published":13,"stageModifiedSincePublish":6,"query":80,"data":81,"variations":89,"lastUpdated":90,"firstPublished":91,"testRatio":33,"createdBy":53,"lastUpdatedBy":53,"folders":92,"meta":93,"rev":58},1742208469288,"6763051b201f44a0838c6400c580ca67","Resource highlight",[],{"image":82,"type":83,"description":84,"link":85,"title":88},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F7b4a5ebf81d64e8c9d7fc35f6c96c4a9","resource","Learn about the latest techniques being used in the wild.",{"url":86,"text":87},"/resources/browser-attacks-report","Download now","Report: 2026 Browser Attack Techniques",{},1776255866789,1742208570400,[],{"kind":36,"lastPreviewUrl":37,"breakpoints":94,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},{"createdDate":96,"id":97,"name":98,"modelId":99,"published":13,"query":100,"data":101,"variations":145,"lastUpdated":146,"firstPublished":147,"testRatio":33,"createdBy":34,"lastUpdatedBy":148,"folders":149,"meta":150,"rev":154},1774965361051,"fd266d0172cc47429be7ad10f48c99ad","always visible banner","0678d178ec8b41efb8a23c09dba7874d",[],{"ctaText":102,"text":103,"url":37,"blocks":104,"state":141},"ewrererw","testrfesssssssssss",[105,129],{"@type":106,"@version":107,"id":108,"component":109,"responsiveStyles":119},"@builder.io/sdk:Element",2,"builder-ca12c06a52de41d7b8743da53118cd38",{"name":110,"tag":110,"options":111,"isRSC":118},"TopBannerContent",{"text":112,"ctaText":46,"url":45,"mainText":113,"cta":116},"New Webinar Series: Join John Hammond, Troy Hunt, and Matt Johansen for the State of Browser Attacks",{"content":114,"fontSize":115},"\u003Cp>New Webinar Series: Join John Hammond, Troy Hunt, and Matt Johansen for the State of Browser Attacks\u003C/p>","text-base",{"content":117,"fontSize":115,"url":45},"\u003Cp>\u003Cstrong style=\"font-weight:700;\">Save Your Spot\u003C/strong>\u003C/p>\n",null,{"large":120},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":126,"marginBottom":126,"fontSize":127,"fontWeight":128},"flex","column","relative","0","border-box",".56rem","1.125rem","700",{"id":130,"@type":106,"tagName":131,"properties":132,"responsiveStyles":136},"builder-pixel-08zrjigffq5t","img",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},"https://cdn.builder.io/api/v1/pixel?apiKey=f3a1111ff5be48cdbb123cd9f5795a05","true","presentation",{"large":137},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},"block","hidden","none",{"deviceSize":142,"location":143},"large",{"path":37,"query":144},{},{},1775137295127,1774968080803,"ax7YYfD0OCeqT1Vxxv1G4FUbqVr1",[],{"breakpoints":151,"hasLinks":6,"kind":152,"lastPreviewUrl":153,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},"component","https://pushsecurity.com/?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests%2CmergePullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=always-visible-banner&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.always-visible-banner=fd266d0172cc47429be7ad10f48c99ad&builder.overrides.fd266d0172cc47429be7ad10f48c99ad=fd266d0172cc47429be7ad10f48c99ad&builder.options.locale=Default","2lvuonnywj",[156,180],{"createdDate":157,"id":158,"name":159,"modelId":160,"published":13,"stageModifiedSincePublish":6,"query":161,"data":162,"variations":173,"lastUpdated":174,"firstPublished":175,"testRatio":33,"createdBy":53,"lastUpdatedBy":53,"folders":176,"meta":177,"rev":179},1776247359804,"9136a8f18b3b4a6ba29b8653a99372b1","testimonial-inductive-automation","20d9eaa352304613b3d1a794b400703d",[],{"link":163,"type":19,"testimonialLink":48,"testimonial":164},{},{"@type":17,"id":18,"model":19,"value":165},{"query":166,"folders":167,"createdDate":23,"id":18,"name":24,"modelId":25,"published":13,"data":168,"variations":169,"lastUpdated":31,"firstPublished":32,"testRatio":33,"createdBy":34,"lastUpdatedBy":34,"meta":170,"rev":172},[],[],{"author":27,"jobTitle":28,"quote":24,"image":29},{},{"kind":36,"lastPreviewUrl":37,"breakpoints":171,"hasAutosaves":41},{"small":39,"medium":40},"7t755zfvte3",{},1776247404986,1776247404973,[],{"breakpoints":178,"kind":36,"lastPreviewUrl":37,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},"4moh0qpywtr",{"createdDate":181,"id":182,"name":88,"modelId":160,"published":13,"meta":183,"stageModifiedSincePublish":6,"query":185,"data":186,"variations":207,"lastUpdated":208,"firstPublished":209,"testRatio":33,"createdBy":53,"lastUpdatedBy":53,"folders":210,"rev":179},1776255761419,"05a9322735fc427db12e2740e4302300",{"breakpoints":184,"kind":36,"lastPreviewUrl":37,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},[],{"testimonial":187,"link":206,"type":83,"title":88,"description":84,"image":82},{"@type":17,"id":188,"model":19,"value":189},"192acbb1f9ca4cac918c0ec435a8bae3",{"query":190,"folders":191,"createdDate":192,"id":188,"name":193,"modelId":25,"published":13,"data":194,"variations":200,"lastUpdated":201,"firstPublished":202,"testRatio":33,"createdBy":34,"lastUpdatedBy":53,"meta":203,"rev":205},[],[],1728981467463,"Push does for identity what CrowdStrike did for the endpoint",{"video":195,"jobTitle":196,"author":197,"qoute":37,"quote":198,"image":199},"https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F8b30e8ca50064058bbaef0f3c6164575%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=8b30e8ca50064058bbaef0f3c6164575&alt=media&optimized=true","\u003Cp>Deputy CISO at Microsoft\u003C/p>\u003Cp>Former LinkedIn, Slack, Palantir\u003C/p>","Geoff Belknap","Push does for identity what CrowdStrike did for the endpoint.","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F748f0ad0a5064a00a13f4721fcc8dea1",{},1742902158597,1728981782923,{"kind":36,"lastPreviewUrl":37,"breakpoints":204,"hasAutosaves":41},{"small":39,"medium":40},"6s8ic0w0ao6",{"text":87,"url":86},{},1776255810913,1776255810900,[],[212,235],{"createdDate":213,"id":214,"name":88,"modelId":215,"published":13,"meta":216,"stageModifiedSincePublish":6,"query":218,"data":219,"variations":230,"lastUpdated":231,"firstPublished":232,"testRatio":33,"createdBy":53,"lastUpdatedBy":53,"folders":233,"rev":234},1776256900280,"1f429607996e4e5fae8fe3f9b9610e55","4829faa81e7c4ee8bd2d000e160e8d3c",{"breakpoints":217,"kind":36,"lastPreviewUrl":37,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},[],{"testimonial":220,"link":229,"type":83,"title":88,"description":84,"image":82},{"@type":17,"id":188,"model":19,"value":221},{"query":222,"folders":223,"createdDate":192,"id":188,"name":193,"modelId":25,"published":13,"data":224,"variations":225,"lastUpdated":201,"firstPublished":202,"testRatio":33,"createdBy":34,"lastUpdatedBy":53,"meta":226,"rev":228},[],[],{"video":195,"jobTitle":196,"author":197,"qoute":37,"quote":198,"image":199},{},{"kind":36,"lastPreviewUrl":37,"breakpoints":227,"hasAutosaves":41},{"small":39,"medium":40},"r77qqueuo3j",{"text":87,"url":86},{},1776256937553,1776256937540,[],"q0jkez80wkg",{"createdDate":236,"id":237,"name":11,"modelId":215,"published":13,"stageModifiedSincePublish":6,"query":238,"data":239,"variations":250,"lastUpdated":251,"firstPublished":252,"testRatio":33,"createdBy":53,"lastUpdatedBy":53,"folders":253,"meta":254,"rev":234},1776256949234,"ce043785b71b4ece98eac811ecf4ba10",[],{"link":240,"type":19,"testimonial":241,"testimonialLink":48},{},{"@type":17,"id":18,"model":19,"value":242},{"query":243,"folders":244,"createdDate":23,"id":18,"name":24,"modelId":25,"published":13,"data":245,"variations":246,"lastUpdated":31,"firstPublished":32,"testRatio":33,"createdBy":34,"lastUpdatedBy":34,"meta":247,"rev":249},[],[],{"author":27,"jobTitle":28,"quote":24,"image":29},{},{"kind":36,"lastPreviewUrl":37,"breakpoints":248,"hasAutosaves":41},{"small":39,"medium":40},"mnaneamy308",{},1776256974140,1776256974130,[],{"breakpoints":255,"kind":36,"lastPreviewUrl":37,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},[257,441,560,679,797,917,1037,1157],{"createdDate":258,"id":259,"name":260,"modelId":261,"published":13,"stageModifiedSincePublish":6,"query":262,"data":268,"variations":429,"lastUpdated":430,"firstPublished":431,"testRatio":33,"screenshot":432,"createdBy":34,"lastUpdatedBy":433,"folders":434,"meta":435,"rev":440},1744829487099,"387451215c314dd5bd654668cdc1a197","Zero-day phishing","cca4143377554c5a9163cc203a8ed2ba",[263],{"@type":264,"property":265,"operator":266,"value":267},"@builder.io/core:Query","urlPath","is","/uc/zero-day-phishing-protection",{"inputs":269,"customFonts":270,"seoTitle":318,"title":318,"tsCode":37,"seoDescription":319,"fontAwesomeIcon":320,"jsCode":37,"blocks":321,"url":267,"state":426},[],[271],{"family":272,"kind":273,"version":274,"lastModified":275,"files":276,"category":295,"menu":296,"subsets":297,"variants":300},"DM Sans","webfonts#webfont","v14","2023-07-13",{"100":277,"200":278,"300":279,"500":280,"600":281,"700":282,"800":283,"900":284,"800italic":285,"900italic":286,"700italic":287,"100italic":288,"italic":289,"regular":290,"200italic":291,"500italic":292,"300italic":293,"600italic":294},"https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAop1hTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAIpxhTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwA_JxhTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAkJxhTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAfJthTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwARZthTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAIpthTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAC5thTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat8JCm3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat8gCm3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat9uCm3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat-JDG3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat-JDW3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAopxhTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat8JDW3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat-7DW3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat_XDW3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat9XCm3zRmYJpso5.ttf","sans-serif","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAopxRT23z.ttf",[298,299],"latin","latin-ext",[301,302,303,304,305,306,128,307,308,309,310,311,312,313,314,315,316,317],"100","200","300","regular","500","600","800","900","100italic","200italic","300italic","italic","500italic","600italic","700italic","800italic","900italic","Zero-day phishing protection","Detect phishing TTPs directly in the browser and stop credential theft.","faFishingRod",[322,421],{"@type":106,"@version":107,"tagName":323,"id":324,"children":325},"div","builder-76c6b8d1499346c7bc1fd56ae4e93638",[326,343,351,358,370,385,396,407,413],{"@type":106,"@version":107,"layerName":327,"id":328,"component":329,"responsiveStyles":340},"UseCaseHero","builder-5228fe062bef4a40a91e43f1112832fa",{"name":327,"options":330,"isRSC":118},{"title":318,"description":331,"points":332,"video":339},"\u003Cp>Push detects phishing as it happens. Autonomous agents hunt for new phishing techniques, identify kit signatures, and deploy detections within minutes of a new attack being analyzed. From cloned login pages to AiTM credential harvesting, Push sees what traditional filters miss and stops threats before they escalate.\u003C/p>",[333,335,337],{"item":334},"Detect phishing that bypasses traditional filters, including AiTM, SSO password theft, and fake login pages",{"item":336},"Stop never-before-seen attacks with AI-native behavioral and on-page analysis inside the browser",{"item":338},"Investigate faster with unified browser, user, and page context","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F40433ceeb4f94b43a82e039a0f4fd411%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=40433ceeb4f94b43a82e039a0f4fd411&alt=media&optimized=true",{"large":341},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":342},"transparent",{"@type":106,"@version":107,"id":344,"component":345,"responsiveStyles":348},"builder-96634044407e491299e291ed64669e39",{"name":346,"options":347,"isRSC":118},"TrustedBy",{"AllPartners":41,"backgroundTransparent":6},{"large":349},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":350},"#000",{"@type":106,"@version":107,"id":352,"component":353,"responsiveStyles":356},"builder-2c3768f930534557bb8978e32b6a6a0f",{"name":354,"options":355,"isRSC":118},"Diagonal",{"darkMode":41},{"large":357},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"layerName":359,"id":360,"component":361,"responsiveStyles":368},"TextImageBlockVertical","builder-7c3c1c2840424db2ad2ccbfaf382dd64",{"name":359,"tag":359,"options":362,"isRSC":118},{"darkMode":6,"maxWidth":363,"maxTextWidth":364,"title":365,"description":366,"animatedTitle":37,"image":367,"reverse":6,"descriptionPaddingHorizontal":118},1200,800,"\u003Ch2>Why stop at the inbox?\u003C/h2>","\u003Cp>Phishing attacks have evolved. Whether attackers lure users with QR codes, instant messages, or OAuth consent screens, the outcome is the same: it plays out in the browser. Push gives you real-time detection for in-browser threats, stopping phishing and consent-based attacks before they lead to compromise\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F7fdcac241f0e4a049166d7076858adeb",{"large":369},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":371,"component":372,"responsiveStyles":380},"builder-41c978b3669749cf947e622b4e79e4d7",{"name":373,"options":374,"isRSC":118},"TextImageBlockHorizontal",{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":376,"title":377,"description":378,"reverse":41,"image":379},600,100,"\u003Cp>Detect phishing at the edge\u003C/p>","\u003Cp>Push uses industry-first telemetry to detect phishing based on behavior, not static indicators. Autonomous agents analyze how phishing pages behave and how users interact with them, uncovering fake logins, credential theft, and phishing kits the moment they load in the browser.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F9df3d180c97b4e61af142af2ccd68721",{"large":381},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":382,"paddingTop":383,"marginTop":384},"DM Sans, sans-serif","20px","0px",{"@type":106,"@version":107,"id":386,"component":387,"responsiveStyles":393},"builder-d2a7bc941feb43cdb898bc116b203cf9",{"name":373,"options":388,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":389,"title":390,"description":391,"reverse":6,"image":392},120,"\u003Ch2>Go beyond blocklists and IOCs\u003C/h2>","\u003Cp>Push goes beyond URLs and easy-to-change indicators. It reads the full phishing playbook like script behavior, session hijacks, DOM changes, user inputs, then connects the dots in real time. This gives your team a complete picture of how the phishing attempt worked, not just an alert.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fabfd58db169b433e96d3f1261797156e",{"large":394},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":395},"36px",{"@type":106,"@version":107,"layerName":373,"id":397,"component":398,"responsiveStyles":404},"builder-42c32198083f4880acb37c5cb76934da",{"name":373,"options":399,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":400,"title":401,"description":402,"reverse":41,"image":403},140,"\u003Ch2>Enhance your phishing response\u003C/h2>","\u003Cp>When phishing enters your environment, speed matters. Push gives you instant access to the telemetry that counts like session data, user behavior, and page activity, so you can investigate fast, trigger in-browser prompts, or forward alerts to your SIEM or SOAR for response. All in real time, right from the browser.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fbb195aec46904056b85e8688629e558e",{"large":405},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":406},"47px",{"@type":106,"@version":107,"id":408,"component":409,"responsiveStyles":411},"builder-9a95b9cbc4854421a92ef7b90f6c7adb",{"name":354,"options":410,"isRSC":118},{"darkMode":6},{"large":412},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":414,"component":415,"responsiveStyles":419},"builder-0afa17a9f25c4661a90f314d5578aa18",{"name":416,"tag":416,"options":417,"isRSC":118},"LatestResources",{"sectionHeading":37,"customClass":418},"bg-black",{"large":420},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":422,"@type":106,"tagName":131,"properties":423,"responsiveStyles":424},"builder-pixel-21yj6h3p4wh",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":425},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":427},{"path":37,"query":428},{},{},1776275046831,1745499158657,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fff60c30a8442489c8ed7e0af9599d14f","kYgMv6WsbvfmlOUYqR2SFwGzw6e2",[],{"lastPreviewUrl":436,"winningTest":118,"breakpoints":437,"kind":438,"hasLinks":6,"originalContentId":439,"hasAutosaves":6},"https://pushsecurity.com/uc/zero-day-phishing-protection?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CcreateProjects%2CsendPullRequests&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=387451215c314dd5bd654668cdc1a197&builder.overrides.387451215c314dd5bd654668cdc1a197=387451215c314dd5bd654668cdc1a197&builder.overrides.use-case-page:/uc/zero-day-phishing-protection=387451215c314dd5bd654668cdc1a197&builder.options.locale=Default",{"xsmall":57,"small":39,"medium":40},"page","2daa5670b8504fc7ba4700633e8bd921","atvz4dp24b7",{"createdDate":442,"id":443,"name":444,"modelId":261,"published":13,"stageModifiedSincePublish":6,"query":445,"data":448,"variations":552,"lastUpdated":553,"firstPublished":554,"testRatio":33,"screenshot":555,"createdBy":34,"lastUpdatedBy":433,"folders":556,"meta":557,"rev":440},1756833377777,"54f8256648f54d439303734b1e69221b","Browser extension security",[446],{"@type":264,"property":265,"operator":266,"value":447},"/uc/browser-extension-security",{"seoDescription":449,"jsCode":37,"fontAwesomeIcon":450,"tsCode":37,"title":444,"seoTitle":444,"customFonts":451,"inputs":456,"blocks":457,"url":447,"state":549},"Shine a light on risky browser extensions.","faPuzzlePiece",[452],{"kind":273,"family":272,"version":274,"files":453,"category":295,"lastModified":275,"subsets":454,"variants":455,"menu":296},{"100":277,"200":278,"300":279,"500":280,"600":281,"700":282,"800":283,"900":284,"100italic":288,"italic":289,"regular":290,"900italic":286,"800italic":285,"700italic":287,"200italic":291,"300italic":293,"500italic":292,"600italic":294},[298,299],[301,302,303,304,305,306,128,307,308,309,310,311,312,313,314,315,316,317],[],[458,544],{"@type":106,"@version":107,"tagName":323,"id":459,"meta":460,"children":461},"builder-71d0648c1d2f4ede8d0d0b5b28b7b94c",{"previousId":324},[462,478,485,492,501,511,521,531,538],{"@type":106,"@version":107,"id":463,"meta":464,"component":465,"responsiveStyles":476},"builder-ff325b4b8fad4edea53f38865947e854",{"previousId":328},{"name":327,"options":466,"isRSC":118},{"title":444,"description":467,"points":468,"video":475},"\u003Cp>Browser extensions introduce new code, new permissions, and new potential for risk. Many include AI features, and most go completely unnoticed. Push gives you full visibility into every extension used across your workforce, across major browsers, so you can uncover shadow IT, assess risky permissions, and block unsafe tools before they lead to compromise.\u003C/p>",[469,471,473],{"item":470},"Discover every browser extension in use",{"item":472},"Spot risky or unsanctioned behavior",{"item":474},"Make informed decisions on extension policy","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fc538aad95d7f403aa3c3551af72f67c0?alt=media&token=1411fa6d-2eac-4e6c-94bf-ea117da12d67&apiKey=f3a1111ff5be48cdbb123cd9f5795a05",{"large":477},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":342},{"@type":106,"@version":107,"id":479,"meta":480,"component":481,"responsiveStyles":483},"builder-fb89d128c64e47cf9cbb11d90fc24523",{"previousId":344},{"name":346,"options":482,"isRSC":118},{"AllPartners":41,"backgroundTransparent":6},{"large":484},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":350},{"@type":106,"@version":107,"id":486,"meta":487,"component":488,"responsiveStyles":490},"builder-54388d35126c4d0096eeebaf8c4448cd",{"previousId":352},{"name":354,"options":489,"isRSC":118},{"darkMode":41},{"large":491},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"layerName":359,"id":493,"component":494,"responsiveStyles":499},"builder-3c8fa6785dd6466abf52a2470d66d85a",{"name":359,"tag":359,"options":495,"isRSC":118},{"darkMode":6,"maxWidth":363,"maxTextWidth":364,"title":496,"description":497,"image":498,"reverse":6},"\u003Ch2>Take control of browser extensions\u003C/h2>","\u003Cp>Attackers are increasingly using malicious browser extensions to gain access to data processed and stored in the browser. And the problem is, most security teams have no visibility into what extensions are being used. Push changes that. With browser-native telemetry, the Push extension continuously inventories browser extensions across your environment, flags the risky ones, and gives you intelligence to act.&nbsp;\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F0a004f16a6874f4c8fdf14344acc9fec",{"large":500},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":502,"meta":503,"component":504,"responsiveStyles":509},"builder-93738f98109a4009affb349afd7bb182",{"previousId":371},{"name":373,"options":505,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":376,"title":506,"description":507,"reverse":41,"image":508},"\u003Ch2>Discover every extension in use\u003C/h2>","\u003Cp>Push gives you structured, searchable data about every extension in your environment, so you’re not just seeing what’s there, but also understanding how it got there, what it can do, and who it affects. It’s the kind of granular insight that’s nearly impossible to get from traditional tools, and it lays the groundwork for better policy decisions and faster investigations.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F0e5727ca99474f14b1b7916bf6bbb782",{"large":510},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":382,"paddingTop":383,"marginTop":384},{"@type":106,"@version":107,"id":512,"meta":513,"component":514,"responsiveStyles":519},"builder-83393acb12ee4fdd840839185b51edb4",{"previousId":386},{"name":373,"options":515,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":389,"title":516,"description":517,"reverse":6,"image":518},"\u003Ch2>Spot risky or malicious extensions\u003C/h2>","\u003Cp>Push highlights extensions with dangerous permissions, broad access, or poor reputations. This includes AI extensions that request access far beyond what their stated purpose requires. You can quickly detect sideloaded, manually installed, or development-mode extensions that bypass normal controls. And because Push shows you who’s using them and where, you can respond precisely and effectively.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fa104d58c8da34fbb8901f738fb21453b",{"large":520},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":395},{"@type":106,"@version":107,"layerName":373,"id":522,"meta":523,"component":524,"responsiveStyles":529},"builder-da98e3de949646d89c53a0d1c2784664",{"previousId":397},{"name":373,"options":525,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":400,"title":526,"description":527,"reverse":41,"image":528},"\u003Ch2>Accelerate security reviews\u003C/h2>","\u003Cp>Most teams have extension policies, they just don’t have the data to enforce them. Push reveals how each extension entered your environment, whether it was installed manually, sideloaded, or deployed in dev mode. You’ll see which users are running what, and where, so you can surface violations, investigate quickly, and respond with confidence.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F229f355be6f243b180f410d237a75bb3",{"large":530},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":406},{"@type":106,"@version":107,"id":532,"meta":533,"component":534,"responsiveStyles":536},"builder-1a689287d1a1418997d57db578a71105",{"previousId":408},{"name":354,"options":535,"isRSC":118},{"darkMode":6},{"large":537},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":539,"component":540,"responsiveStyles":542},"builder-feb4e75029f84c10b6498ef1f8f79128",{"name":416,"tag":416,"options":541,"isRSC":118},{"sectionHeading":37,"customClass":418},{"large":543},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":545,"@type":106,"tagName":131,"properties":546,"responsiveStyles":547},"builder-pixel-0edn39avfcei",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":548},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":550},{"path":37,"query":551},{},{},1776275365038,1757000441666,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F8d496cf111644ee5afcc046b72d1ca5a",[],{"kind":438,"winningTest":118,"breakpoints":558,"lastPreviewUrl":559,"hasLinks":6,"originalContentId":259,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},"https://pushsecurity.com/uc/browser-extension-security?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CcreateProjects%2CsendPullRequests&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=54f8256648f54d439303734b1e69221b&builder.overrides.54f8256648f54d439303734b1e69221b=54f8256648f54d439303734b1e69221b&builder.overrides.use-case-page:/uc/browser-extension-security=54f8256648f54d439303734b1e69221b&builder.options.locale=Default",{"createdDate":561,"id":562,"name":563,"modelId":261,"published":13,"query":564,"data":567,"variations":670,"lastUpdated":671,"firstPublished":672,"testRatio":33,"screenshot":673,"createdBy":34,"lastUpdatedBy":674,"folders":675,"meta":676,"rev":440},1744923509705,"94bebb7bb99d48629ad157e80cf4d81d","Account takeover detection",[565],{"@type":264,"property":265,"operator":266,"value":566},"/uc/account-takeover-detection",{"title":563,"customFonts":568,"jsCode":37,"seoTitle":563,"seoDescription":573,"fontAwesomeIcon":574,"tsCode":37,"blocks":575,"url":566,"state":667},[569],{"kind":273,"category":295,"variants":570,"menu":296,"files":571,"family":272,"subsets":572,"version":274,"lastModified":275},[301,302,303,304,305,306,128,307,308,309,310,311,312,313,314,315,316,317],{"100":277,"200":278,"300":279,"500":280,"600":281,"700":282,"800":283,"900":284,"300italic":293,"500italic":292,"800italic":285,"700italic":287,"italic":289,"900italic":286,"600italic":294,"200italic":291,"regular":290,"100italic":288},[298,299],"Stop ATO with stolen credential and compromised token detection.","faUserSecret",[576,662],{"@type":106,"@version":107,"tagName":323,"id":577,"meta":578,"children":579},"builder-e7913a774cae44c5a23d6081c5c30a52",{"previousId":324},[580,596,603,610,619,629,639,649,656],{"@type":106,"@version":107,"id":581,"meta":582,"component":583,"responsiveStyles":594},"builder-f1f1ab1601bc4c0f8c2a8aafd173675d",{"previousId":328},{"name":327,"options":584,"isRSC":118},{"title":563,"description":585,"points":586,"video":593},"\u003Cp>Attackers don’t need to phish, they just need a password that works. Push monitors for signs of credential-based attacks in real time, directly in the browser, catching account takeover attempts before the damage spreads. From ghost logins to credential stuffing, Push cuts off the paths attackers use to quietly slip in the back door.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>",[587,589,591],{"item":588},"Identify credential-based ATO as it unfolds",{"item":590},"Surface hijacked sessions and token misuse",{"item":592},"Strengthen authentication where your IdP can’t","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb4dd9db24bc9495b8a686b1b4d492016%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=b4dd9db24bc9495b8a686b1b4d492016&alt=media&optimized=true",{"large":595},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":342},{"@type":106,"@version":107,"id":597,"meta":598,"component":599,"responsiveStyles":601},"builder-0bc0d1c78ece4994993c3a6427a4d533",{"previousId":344},{"name":346,"options":600,"isRSC":118},{"AllPartners":41,"backgroundTransparent":6},{"large":602},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":350},{"@type":106,"@version":107,"id":604,"meta":605,"component":606,"responsiveStyles":608},"builder-e45de8f3768c4f16938dbf78e4e87524",{"previousId":352},{"name":354,"options":607,"isRSC":118},{"darkMode":41},{"large":609},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":611,"component":612,"responsiveStyles":617},"builder-c98e8bfd341146c1b67c02d5698ff093",{"name":359,"tag":359,"options":613,"isRSC":118},{"darkMode":6,"maxWidth":363,"maxTextWidth":364,"title":614,"description":615,"image":616,"reverse":6},"\u003Ch2>Assume less. See more.\u003C/h2>","\u003Cp>Most account takeovers don’t start with a breach, they start with a login. Whether it’s a reused password, a local account, or an outdated login flow, Push shows you how accounts are actually accessed day to day, not just how policies say they should be. That means no more blind spots around ghost logins, bypassed SSO, or stale access paths that quietly persist.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F18630ad2746d4eb7b7fcc0428b11a8f0",{"large":618},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":620,"meta":621,"component":622,"responsiveStyles":627},"builder-55c1fc38ddc04fd1a0d6a8e2fb819e00",{"previousId":371},{"name":373,"options":623,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":376,"title":624,"description":625,"reverse":41,"image":626},"\u003Ch2>Catch stolen credential use in real time\u003C/h2>","\u003Cp>Push monitors login activity directly in the browser to detect signs of credential-based attacks like leaked password use or suspicious login flows. By analyzing attacker TTPs instead of relying on known indicators, Push spots credential stuffing and account takeover attempts the moment they begin, not after they’ve succeeded.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F52b0123cac2c4dfdb1dc0af6adf9d603",{"large":628},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":382,"paddingTop":384,"marginTop":384},{"@type":106,"@version":107,"id":630,"meta":631,"component":632,"responsiveStyles":637},"builder-dfb31737b30948c6b95323655d571a50",{"previousId":386},{"name":373,"options":633,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":389,"title":634,"description":635,"reverse":6,"image":636},"\u003Ch2>Detect session hijacks and stealth access\u003C/h2>","\u003Cp>Attackers don’t always need a login screen, they often sidestep it entirely using stolen session tokens. Push detects when valid sessions are reused in unexpected ways, identifying hijacked sessions and stealth access attempts that traditional tools miss. Because we monitor directly in the browser, you see what’s happening inside active sessions in real time.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F94a6859a99e04d309ffe5841f3dbdf5c",{"large":638},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":395},{"@type":106,"@version":107,"layerName":373,"id":640,"meta":641,"component":642,"responsiveStyles":647},"builder-f7585b90eb974d03a7dc7eae5b58d227",{"previousId":397},{"name":373,"options":643,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":400,"title":644,"description":645,"reverse":41,"image":646},"\u003Ch2>Harden accounts before they’re compromised\u003C/h2>","\u003Cp>Push goes beyond alerts. It identifies apps that still allow local logins, even when SSO is configured, so you can remove weak access paths. Push also flags users without MFA, reused work credentials, or weak passwords, and prompts users in-browser to fix risky behaviors before they’re exploited.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F01c1b638f1b6497093a4f2b8ceddb5bb",{"large":648},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":406},{"@type":106,"@version":107,"id":650,"meta":651,"component":652,"responsiveStyles":654},"builder-ad81d1e3afec49a791214194eae09bdc",{"previousId":408},{"name":354,"options":653,"isRSC":118},{"darkMode":6},{"large":655},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":657,"component":658,"responsiveStyles":660},"builder-8dac1aa4b9d148628d92252bd8eff822",{"name":416,"tag":416,"options":659,"isRSC":118},{"sectionHeading":37,"customClass":418},{"large":661},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":663,"@type":106,"tagName":131,"properties":664,"responsiveStyles":665},"builder-pixel-s5u3wmvz7jq",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":666},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":668},{"path":37,"query":669},{},{},1770892814499,1745499162732,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F58b660fa94aa4b30b0faeb9b663ae41a","SfUPqW5tkibIPby49keNFMdHFTr1",[],{"lastPreviewUrl":677,"hasLinks":6,"originalContentId":259,"breakpoints":678,"winningTest":118,"kind":438,"hasAutosaves":41},"https://pushsecurity.com/uc/account-takeover-detection?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=94bebb7bb99d48629ad157e80cf4d81d&builder.overrides.94bebb7bb99d48629ad157e80cf4d81d=94bebb7bb99d48629ad157e80cf4d81d&builder.overrides.use-case-page:/uc/account-takeover-detection=94bebb7bb99d48629ad157e80cf4d81d&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"xsmall":57,"small":39,"medium":40},{"createdDate":680,"id":681,"name":682,"modelId":261,"published":13,"query":683,"data":686,"variations":789,"lastUpdated":790,"firstPublished":791,"testRatio":33,"screenshot":792,"createdBy":34,"lastUpdatedBy":674,"folders":793,"meta":794,"rev":440},1745009370904,"23eb48fb56d3451cab77cb6ed140ee6d","Attack path hardening",[684],{"@type":264,"property":265,"operator":266,"value":685},"/uc/attack-path-hardening",{"tsCode":37,"seoDescription":687,"jsCode":37,"customFonts":688,"fontAwesomeIcon":693,"seoTitle":682,"title":682,"blocks":694,"url":685,"state":786},"Harden access paths with visibility,  detection, and guardrails.",[689],{"kind":273,"files":690,"version":274,"lastModified":275,"subsets":691,"menu":296,"category":295,"variants":692,"family":272},{"100":277,"200":278,"300":279,"500":280,"600":281,"700":282,"800":283,"900":284,"regular":290,"italic":289,"800italic":285,"500italic":292,"600italic":294,"200italic":291,"900italic":286,"700italic":287,"100italic":288,"300italic":293},[298,299],[301,302,303,304,305,306,128,307,308,309,310,311,312,313,314,315,316,317],"faRadar",[695,781],{"@type":106,"@version":107,"tagName":323,"id":696,"meta":697,"children":698},"builder-1d8553eddcaa44d7bba9e2f4ca13af2a",{"previousId":577},[699,715,722,729,738,748,758,768,775],{"@type":106,"@version":107,"id":700,"meta":701,"component":702,"responsiveStyles":713},"builder-84fe3d7c85a743cf8cef649aa974f1ef",{"previousId":581},{"name":327,"options":703,"isRSC":118},{"title":682,"description":704,"points":705,"video":712},"\u003Cp>Push continuously monitors your environment for exposed login paths, weak credentials, and missing protections like MFA. It detects the gaps attackers exploit and helps you close them before they’re used.\u003C/p>",[706,708,710],{"item":707},"Find weak spots like reused passwords, local logins, and missing MFA",{"item":709},"Monitor how users actually log in across apps, flows, and tools",{"item":711},"Enforce secure access with in-browser guardrails","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fdbdcf52892034f1bbddded77f753a343%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=dbdcf52892034f1bbddded77f753a343&alt=media&optimized=true",{"large":714},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":342},{"@type":106,"@version":107,"id":716,"meta":717,"component":718,"responsiveStyles":720},"builder-b3f66f5b08054cc78a06fecfc3ae2337",{"previousId":597},{"name":346,"options":719,"isRSC":118},{"AllPartners":41,"backgroundTransparent":6},{"large":721},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":350},{"@type":106,"@version":107,"id":723,"meta":724,"component":725,"responsiveStyles":727},"builder-4c73418b84be49ed85e6e13d2625c5a0",{"previousId":604},{"name":354,"options":726,"isRSC":118},{"darkMode":41},{"large":728},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":730,"component":731,"responsiveStyles":736},"builder-dec0246085e1485c803f7152b1922a81",{"name":359,"tag":359,"options":732,"isRSC":118},{"darkMode":6,"maxWidth":363,"maxTextWidth":364,"title":733,"description":734,"image":735,"reverse":6},"\u003Ch2>Find the gaps that lead to compromise\u003C/h2>","\u003Cp>Misconfigurations don’t show up in your config files, they show up in how users actually access apps. Push monitors real login behavior in the browser, surfacing risky patterns like local login access, duplicate accounts, or missing protections that leave doors wide open.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F309a59bba8d247a19476bb369397460e",{"large":737},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":739,"meta":740,"component":741,"responsiveStyles":746},"builder-ebf049a645604a249550996a88f8f3b6",{"previousId":620},{"name":373,"options":742,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":376,"title":743,"description":744,"reverse":41,"image":745},"\u003Ch2>See real login behavior\u003C/h2>","\u003Cp>Push watches authentication flows as they happen, giving you a live view of how users log in, which methods they choose, and where protections like MFA are missing. Plus, uncover every app and account in use, even shadow IT you didn’t know existed, without relying on stale config files or IdP assumptions. \u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb51f6b0357cc451b87a7a5016d984e5e",{"large":747},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":382,"paddingTop":383,"marginTop":384},{"@type":106,"@version":107,"id":749,"meta":750,"component":751,"responsiveStyles":756},"builder-431d175c59004669b0b2776b07d71737",{"previousId":630},{"name":373,"options":752,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":389,"title":753,"description":754,"reverse":6,"image":755},"\u003Ch2>Find and fix posture drift\u003C/h2>","\u003Cp>Security posture isn’t static. Push continuously monitors for issues like missing MFA or legacy login methods. When something falls out of policy, you know immediately with custom notifications so you can act before it turns into risk.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F324e39127dfc41e592b1183dfb39892d",{"large":757},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":395},{"@type":106,"@version":107,"layerName":373,"id":759,"meta":760,"component":761,"responsiveStyles":766},"builder-3dffdcbe0a484e2ca4c03f019b6d40ee",{"previousId":640},{"name":373,"options":762,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":400,"title":763,"description":764,"reverse":41,"image":765},"\u003Ch2>Guide users with in-browser guardrails\u003C/h2>","\u003Cp>Push doesn’t just surface problems, it helps you fix them. When users sign in without MFA, reuse a password, or use insecure credentials, Push prompts them directly in the browser to secure their access. It’s faster, more effective, and actually gets results.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fee8b75d13e45488aba55434a8b49ebb0",{"large":767},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":406},{"@type":106,"@version":107,"id":769,"meta":770,"component":771,"responsiveStyles":773},"builder-976bc222cd7647ff905f1e01cfedc453",{"previousId":650},{"name":354,"options":772,"isRSC":118},{"darkMode":6},{"large":774},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":776,"component":777,"responsiveStyles":779},"builder-8c47ec2fd0f74382bb3e6c870555632c",{"name":416,"tag":416,"options":778,"isRSC":118},{"sectionHeading":37,"customClass":418},{"large":780},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":782,"@type":106,"tagName":131,"properties":783,"responsiveStyles":784},"builder-pixel-7akm7dayau8",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":785},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":787},{"path":37,"query":788},{},{},1770892844854,1745499166112,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F6ca12bf728a045f1a31d40c0beb3bfe5",[],{"kind":438,"lastPreviewUrl":795,"breakpoints":796,"hasLinks":6,"originalContentId":562,"winningTest":118,"hasAutosaves":6},"https://pushsecurity.com/uc/attack-path-hardening?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=23eb48fb56d3451cab77cb6ed140ee6d&builder.overrides.23eb48fb56d3451cab77cb6ed140ee6d=23eb48fb56d3451cab77cb6ed140ee6d&builder.overrides.use-case-page:/uc/attack-path-hardening=23eb48fb56d3451cab77cb6ed140ee6d&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"xsmall":57,"small":39,"medium":40},{"createdDate":798,"id":799,"name":800,"modelId":261,"published":13,"query":801,"data":804,"variations":909,"lastUpdated":910,"firstPublished":911,"testRatio":33,"screenshot":912,"createdBy":34,"lastUpdatedBy":674,"folders":913,"meta":914,"rev":440},1761675020232,"ea4f309d2ffe46c5aa97ebf0fda4e2e3","ClickFix Protection",[802],{"@type":264,"property":265,"operator":266,"value":803},"/uc/clickfix-protection",{"seoDescription":805,"fontAwesomeIcon":806,"customFonts":807,"seoTitle":812,"jsCode":37,"tsCode":37,"title":812,"blocks":813,"url":803,"state":906},"Block attacks that trick users into running malicious code.","faLaptopCode",[808],{"files":809,"subsets":810,"menu":296,"version":274,"kind":273,"family":272,"lastModified":275,"variants":811,"category":295},{"100":277,"200":278,"300":279,"500":280,"600":281,"700":282,"800":283,"900":284,"200italic":291,"800italic":285,"700italic":287,"600italic":294,"100italic":288,"italic":289,"regular":290,"300italic":293,"500italic":292,"900italic":286},[298,299],[301,302,303,304,305,306,128,307,308,309,310,311,312,313,314,315,316,317],"ClickFix protection",[814,901],{"@type":106,"@version":107,"tagName":323,"id":815,"meta":816,"children":817},"builder-d7eefdde0f2a4b2b9de3dcb2978fd6cb",{"previousId":696},[818,834,841,848,858,868,878,888,895],{"@type":106,"@version":107,"id":819,"meta":820,"component":821,"responsiveStyles":832},"builder-56e2c54bcce040a4af8b92ae03706c12",{"previousId":700},{"name":327,"options":822,"isRSC":118},{"title":812,"description":823,"points":824,"image":831},"\u003Cp>ClickFix attacks are one of the fastest-growing threats, tricking users into copying malicious code from a webpage and running it locally. This technique bypasses traditional EDR, email gateways, and network filters, leading directly to ransomware and data theft. Push stops this attack at the source, in the browser, by detecting and blocking the malicious behavior before the user can ever paste the code.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>",[825,827,829],{"item":826},"Detect ClickFix, FileFix, and fake CAPTCHA in the browser",{"item":828},"Block malicious copy-and-paste actions before code is executed",{"item":830},"See full telemetry into which users were targeted and what they saw","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F7b74af62889847ebb3927364485b0546",{"large":833},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":342},{"@type":106,"@version":107,"id":835,"meta":836,"component":837,"responsiveStyles":839},"builder-05f9614d4e3e4dc88b3ee8658f54e10e",{"previousId":716},{"name":346,"options":838,"isRSC":118},{"AllPartners":41,"backgroundTransparent":6},{"large":840},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":350},{"@type":106,"@version":107,"id":842,"meta":843,"component":844,"responsiveStyles":846},"builder-c4fb5179366243c1b6c32d368675cf47",{"previousId":723},{"name":354,"options":845,"isRSC":118},{"darkMode":41},{"large":847},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":849,"meta":850,"component":851,"responsiveStyles":856},"builder-261af50705fd445d8cca4a6ba20d5391",{"previousId":730},{"name":359,"tag":359,"options":852,"isRSC":118},{"darkMode":6,"maxWidth":363,"maxTextWidth":364,"title":853,"description":854,"reverse":6,"image":855},"\u003Ch2>Stop ClickFix-style attacks before they become a breach\u003C/h2>","\u003Cp>Traditional security tools are blind to malicious copy and paste attacks because the attack exploits a gap between the browser and the endpoint. EDR only sees the payload after it runs, and network tools see only part of the picture.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F98b2f7e08dec4eafaf8e24937605b8cf",{"large":857},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":859,"meta":860,"component":861,"responsiveStyles":866},"builder-7d21b8aab8064c40b1e5dd23c4749309",{"previousId":739},{"name":373,"options":862,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":376,"title":863,"description":864,"reverse":41,"image":865},"\u003Ch2>Discover lures at the source\u003C/h2>","\u003Cp>Push inspects page behavior to identify ClickFix attacks as they happen. By inspecting the page, its structure, and how the user interacts with it, Push can detect and block these in-browser threats in real time. This deep, TTP-based inspection spots the trap even on novel pages that are built to bypass traditional web filters and blocklists.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F665bf47e01544c75bf9ddafd3917927b",{"large":867},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":382,"paddingTop":383,"marginTop":384},{"@type":106,"@version":107,"id":869,"meta":870,"component":871,"responsiveStyles":876},"builder-fb91943adf6149259ed9e1e6566c9afe",{"previousId":749},{"name":373,"options":872,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":389,"title":873,"description":874,"reverse":6,"image":875},"\u003Ch2>Block the malicious action\u003C/h2>","\u003Cp>When Push detects a malicious script, it intercepts the user's action and blocks the code from being copied to the clipboard. The user is protected, the attack is stopped, and no malicious code ever reaches the endpoint. Unlike broad DLP tools, this action is surgical, targeting only malicious behavior without disrupting normal work.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F5ee68f81f1ac416685cbfe91298cf827",{"large":877},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":395},{"@type":106,"@version":107,"layerName":373,"id":879,"meta":880,"component":881,"responsiveStyles":886},"builder-bfac95fada864e5a8259b955b5b5f98b",{"previousId":759},{"name":373,"options":882,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":400,"title":883,"description":884,"reverse":41,"image":885},"\u003Ch2>Accelerate ClickFix investigations\u003C/h2>","\u003Cp>When an attack happens, knowing what the user saw or did is critical. Push provides rich browser session data for rapid investigation and containment. Security teams get detailed telemetry on which users were targeted, what lure they were served, and when the block occurred. This enables defenders to reconstruct what happened and respond quickly, even when other tools miss the activity entirely.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F6cdf2a8aeddc4e9a9023cbf974e40239",{"large":887},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":406},{"@type":106,"@version":107,"id":889,"meta":890,"component":891,"responsiveStyles":893},"builder-136892e831684a6987f87d3be67c33d1",{"previousId":769},{"name":354,"options":892,"isRSC":118},{"darkMode":6},{"large":894},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":896,"component":897,"responsiveStyles":899},"builder-dec26b739f2f42beb5a73cfc6c675b60",{"name":416,"tag":416,"options":898,"isRSC":118},{"sectionHeading":37,"customClass":418},{"large":900},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":902,"@type":106,"tagName":131,"properties":903,"responsiveStyles":904},"builder-pixel-zzjpxxgrc2l",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":905},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":907},{"path":37,"query":908},{},{},1770892881888,1761847585203,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F375467b8bef34ed1a8a1cc5b8b67d75f",[],{"lastPreviewUrl":915,"originalContentId":681,"winningTest":118,"hasLinks":6,"kind":438,"breakpoints":916,"hasAutosaves":6},"https://pushsecurity.com/uc/clickfix-protection?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=ea4f309d2ffe46c5aa97ebf0fda4e2e3&builder.overrides.ea4f309d2ffe46c5aa97ebf0fda4e2e3=ea4f309d2ffe46c5aa97ebf0fda4e2e3&builder.overrides.use-case-page:/uc/clickfix-protection=ea4f309d2ffe46c5aa97ebf0fda4e2e3&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"xsmall":57,"small":39,"medium":40},{"createdDate":918,"id":919,"name":920,"modelId":261,"published":13,"query":921,"data":924,"variations":1029,"lastUpdated":1030,"firstPublished":1031,"testRatio":33,"screenshot":1032,"createdBy":34,"lastUpdatedBy":674,"folders":1033,"meta":1034,"rev":440},1745009743870,"a9d5556e77f84a37b5bd52310a7110c1","Incident response",[922],{"@type":264,"property":265,"operator":266,"value":923},"/uc/incident-response",{"seoDescription":925,"customFonts":926,"title":920,"jsCode":37,"fontAwesomeIcon":931,"seoTitle":932,"tsCode":37,"blocks":933,"url":923,"state":1026},"Investigate and respond faster with unique browser telemetry.",[927],{"kind":273,"subsets":928,"menu":296,"variants":929,"category":295,"family":272,"version":274,"lastModified":275,"files":930},[298,299],[301,302,303,304,305,306,128,307,308,309,310,311,312,313,314,315,316,317],{"100":277,"200":278,"300":279,"500":280,"600":281,"700":282,"800":283,"900":284,"900italic":286,"600italic":294,"200italic":291,"300italic":293,"100italic":288,"700italic":287,"800italic":285,"regular":290,"italic":289,"500italic":292},"faSatelliteDish","Browser based incident response",[934,1021],{"@type":106,"@version":107,"tagName":323,"id":935,"meta":936,"children":937},"builder-653c4aed737b4def88dc4cd2d695660a",{"previousId":696},[938,955,962,969,978,988,998,1008,1015],{"@type":106,"@version":107,"id":939,"meta":940,"component":941,"responsiveStyles":953},"builder-18190bd36518467d9154d27d7e945b9b",{"previousId":700},{"name":327,"options":942,"isRSC":118},{"title":943,"description":944,"points":945,"video":952},"Browser-based incident response","\u003Cp>Push gives you real-time visibility into what actually happened during a breach, right in the browser where the attack played out. From credential theft to session hijacking, Push captures high-fidelity telemetry so you can investigate quickly, contain confidently, and shut it down before it spreads.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>",[946,948,950],{"item":947},"Reconstruct what happened with real browser session context",{"item":949},"Investigate faster with real-world session context",{"item":951},"Trigger response actions automatically through your SIEM or SOAR","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fd00e39d3b6e346c296261d875cf55652%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=d00e39d3b6e346c296261d875cf55652&alt=media&optimized=true",{"large":954},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":342},{"@type":106,"@version":107,"id":956,"meta":957,"component":958,"responsiveStyles":960},"builder-8a0a8ea63f5d48dd8a6726f2d49cf0ca",{"previousId":716},{"name":346,"options":959,"isRSC":118},{"AllPartners":41,"backgroundTransparent":6},{"large":961},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":350},{"@type":106,"@version":107,"id":963,"meta":964,"component":965,"responsiveStyles":967},"builder-2df65c3f54334df2b26e7cb744886cdc",{"previousId":723},{"name":354,"options":966,"isRSC":118},{"darkMode":41},{"large":968},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":970,"component":971,"responsiveStyles":976},"builder-2c32c869efc2423ab69ef06b150e9f97",{"name":359,"tag":359,"options":972,"isRSC":118},{"darkMode":6,"maxWidth":363,"maxTextWidth":364,"title":973,"description":974,"image":975,"reverse":6},"\u003Ch2>See attacks unfold, not just their aftermath\u003C/h2>","\u003Cp>Attacks happen in the browser, not in logs. Push captures what traditional tools miss: what users clicked, what loaded, what was entered, and how attackers moved. That gives you real-world evidence, not just assumptions, when every second matters.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F36fc719bd1de4a38b916f4d25c81a26d",{"large":977},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":979,"meta":980,"component":981,"responsiveStyles":986},"builder-370e53c6016e432db01e9193a2ce90f6",{"previousId":739},{"name":373,"options":982,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":376,"title":983,"description":984,"reverse":41,"image":985},"\u003Ch2>Investigate faster with high-fidelity data\u003C/h2>","\u003Cp>Reconstructing an incident shouldn’t feel like guesswork. Push records detailed telemetry from inside the browser: page loads, credential inputs, DOM changes, session activity, user behavior. It’s structured, exportable, and ready to plug into your investigation workflows, so you can move fast without digging through proxy logs or relying on user reports.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fa6adda040e684e67a8d68a55c5ce5f6d",{"large":987},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":382,"paddingTop":384,"marginTop":384},{"@type":106,"@version":107,"id":989,"meta":990,"component":991,"responsiveStyles":996},"builder-a7f3767a8d184bd08fb24520bf210e95",{"previousId":749},{"name":373,"options":992,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":389,"title":993,"description":994,"reverse":6,"image":995},"\u003Ch2>Contain and respond in real time\u003C/h2>","\u003Cp>When something looks off, Push doesn’t just alert you, it gives you options. Guide users with in-browser prompts. Terminate sessions. Trigger SOAR workflows. Enrich SIEM alerts. Push gives you the context and control to stop spread before it starts.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb3dedeed5aba4847a2c2d22e10d0ec12",{"large":997},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":395},{"@type":106,"@version":107,"layerName":373,"id":999,"meta":1000,"component":1001,"responsiveStyles":1006},"builder-b92036ee0ece4b32acdbdcc7c377366b",{"previousId":759},{"name":373,"options":1002,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":400,"title":1003,"description":1004,"reverse":41,"image":1005},"\u003Ch2>Prevent the next one\u003C/h2>","\u003Cp>Push helps you respond fast, but it also helps you fix what went wrong. It surfaces misconfigurations and risky behaviors that made the attack possible in the first place, then guides users in-browser to remediate. One tool. Full loop. No loose ends.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fc1ecc2d5d3814b62b072fac01827ff96",{"large":1007},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":406},{"@type":106,"@version":107,"id":1009,"meta":1010,"component":1011,"responsiveStyles":1013},"builder-5e8ae39655274de89da32ab573a2525a",{"previousId":769},{"name":354,"options":1012,"isRSC":118},{"darkMode":6},{"large":1014},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1016,"component":1017,"responsiveStyles":1019},"builder-dfd6850cfb4741d2b8a0c16c2780f00a",{"name":416,"tag":416,"options":1018,"isRSC":118},{"sectionHeading":37,"customClass":418},{"large":1020},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":1022,"@type":106,"tagName":131,"properties":1023,"responsiveStyles":1024},"builder-pixel-z197gdgcmu",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":1025},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":1027},{"path":37,"query":1028},{},{},1770892908052,1745427419274,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb07017bfd318431690a5bb35bda35b99",[],{"kind":438,"breakpoints":1035,"originalContentId":681,"winningTest":118,"lastPreviewUrl":1036,"hasLinks":6,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},"https://pushsecurity.com/uc/incident-response?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=a9d5556e77f84a37b5bd52310a7110c1&builder.overrides.a9d5556e77f84a37b5bd52310a7110c1=a9d5556e77f84a37b5bd52310a7110c1&builder.overrides.use-case-page:/uc/incident-response=a9d5556e77f84a37b5bd52310a7110c1&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"createdDate":1038,"id":1039,"name":1040,"modelId":261,"published":13,"query":1041,"data":1044,"variations":1149,"lastUpdated":1150,"firstPublished":1151,"testRatio":33,"screenshot":1152,"createdBy":34,"lastUpdatedBy":674,"folders":1153,"meta":1154,"rev":440},1746122471259,"5f118e24433d46ceb79f5099987156d7","Shadow SaaS",[1042],{"@type":264,"property":265,"operator":266,"value":1043},"/uc/shadow-saas",{"seoTitle":1045,"seoDescription":1046,"customFonts":1047,"fontAwesomeIcon":1052,"title":1053,"jsCode":37,"tsCode":37,"blocks":1054,"url":1043,"state":1146},"Find and secure shadow SaaS","See and control shadow SaaS in the browser.",[1048],{"kind":273,"variants":1049,"files":1050,"family":272,"version":274,"subsets":1051,"lastModified":275,"category":295,"menu":296},[301,302,303,304,305,306,128,307,308,309,310,311,312,313,314,315,316,317],{"100":277,"200":278,"300":279,"500":280,"600":281,"700":282,"800":283,"900":284,"300italic":293,"500italic":292,"regular":290,"900italic":286,"italic":289,"100italic":288,"200italic":291,"600italic":294,"700italic":287,"800italic":285},[298,299],"faShieldCheck","Secure shadow SaaS",[1055,1141],{"@type":106,"@version":107,"tagName":323,"id":1056,"meta":1057,"children":1058},"builder-04da805c4cd34652a2db452fcda52e1d",{"previousId":935},[1059,1075,1082,1089,1098,1108,1118,1128,1135],{"@type":106,"@version":107,"id":1060,"meta":1061,"component":1062,"responsiveStyles":1073},"builder-830d414faeaf41439142f9157e8288c8",{"previousId":939},{"name":327,"options":1063,"isRSC":118},{"title":1045,"description":1064,"points":1065,"video":1072},"\u003Cp>SaaS sprawl is one of today’s fastest-growing security blind spots because most tools monitor around the edges. Push sees it at the source, in the browser, revealing every app users access, flagging risky tools, and helping you shut down exposure before it leads to a breach. No guesswork. No nasty surprises. Just real-time visibility and control.\u003C/p>",[1066,1068,1070],{"item":1067},"Discover every SaaS app users access, managed or not",{"item":1069},"Spot accounts with weak security postures like missing MFA, unmanaged access, and no SSO",{"item":1071},"Control usage with in-browser prompts, blocks, and security guardrails","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F3e4eece318d04d6586e691d59d0741cf%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=3e4eece318d04d6586e691d59d0741cf&alt=media&optimized=true",{"large":1074},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":342},{"@type":106,"@version":107,"id":1076,"meta":1077,"component":1078,"responsiveStyles":1080},"builder-cd7833f966cb4c7e8adf0d6c979414a6",{"previousId":956},{"name":346,"options":1079,"isRSC":118},{"AllPartners":41,"backgroundTransparent":6},{"large":1081},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":350},{"@type":106,"@version":107,"id":1083,"meta":1084,"component":1085,"responsiveStyles":1087},"builder-49d720b45430454e8b08c526f267c19f",{"previousId":963},{"name":354,"options":1086,"isRSC":118},{"darkMode":41},{"large":1088},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1090,"component":1091,"responsiveStyles":1096},"builder-3dde0bf6c8544e5e9ab41b18a9d68034",{"name":359,"tag":359,"options":1092,"isRSC":118},{"darkMode":6,"maxWidth":363,"maxTextWidth":364,"title":1093,"description":1094,"image":1095,"reverse":6},"\u003Ch2>Use your browser to curb Saas Sprawl\u003C/h2>","\u003Cp>Shadow SaaS isn’t hiding in your network, it’s in your browser. From AI tools to unsanctioned file-sharing sites, security risks live in the apps your users sign into every day. Push maps your organization's true SaaS footprint in real time, exposing apps and accounts with unmanaged access, poor authentication, or no security oversight.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb6811a214c7949b6bbe0b9a3bca62efd",{"large":1097},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1099,"meta":1100,"component":1101,"responsiveStyles":1106},"builder-e2420451ccdc4f088d0a4904cff45935",{"previousId":979},{"name":373,"options":1102,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":376,"title":1103,"description":1104,"reverse":41,"image":1105},"\u003Ch2>Discover hidden SaaS usage\u003C/h2>","\u003Cp>Push captures live browser telemetry across every tab and session. Whether a user signs into a sanctioned app with a personal account or tries a new AI plugin, you’ll see it in real time, with no integrations or manual tagging.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fe16e301f9af94665b95d98232a863d8a",{"large":1107},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":382,"paddingTop":384,"marginTop":384},{"@type":106,"@version":107,"id":1109,"meta":1110,"component":1111,"responsiveStyles":1116},"builder-b36de7fce7994beea9e58d94662e7166",{"previousId":989},{"name":373,"options":1112,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":389,"title":1113,"description":1114,"reverse":6,"image":1115},"\u003Ch2>Spot risky access and unsafe usage\u003C/h2>","\u003Cp>Discovery is just the beginning. Push flags apps with risky traits, no MFA, no SSO, known vulnerabilities, or broad access scopes. You’ll know which tools introduce real risk, and which users are exposed so you can act with precision.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F6585f3c242da4d70ae3cb7d02f481bef",{"large":1117},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":395},{"@type":106,"@version":107,"layerName":373,"id":1119,"meta":1120,"component":1121,"responsiveStyles":1126},"builder-dc366b5134684fe7a508edf8913103ea",{"previousId":999},{"name":373,"options":1122,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":400,"title":1123,"description":1124,"reverse":41,"image":1125},"\u003Ch2>Close gaps before they grow\u003C/h2>","\u003Cp>Push turns insight into action. When risky SaaS use is detected, guide users to enable MFA, block high-risk apps, or apply in-browser guardrails automatically. All without deploying new infrastructure or managing dozens of integrations.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fe6d60b6d91414819bc6258a318f00557",{"large":1127},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":406},{"@type":106,"@version":107,"id":1129,"meta":1130,"component":1131,"responsiveStyles":1133},"builder-8708f6f0d8da4b3f9e17bf16cda70219",{"previousId":1009},{"name":354,"options":1132,"isRSC":118},{"darkMode":6},{"large":1134},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1136,"component":1137,"responsiveStyles":1139},"builder-8ff4b38d60534cf28cb523ab0f754875",{"name":416,"tag":416,"options":1138,"isRSC":118},{"sectionHeading":37,"customClass":418},{"large":1140},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":1142,"@type":106,"tagName":131,"properties":1143,"responsiveStyles":1144},"builder-pixel-d1ul2kmxbed",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":1145},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":1147},{"path":37,"query":1148},{},{},1770892936802,1746714967208,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F01bfb2304521412fbd2e1a1180904d40",[],{"originalContentId":919,"winningTest":118,"lastPreviewUrl":1155,"breakpoints":1156,"kind":438,"hasLinks":6,"hasAutosaves":6},"https://pushsecurity.com/uc/shadow-saas?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=5f118e24433d46ceb79f5099987156d7&builder.overrides.5f118e24433d46ceb79f5099987156d7=5f118e24433d46ceb79f5099987156d7&builder.overrides.use-case-page:/uc/shadow-saas=5f118e24433d46ceb79f5099987156d7&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"xsmall":57,"small":39,"medium":40},{"createdDate":1158,"id":1159,"name":1160,"modelId":261,"published":13,"query":1161,"data":1164,"variations":1268,"lastUpdated":1269,"firstPublished":1270,"testRatio":33,"screenshot":1271,"createdBy":34,"lastUpdatedBy":674,"folders":1272,"meta":1273,"rev":440},1764707470172,"b62629ce2f3741158d961cd10fe74b31","Shadow AI",[1162],{"@type":264,"property":265,"operator":266,"value":1163},"/uc/shadow-ai",{"fontAwesomeIcon":1165,"seoTitle":1166,"jsCode":37,"customFonts":1167,"title":1172,"tsCode":37,"seoDescription":1173,"blocks":1174,"url":1163,"state":1265},"faBrainCircuit","Secure AI native and AI enhanced apps. ",[1168],{"variants":1169,"category":295,"files":1170,"subsets":1171,"family":272,"kind":273,"menu":296,"lastModified":275,"version":274},[301,302,303,304,305,306,128,307,308,309,310,311,312,313,314,315,316,317],{"100":277,"200":278,"300":279,"500":280,"600":281,"700":282,"800":283,"900":284,"800italic":285,"regular":290,"700italic":287,"200italic":291,"italic":289,"500italic":292,"600italic":294,"300italic":293,"100italic":288,"900italic":286},[298,299],"Secure shadow AI","See and control shadow AI apps in the browser.",[1175,1260],{"@type":106,"@version":107,"tagName":323,"id":1176,"meta":1177,"children":1178},"builder-a6e5717a2c914d5695058e4ee201a05d",{"previousId":1056},[1179,1195,1202,1209,1219,1228,1237,1247,1254],{"@type":106,"@version":107,"id":1180,"meta":1181,"component":1182,"responsiveStyles":1193},"builder-3e0ed678683f4a0eb7aa00253cf263b2",{"previousId":1060},{"name":327,"options":1183,"isRSC":118},{"title":1172,"description":1184,"points":1185,"image":1192},"\u003Cp>Your employees are adopting AI faster than you can track it. From native features in corporate apps to unapproved shadow tools, it’s all happening in the browser. Push detects every AI interaction in real time, letting you categorize apps and enforce acceptable use policies in the browser.\u003C/p>",[1186,1188,1190],{"item":1187},"Map every AI tool used across your workforce",{"item":1189},"Review and classify apps by sensitivity, purpose, and policy status",{"item":1191},"Enforce AI usage rules directly in the browser","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F33cf153d920f4e389f3650253577cff7",{"large":1194},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":342},{"@type":106,"@version":107,"id":1196,"meta":1197,"component":1198,"responsiveStyles":1200},"builder-76968f8471d14893b8189d75b08fb426",{"previousId":1076},{"name":346,"options":1199,"isRSC":118},{"AllPartners":41,"backgroundTransparent":6},{"large":1201},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":350},{"@type":106,"@version":107,"id":1203,"meta":1204,"component":1205,"responsiveStyles":1207},"builder-b55b9d4bc5a649d8839ce7f6c2043d95",{"previousId":1083},{"name":354,"options":1206,"isRSC":118},{"darkMode":41},{"large":1208},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1210,"meta":1211,"component":1212,"responsiveStyles":1217},"builder-c3f38ef4d75d4989a29b5903175ed8a1",{"previousId":1090},{"name":359,"tag":359,"options":1213,"isRSC":118},{"darkMode":6,"maxWidth":363,"maxTextWidth":364,"title":1214,"description":1215,"image":1216,"reverse":6},"\u003Ch2>Use your browser to govern AI \u003C/h2>","\u003Cp>The AI footprint inside your company is bigger than you think. From text generators to meeting assistants and design copilots, employees test, adopt, and connect new tools constantly. Push shows you those tools and which users are accessing them, without relying on network scans or API integrations.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F30b43bda6f1644c19478fb1efa20050c",{"large":1218},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1220,"meta":1221,"component":1222,"responsiveStyles":1226},"builder-90ee9cb9afc44e7f885523715bf51a53",{"previousId":1099},{"name":373,"options":1223,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":376,"title":1224,"description":1225,"reverse":41,"image":1115},"\u003Ch2>Discover every AI tool users touch\u003C/h2>","\u003Cp>Push captures live telemetry from the browser, identifying every AI-native and AI-enhanced application users access. You’ll know which corporate identities are connected, how data flows, and what new AI apps appear across your environment. \u003C/p>",{"large":1227},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":382,"paddingTop":384,"marginTop":384},{"@type":106,"@version":107,"id":1229,"meta":1230,"component":1231,"responsiveStyles":1235},"builder-9e44539fa53c4d8e87406036c921fc46",{"previousId":1109},{"name":373,"options":1232,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":389,"title":1233,"description":1234,"reverse":6,"image":1125},"\u003Ch2>Classify and manage AI risk\u003C/h2>","\u003Cp>For apps you choose to allow, Push lets you apply custom in-browser banners. You can bulk-select categories of AI tools and require users to read and acknowledge your acceptable use policy before they proceed. This creates an auditable trail and moves policy from an easy to forget document to an active, in-workflow control.\u003C/p>",{"large":1236},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":395},{"@type":106,"@version":107,"layerName":373,"id":1238,"meta":1239,"component":1240,"responsiveStyles":1245},"builder-44c1a891926f4bdeaaa37e90721fe6ac",{"previousId":1119},{"name":373,"options":1241,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":400,"title":1242,"description":1243,"reverse":41,"image":1244},"\u003Ch2>Enforce your AI policy in the browser\u003C/h2>","\u003Cp>When an AI tool is deemed non-compliant or too risky, Push blocks it at the source. The block happens directly in the browser, preventing the user from accessing the site or submitting data. This gives you an immediate, powerful lever to stop data exfiltration and enforce a hard line on unacceptable risk.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fa359ac1805af4e15a8a7f84632b9bb55",{"large":1246},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":406},{"@type":106,"@version":107,"id":1248,"meta":1249,"component":1250,"responsiveStyles":1252},"builder-dcc906f9cbe54dc68b3c672668e7a38f",{"previousId":1129},{"name":354,"options":1251,"isRSC":118},{"darkMode":6},{"large":1253},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1255,"component":1256,"responsiveStyles":1258},"builder-d2d64780c31b4349bc75805b23a07e38",{"name":416,"tag":416,"options":1257,"isRSC":118},{"sectionHeading":37,"customClass":418},{"large":1259},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":1261,"@type":106,"tagName":131,"properties":1262,"responsiveStyles":1263},"builder-pixel-wxx9tk70r9p",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":1264},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":1266},{"path":37,"query":1267},{},{},1770892957225,1764950077593,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fe558b8b069884037a8e6904f7ecc029c",[],{"winningTest":118,"breakpoints":1274,"originalContentId":1039,"kind":438,"lastPreviewUrl":1275,"hasLinks":6,"hasAutosaves":41},{"xsmall":57,"small":39,"medium":40},"https://pushsecurity.com/uc/shadow-ai?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=b62629ce2f3741158d961cd10fe74b31&builder.overrides.b62629ce2f3741158d961cd10fe74b31=b62629ce2f3741158d961cd10fe74b31&builder.overrides.use-case-page:/uc/shadow-ai=b62629ce2f3741158d961cd10fe74b31&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"_path":1277,"_dir":1278,"_draft":6,"_partial":6,"_locale":37,"sys":1279,"ogImage":118,"summary":1282,"title":1307,"subtitle":118,"metaTitle":1308,"synopsis":1309,"hashTags":118,"publishedDate":1310,"slug":1311,"tagsCollection":1312,"relatedBlogPostsCollection":1322,"authorsCollection":3590,"content":3598,"_id":4057,"_type":4058,"_source":4059,"_file":4060,"_stem":4061,"_extension":4058},"/blog/manage-third-party-data-access","blog",{"id":1280,"publishedAt":1281},"6DXY81om8HSVmh3q7YRNfl","2026-01-30T09:31:28.231Z",{"json":1283},{"data":1284,"content":1285,"nodeType":1306},{},[1286,1299],{"data":1287,"content":1288,"nodeType":1298},{},[1289,1294],{"data":1290,"marks":1291,"value":1292,"nodeType":1293},{},[],"Employees are self-adopting SaaS apps and creating new cloud identities without IT approval. ","text",{"data":1295,"marks":1296,"value":1297,"nodeType":1293},{},[],"Consider a solution with built-in features to find and secure identities your employees have created and guide them to harden their accounts against attacks.","paragraph",{"data":1300,"content":1301,"nodeType":1298},{},[1302],{"data":1303,"marks":1304,"value":1305,"nodeType":1293},{},[],"\n","document","6 ways to manage third-party access to your data with Push","Manage third-party data access","Employees are self-adopting SaaS apps and creating new cloud identities without IT approval. Learn how to manage which third parties have access to your data.\n","2023-10-11T00:00:00.000Z","manage-third-party-data-access",{"items":1313},[1314,1318],{"sys":1315,"name":1317},{"id":1316},"3pjES4THCIfSAwhGdNwBcy","Identity security",{"sys":1319,"name":1321},{"id":1320},"1gZi8NrRy2v9OqPV7C4dwD","Risk management",{"items":1323},[1324,2823],{"__typename":1325,"sys":1326,"content":1328,"title":2801,"synopsis":2802,"hashTags":118,"publishedDate":2803,"slug":2804,"tagsCollection":2805,"authorsCollection":2815},"BlogPosts",{"id":1327},"3ic4Ok5kwIE8UuUClhPFPn",{"json":1329},{"nodeType":1306,"data":1330,"content":1331},{},[1332,1340,1347,1354,1361,1368,1375,1382,1389,1434,1441,1448,1455,1463,1470,1479,1486,1493,1500,1508,1515,1522,1529,1536,1543,1550,1557,1579,1585,1592,1599,1612,1620,1627,1633,1640,1647,1653,1660,1669,1685,1709,1716,1723,1730,1737,1743,1750,1757,1764,1771,1778,1785,1805,1812,1819,1826,1833,1849,1882,1891,1898,1905,1912,1919,1926,1933,1940,1946,1953,1960,1967,1974,1981,1988,2008,2015,2021,2028,2051,2058,2065,2098,2105,2112,2119,2126,2139,2146,2217,2224,2231,2254,2260,2267,2274,2281,2314,2321,2722,2729,2748,2755,2764,2780,2787,2794],{"nodeType":1333,"data":1334,"content":1335},"heading-1",{},[1336],{"nodeType":1293,"value":1337,"marks":1338,"data":1339},"Introduction",[],{},{"nodeType":1298,"data":1341,"content":1342},{},[1343],{"nodeType":1293,"value":1344,"marks":1345,"data":1346},"Employees using a new work app used to be the final step of the software-onboarding process. ",[],{},{"nodeType":1298,"data":1348,"content":1349},{},[1350],{"nodeType":1293,"value":1351,"marks":1352,"data":1353},"Now it's the first. ",[],{},{"nodeType":1298,"data":1355,"content":1356},{},[1357],{"nodeType":1293,"value":1358,"marks":1359,"data":1360},"SaaS vendors bypass IT and security and hook employees with free apps and trials. This has led to sensitive data on shadow SaaS applications (more on this later) that is accessible via unmanaged cloud accounts (accounts that aren’t protected by SSO or logged into via social login accounts). Attackers exploit this unmonitored attack surface with new takes on old techniques that are going undetected.",[],{},{"nodeType":1298,"data":1362,"content":1363},{},[1364],{"nodeType":1293,"value":1365,"marks":1366,"data":1367},"Employees self-adopting apps might sound like a security nightmare, but it doesn’t have to be. In fact, it can be a really good thing that enables employees to be more productive and your business to be more competitive. And, frankly, there’s no way to stop it without causing a SaaS sprawl issue. ",[],{},{"nodeType":1298,"data":1369,"content":1370},{},[1371],{"nodeType":1293,"value":1372,"marks":1373,"data":1374},"What’s clear is that this new landscape has fundamentally changed the way software is brought into the business. The days of security acting as a gatekeeper that all apps must pass through before they can touch live data are over. The market forces driving self-service apps aren’t stopping, so the security industry needs to adapt.",[],{},{"nodeType":1298,"data":1376,"content":1377},{},[1378],{"nodeType":1293,"value":1379,"marks":1380,"data":1381},"Security teams need to regain visibility and control over company data and how it’s secured. ",[],{},{"nodeType":1298,"data":1383,"content":1384},{},[1385],{"nodeType":1293,"value":1386,"marks":1387,"data":1388},"In this guide I’ll show security teams: ",[],{},{"nodeType":1390,"data":1391,"content":1392},"unordered-list",{},[1393,1404,1414,1424],{"nodeType":1394,"data":1395,"content":1396},"list-item",{},[1397],{"nodeType":1298,"data":1398,"content":1399},{},[1400],{"nodeType":1293,"value":1401,"marks":1402,"data":1403},"What’s driving employee app self-adoption and the impact on security teams",[],{},{"nodeType":1394,"data":1405,"content":1406},{},[1407],{"nodeType":1298,"data":1408,"content":1409},{},[1410],{"nodeType":1293,"value":1411,"marks":1412,"data":1413},"Why the go-to solutions of policies and tools that block access to unsanctioned apps don’t work",[],{},{"nodeType":1394,"data":1415,"content":1416},{},[1417],{"nodeType":1298,"data":1418,"content":1419},{},[1420],{"nodeType":1293,"value":1421,"marks":1422,"data":1423},"What new approaches can work and how to apply them",[],{},{"nodeType":1394,"data":1425,"content":1426},{},[1427],{"nodeType":1298,"data":1428,"content":1429},{},[1430],{"nodeType":1293,"value":1431,"marks":1432,"data":1433},"The two aspects to address when securing SaaS and managing risk ",[],{},{"nodeType":1298,"data":1435,"content":1436},{},[1437],{"nodeType":1293,"value":1438,"marks":1439,"data":1440},"At the end of this book, we’ll link to a guide filled with practical guidance on how to manage those risks and quickly reduce your risk exposure. In that guide, we’ll also cover which data sources are available for SaaS security and why the choice is crucial.",[],{},{"nodeType":1298,"data":1442,"content":1443},{},[1444],{"nodeType":1293,"value":1445,"marks":1446,"data":1447},"The guidance provided here has been developed after talking with security leaders and CISOs that are already successfully embracing SaaS self-adoption while keeping a handle on risks. There are too many folks here to thank personally, but if you recognize some of this from our discussions, please accept my thanks, and hopefully there’s something new and useful here for you as well!",[],{},{"nodeType":1333,"data":1449,"content":1450},{},[1451],{"nodeType":1293,"value":1452,"marks":1453,"data":1454},"Why is it so easy for employees to self-adopt new apps without IT?",[],{},{"nodeType":1456,"data":1457,"content":1458},"heading-2",{},[1459],{"nodeType":1293,"value":1460,"marks":1461,"data":1462},"Memories of a simpler time",[],{},{"nodeType":1298,"data":1464,"content":1465},{},[1466],{"nodeType":1293,"value":1467,"marks":1468,"data":1469},"Before cloud computing was a thing, IT teams procured and managed hardware, software, networks and services for their businesses. The business was dependent on IT deploying new software across their on-prem network and managing it, so it was nearly impossible to bypass them. They became, in effect, the gatekeepers to the business’ IT environment. The onboarding process typically looked something like this:",[],{},{"nodeType":1471,"data":1472,"content":1478},"embedded-entry-block",{"target":1473},{"sys":1474},{"id":1475,"type":1476,"linkType":1477},"1Dw4V0Fd0wI8yB6juzyWjg","Link","Entry",[],{"nodeType":1298,"data":1480,"content":1481},{},[1482],{"nodeType":1293,"value":1483,"marks":1484,"data":1485},"IT asked Security to review a new app and its vendor to identify risks and determine if it should be adopted. At this point, security would specify which controls were required for it to be used securely. This all happened  before an app touched their network and interacted with any live data.",[],{},{"nodeType":1298,"data":1487,"content":1488},{},[1489],{"nodeType":1293,"value":1490,"marks":1491,"data":1492},"In return, Security could rely on IT to give them accurate information about all the businesses’ technology assets that needed to be protected. This process gave both teams great visibility across their total IT environment. Security and IT could maintain a high degree of control over how technology was used. ",[],{},{"nodeType":1298,"data":1494,"content":1495},{},[1496],{"nodeType":1293,"value":1497,"marks":1498,"data":1499},"In other words, life was wonderful and no one ever got hacked (maybe, it’s hard to remember now). Then the cloud happened and ruined everything.",[],{},{"nodeType":1298,"data":1501,"content":1502},{},[1503],{"nodeType":1293,"value":1504,"marks":1505,"data":1507},"Clearly I’m joking, but while very few orgs got it perfect, it was “good enough” at providing process-driven visibility of what enterprise software was being deployed for most.",[1506],{"type":312},{},{"nodeType":1456,"data":1509,"content":1510},{},[1511],{"nodeType":1293,"value":1512,"marks":1513,"data":1514},"The birth of the “as-a-Service” era",[],{},{"nodeType":1298,"data":1516,"content":1517},{},[1518],{"nodeType":1293,"value":1519,"marks":1520,"data":1521},"I jest, the cloud hasn’t ruined everything. It gave organizations the opportunity to be faster, more flexible and more efficient. Businesses no longer had to buy and manage all their own infrastructure and apps, they could just pay for what they used when they needed it. It led to a wave of “as-a-service” business models that stretched across infrastructure, platforms and software. ",[],{},{"nodeType":1298,"data":1523,"content":1524},{},[1525],{"nodeType":1293,"value":1526,"marks":1527,"data":1528},"Thousands of new software-as-a-service (SaaS) companies emerged with high quality apps that were easy to use over the internet. Essentially SaaS created software employees could use on-demand, which was a huge departure from the old days when IT and Security would do loads of security vetting upfront because they knew they’d be stuck with the software for years after deploying.",[],{},{"nodeType":1298,"data":1530,"content":1531},{},[1532],{"nodeType":1293,"value":1533,"marks":1534,"data":1535},"Leveraging great on-demand software tools boosted employee productivity and made their businesses more competitive. Tech-savvy employees, used to subscribing to on-demand software services in their personal lives, started to demand more autonomy over the technology they use at work. They were no longer satisfied with the generic suite of programs that IT could provide for them. Instead, they wanted the specialist tools designed and built for people like them by people like them. ",[],{},{"nodeType":1298,"data":1537,"content":1538},{},[1539],{"nodeType":1293,"value":1540,"marks":1541,"data":1542},"Despite users loving the software once they tried it, SaaS vendors were struggling to sell into large organizations with complicated procurement processes - it was too difficult to get their software in user's hands, and got more difficult the more niche and specialized the app was.",[],{},{"nodeType":1456,"data":1544,"content":1545},{},[1546],{"nodeType":1293,"value":1547,"marks":1548,"data":1549},"The rise of Product-Led Growth",[],{},{"nodeType":1298,"data":1551,"content":1552},{},[1553],{"nodeType":1293,"value":1554,"marks":1555,"data":1556},"Enter Wes Bush, a young SaaS marketer who published his book Product Led Growth in 2019. In it, he showed SaaS vendors how they can increase their sales revenues while reducing their sales cycles and costs by using their products as their primary go-to-market vehicle, as opposed to traditional sales teams. ",[],{},{"nodeType":1298,"data":1558,"content":1559},{},[1560,1564,1575],{"nodeType":1293,"value":1561,"marks":1562,"data":1563},"The premise is simple; prospective customers prefer to experience the value of a product rather than be told about it by sales people. Back in 2015 Forrester ",[],{},{"nodeType":1565,"data":1566,"content":1568},"hyperlink",{"uri":1567},"https://www.forrester.com/blogs/15-04-14-death_of_a_b2b_salesman/",[1569],{"nodeType":1293,"value":1570,"marks":1571,"data":1574},"reported",[1572],{"type":1573},"underline",{},{"nodeType":1293,"value":1576,"marks":1577,"data":1578}," that 75% of B2B buyers prefer a sales-rep-free buying process. The book became a phenomenon within the SaaS industry. Product-led growth (PLG) is now the norm for SaaS companies, and around 60% of SaaS companies now use PLG and that’s only going to increase.",[],{},{"nodeType":1471,"data":1580,"content":1584},{"target":1581},{"sys":1582},{"id":1583,"type":1476,"linkType":1477},"747PuaJ26IbolPB1ugxd2h",[],{"nodeType":1298,"data":1586,"content":1587},{},[1588],{"nodeType":1293,"value":1589,"marks":1590,"data":1591},"Why is PLG turning software adoption on its head? In order to establish a PLG go-to-market motion, SaaS vendors need end users to try their product, either as a free trial or a free version of the app, and quickly experience value from it so  they’re motivated to champion the internal business case through to a successful purchase. ",[],{},{"nodeType":1298,"data":1593,"content":1594},{},[1595],{"nodeType":1293,"value":1596,"marks":1597,"data":1598},"PLG not only relies upon end users as the initial adopters of a new app, but for them to experience meaningful value during that initial experience. This nearly always necessitates that the new app interacts with real data in a live environment. What’s more, it’s only the apps that end users want to use in a paid tier that are likely to ever get submitted to the app-onboarding process. The freemium and trial versions of apps that are just tried out are unlikely to ever be presented to IT and security. ",[],{},{"nodeType":1298,"data":1600,"content":1601},{},[1602,1606],{"nodeType":1293,"value":1603,"marks":1604,"data":1605},"This obviously poses a problem from an IT and security standpoint.",[],{},{"nodeType":1293,"value":1607,"marks":1608,"data":1611}," ",[1609],{"type":1610},"bold",{},{"nodeType":1298,"data":1613,"content":1614},{},[1615],{"nodeType":1293,"value":1616,"marks":1617,"data":1619},"SaaS vendors are deliberately bypassing the traditional software procurement processes that used to give IT and security teams visibility of the third party apps that had their data. ",[1618],{"type":1610},{},{"nodeType":1298,"data":1621,"content":1622},{},[1623],{"nodeType":1293,"value":1624,"marks":1625,"data":1626},"Instead, SaaS vendors are directly targeting employees with their apps and encouraging them to plug them straight into live environments before they’ve been vetted. Software onboarding now looks a lot more like this:",[],{},{"nodeType":1471,"data":1628,"content":1632},{"target":1629},{"sys":1630},{"id":1631,"type":1476,"linkType":1477},"61Oj6GzX4amLxEJ5fPDJCq",[],{"nodeType":1456,"data":1634,"content":1635},{},[1636],{"nodeType":1293,"value":1637,"marks":1638,"data":1639},"IT and security teams might be the last to know about PLG and miss the scale of the change",[],{},{"nodeType":1298,"data":1641,"content":1642},{},[1643],{"nodeType":1293,"value":1644,"marks":1645,"data":1646},"IT & security folks are usually ahead of the curve when it comes to technology shifts, but in this case many might have missed the scale or speed of the change. That’s because IT and security tools are among the least product-led of any sector. Most of our industry’s tools require heavy integrations, complicated setup, agent deployments, and so on. ",[],{},{"nodeType":1471,"data":1648,"content":1652},{"target":1649},{"sys":1650},{"id":1651,"type":1476,"linkType":1477},"2ldVELsUQIU0xaPSPJyXBR",[],{"nodeType":1298,"data":1654,"content":1655},{},[1656],{"nodeType":1293,"value":1657,"marks":1658,"data":1659},"Unfortunately, few security companies are making products as easy to set up and use as new tools for marketing, sales, finance, development, engineering design, legal, HR, and basically every other sector that can’t rely on a technical first user. ",[],{},{"nodeType":1298,"data":1661,"content":1662},{},[1663],{"nodeType":1293,"value":1664,"marks":1665,"data":1668},"This leads to a misconception in IT and Security teams that self-adopted apps are fringe and don’t contain significant sensitive data.",[1666,1667],{"type":312},{"type":1610},{},{"nodeType":1298,"data":1670,"content":1671},{},[1672,1676,1681],{"nodeType":1293,"value":1673,"marks":1674,"data":1675},"Most concerning for security teams is that ",[],{},{"nodeType":1293,"value":1677,"marks":1678,"data":1680},"the sheer number of apps in use has increased dramatically",[1679],{"type":1610},{},{"nodeType":1293,"value":1682,"marks":1683,"data":1684}," and will continue to do so. There are a couple reasons for this: ",[],{},{"nodeType":1686,"data":1687,"content":1688},"ordered-list",{},[1689,1699],{"nodeType":1394,"data":1690,"content":1691},{},[1692],{"nodeType":1298,"data":1693,"content":1694},{},[1695],{"nodeType":1293,"value":1696,"marks":1697,"data":1698},"The big old monolithic on-prem software is being replaced not by a single SaaS app, but an ecosystem of specialized apps. Each new app integrates and extends the functionality as the team using the stack learns what they need, so there is a one-to-many shift happening. ",[],{},{"nodeType":1394,"data":1700,"content":1701},{},[1702],{"nodeType":1298,"data":1703,"content":1704},{},[1705],{"nodeType":1293,"value":1706,"marks":1707,"data":1708},"Since apps are virtually zero-maintenance these days, the operating cost (if not the licensing cost) of running multiple apps is almost the same as one (compared to on-prem apps), so duplicate apps are far less of a problem. This also makes them pretty common and further multiplies the number of apps and vendors.",[],{},{"nodeType":1333,"data":1710,"content":1711},{},[1712],{"nodeType":1293,"value":1713,"marks":1714,"data":1715},"The impact of self-adoption on security",[],{},{"nodeType":1456,"data":1717,"content":1718},{},[1719],{"nodeType":1293,"value":1720,"marks":1721,"data":1722},"Loss of visibility",[],{},{"nodeType":1298,"data":1724,"content":1725},{},[1726],{"nodeType":1293,"value":1727,"marks":1728,"data":1729},"We’ve seen how SaaS vendors' move to PLG has led to greater employee self-adoption of work apps that don’t require IT or Security to be involved. The direct consequence of this is that Security teams have lost process-driven visibility of their company’s SaaS estate. This problem is often called “Shadow SaaS.” It is also the first problem to solve -  the old adage “you can’t secure what you don’t know about” is as true in the SaaS world as it is in any other security domain.",[],{},{"nodeType":1298,"data":1731,"content":1732},{},[1733],{"nodeType":1293,"value":1734,"marks":1735,"data":1736},"The lack of visibility means many IT and security teams missed the explosion of SaaS apps, plugins, extensions, and integrations that make up the modern IT stack.  More crucially, they’ve missed the movement of company data into these apps. Complicating matters further, many of these apps are duplicate, abandoned or unmanaged - an issue often called “SaaS sprawl.”",[],{},{"nodeType":1471,"data":1738,"content":1742},{"target":1739},{"sys":1740},{"id":1741,"type":1476,"linkType":1477},"5NfrrDeIPs7TE213UYly7E",[],{"nodeType":1456,"data":1744,"content":1745},{},[1746],{"nodeType":1293,"value":1747,"marks":1748,"data":1749},"Increasing incidents and impacts",[],{},{"nodeType":1298,"data":1751,"content":1752},{},[1753],{"nodeType":1293,"value":1754,"marks":1755,"data":1756},"Though security teams have lost direct visibility, they’ve not lost complete visibility and many are finding out about at least a fraction of these apps - typically by working with finance teams once employees want apps to go from free-tier to licensed plans. And all too often, security teams find out about shadow SaaS apps in the worst way possible - when something has already gone wrong and security is asked to respond to an incident on a SaaS platform.",[],{},{"nodeType":1298,"data":1758,"content":1759},{},[1760],{"nodeType":1293,"value":1761,"marks":1762,"data":1763},"In both cases, security is getting visibility too late to be of much value. Once a team has been using an app (even on a free tier) for a year, there is very little Security can do that will convince them to move to a more secure app, or for multiple teams to use a single app. Typically, this intervention from Security needs to happen very early - long before finance is involved - in order to make a positive impact. ",[],{},{"nodeType":1298,"data":1765,"content":1766},{},[1767],{"nodeType":1293,"value":1768,"marks":1769,"data":1770},"Incident Response is necessary, of course, when a SaaS account is breached (or an ex-employee SaaS account that was never properly offboarded), but cannot recover the lost data after the proverbial horse has bolted. It’s now possible to get into the process early, so security teams can get ahead of the problem to reduce the risk.",[],{},{"nodeType":1298,"data":1772,"content":1773},{},[1774],{"nodeType":1293,"value":1775,"marks":1776,"data":1777},"Another situation that is increasingly pressing, and difficult for security teams to deal with is the increasingly regular: “App X has just had a major breach, are we using AppX, is any of our data there?” It’s an embarrassing situation to not be able to answer these questions.",[],{},{"nodeType":1456,"data":1779,"content":1780},{},[1781],{"nodeType":1293,"value":1782,"marks":1783,"data":1784},"Core problem",[],{},{"nodeType":1298,"data":1786,"content":1787},{},[1788,1792,1801],{"nodeType":1293,"value":1789,"marks":1790,"data":1791},"Once teams get visibility into the scope of the Shadow SaaS and sprawl problem, they find that Security no longer dictates the pace of adoption. They’re also typically surprised by the sheer volume of apps employees have adopted. A ",[],{},{"nodeType":1565,"data":1793,"content":1795},{"uri":1794},"https://ascendixtech.com/number-saas-companies-statistics/",[1796],{"nodeType":1293,"value":1797,"marks":1798,"data":1800},"report from Ascendix",[1799],{"type":1573},{},{"nodeType":1293,"value":1802,"marks":1803,"data":1804}," claims that “by the end of 2023, there will be anywhere from 30,000-72,000 SaaS companies in operation.” Clearly these aren’t all work apps or hyper specialized, but there should be no doubt that we aren’t talking about a few dozen apps being adopted.",[],{},{"nodeType":1298,"data":1806,"content":1807},{},[1808],{"nodeType":1293,"value":1809,"marks":1810,"data":1811},"Once teams get visibility of the pace that news apps are added they realize they need to risk assess dozens of apps a month instead of the dozen a year that were going through IT in the old, managed and controlled process. To deal with this massive influx of new apps, security teams feel they must either radically increase the headcount, cut corners or drastically increase acceptable risk levels for data security. None of these are pleasant options.",[],{},{"nodeType":1456,"data":1813,"content":1814},{},[1815],{"nodeType":1293,"value":1816,"marks":1817,"data":1818},"Temptation to revert to the old ways of block-first",[],{},{"nodeType":1298,"data":1820,"content":1821},{},[1822],{"nodeType":1293,"value":1823,"marks":1824,"data":1825},"When the idea of the options above proves daunting or impossible, Security often tries to revert to the old process - regain the ability to set the pace of adoption by re-establishing the gate. Practically, this means that you’re deploying technical controls to try block all SaaS apps until they are approved (and marked as allowed) by IT or Security. Cloud Access Security Brokers (CASBs) were built to do exactly this - help security teams control (and block) access to “unsanctioned” SaaS that IT hasn’t approved (incidentally I think this explains why the CASB segment has failed). ",[],{},{"nodeType":1298,"data":1827,"content":1828},{},[1829],{"nodeType":1293,"value":1830,"marks":1831,"data":1832},"Technically, this makes total sense. But the unforeseen consequence is that it positions Security as blockers (aka the “department of no”), and puts them at odds with the rest of the business, rather than working towards a shared goal. ",[],{},{"nodeType":1298,"data":1834,"content":1835},{},[1836,1840,1845],{"nodeType":1293,"value":1837,"marks":1838,"data":1839},"This block-everything-until-security-approves-it position requires incredible executive support to maintain. For all but the most risk-sensitive organizations (read .gov), this position also normalizes employee behavior to bypass Security in favor of working quickly and effectively. In the end, Security actually ",[],{},{"nodeType":1293,"value":1841,"marks":1842,"data":1844},"loses visibility",[1843],{"type":312},{},{"nodeType":1293,"value":1846,"marks":1847,"data":1848}," into employee SaaS use and effectively loses control, rather than locking it down. On behalf of all the employees out there, I want to make a point to say employees aren’t trying to break rules Security put in place, they’re just trying to get their jobs done, and might try and find ways around things they see as unreasonably slowing them down or preventing them from reaching their targets. Seen in this light, it’s no surprise that:",[],{},{"nodeType":1390,"data":1850,"content":1851},{},[1852,1862,1872],{"nodeType":1394,"data":1853,"content":1854},{},[1855],{"nodeType":1298,"data":1856,"content":1857},{},[1858],{"nodeType":1293,"value":1859,"marks":1860,"data":1861},"If you block websites, employees bypass network controls, ",[],{},{"nodeType":1394,"data":1863,"content":1864},{},[1865],{"nodeType":1298,"data":1866,"content":1867},{},[1868],{"nodeType":1293,"value":1869,"marks":1870,"data":1871},"if you block social logins, employees use passwords, ",[],{},{"nodeType":1394,"data":1873,"content":1874},{},[1875],{"nodeType":1298,"data":1876,"content":1877},{},[1878],{"nodeType":1293,"value":1879,"marks":1880,"data":1881},"if you stop them using work devices to sign up to apps, they use personal devices.",[],{},{"nodeType":1298,"data":1883,"content":1884},{},[1885],{"nodeType":1293,"value":1886,"marks":1887,"data":1890},"Each blocking action leads to a worse security outcome, and blinds the security team further - losing control rather than regaining it.",[1888,1889],{"type":312},{"type":1610},{},{"nodeType":1298,"data":1892,"content":1893},{},[1894],{"nodeType":1293,"value":1895,"marks":1896,"data":1897},"You can attempt to delay this process by blocking, or you can adapt.",[],{},{"nodeType":1456,"data":1899,"content":1900},{},[1901],{"nodeType":1293,"value":1902,"marks":1903,"data":1904},"Surely there’s a better way",[],{},{"nodeType":1298,"data":1906,"content":1907},{},[1908],{"nodeType":1293,"value":1909,"marks":1910,"data":1911},"Of course we think there’s a better way, or we wouldn’t have written this. And don’t call me Shirley. ",[],{},{"nodeType":1298,"data":1913,"content":1914},{},[1915],{"nodeType":1293,"value":1916,"marks":1917,"data":1918},"The first thing we need to do as an industry is agree that we don’t want to be the blockers. We don’t want to stop employees from self-adopting apps. We understand they are best placed to find and select the tools that are going to allow them to be more productive and help your company succeed. We need to embrace SaaS app self-adoption. Stop asking employees to adapt to fit our legacy processes and meet them halfway. Security can no longer be a gate with a default stance of “No, until.” Instead Security needs to be a business enablement partner that says “Yes, unless.”",[],{},{"nodeType":1456,"data":1920,"content":1921},{},[1922],{"nodeType":1293,"value":1923,"marks":1924,"data":1925},"Yes, unless?",[],{},{"nodeType":1298,"data":1927,"content":1928},{},[1929],{"nodeType":1293,"value":1930,"marks":1931,"data":1932},"To adapt to this new SaaS-first world, security must move from saying “No, until we’ve had time to fully vet and onboard this app officially” to “Yes! You can use that app, unless we quickly identify security risks that outweigh the value of the tool.” I understand this is deeply uncomfortable for many security practitioners (as it still is for me), but let me explain why I think this leads to a better long-term outcome.",[],{},{"nodeType":1298,"data":1934,"content":1935},{},[1936],{"nodeType":1293,"value":1937,"marks":1938,"data":1939},"Obviously, self-adoption of SaaS is fundamentally different to IT/Security adopted and managed from a risk perspective. With SaaS, there’s no giant commitment upfront. SaaS apps aren’t forever - quite the opposite! Apps aren’t just unused and not-adopted and then suddenly fully-adopted. Just like adopting software was a process for Security and IT back in the day, employees follow a (less rigid) process with SaaS - from testing > to using > to finding value > to inviting teammates, etc. The risk grows as we proceed through the adoption process as employees add more data into the app and integrate it with other apps. ",[],{},{"nodeType":1471,"data":1941,"content":1945},{"target":1942},{"sys":1943},{"id":1944,"type":1476,"linkType":1477},"2nzyuXDxjBGZN0YMvskGak",[],{"nodeType":1298,"data":1947,"content":1948},{},[1949],{"nodeType":1293,"value":1950,"marks":1951,"data":1952},"The upside for Security is that because SaaS adoption is a process over time, we can use that time to assess the risk of the app before it’s fully adopted, as long as we know about the app from the start. Luckily, many apps employees are using might ultimately be very low risk, so not every app will require a full security vetting like you would have done in the old-school process.",[],{},{"nodeType":1298,"data":1954,"content":1955},{},[1956],{"nodeType":1293,"value":1957,"marks":1958,"data":1959},"Our role as Security is to catch those apps that are high risk, either because the data going into them (or that will be) is high risk or because the app can perform some high-risk action (like managing your inventory or sending emails to customers or your behalf). Security can focus their efforts on these high-risk vendors and apps to make sure they can be trusted with their data. But the key thing is that Security needs to get involved early in the adoption process. ",[],{},{"nodeType":1298,"data":1961,"content":1962},{},[1963],{"nodeType":1293,"value":1964,"marks":1965,"data":1966},"I’m getting into the details now - so this feels like a good time to take a step back and think about the elements that make up a SaaS security program.",[],{},{"nodeType":1333,"data":1968,"content":1969},{},[1970],{"nodeType":1293,"value":1971,"marks":1972,"data":1973},"What’s a good SaaS security program?",[],{},{"nodeType":1298,"data":1975,"content":1976},{},[1977],{"nodeType":1293,"value":1978,"marks":1979,"data":1980},"The shared-responsibility model between cloud platforms and their customers is a great place to start, as it helps customers understand what their responsibilities are, and which responsibilities they’re delegating to their cloud provider.",[],{},{"nodeType":1456,"data":1982,"content":1983},{},[1984],{"nodeType":1293,"value":1985,"marks":1986,"data":1987},"Delegate to the cloud provider when you can ",[],{},{"nodeType":1298,"data":1989,"content":1990},{},[1991,1995,2004],{"nodeType":1293,"value":1992,"marks":1993,"data":1994},"It’s ",[],{},{"nodeType":1565,"data":1996,"content":1998},{"uri":1997},"https://www.ncsc.gov.uk/collection/cloud/understanding-cloud-services/cloud-security-shared-responsibility-model",[1999],{"nodeType":1293,"value":2000,"marks":2001,"data":2003},"generally preferable",[2002],{"type":1573},{},{"nodeType":1293,"value":2005,"marks":2006,"data":2007}," to delegate as much responsibility as possible to the cloud provider, so it’s no surprise that the SaaS model is the most common and fastest growing sector.",[],{},{"nodeType":1298,"data":2009,"content":2010},{},[2011],{"nodeType":1293,"value":2012,"marks":2013,"data":2014},"The following summary table produced by the National Cyber Security Centre (NCSC) does a great job at showing how much of the balance of security responsibility is outsourced to the SaaS provider. For reference, IaaS = infrastructure-as-a-service; PaaS = platform-as-a-service; SaaS = software-as-a-service:",[],{},{"nodeType":1471,"data":2016,"content":2020},{"target":2017},{"sys":2018},{"id":2019,"type":1476,"linkType":1477},"17rMTpxgCAU5ropjkGIIjK",[],{"nodeType":1298,"data":2022,"content":2023},{},[2024],{"nodeType":1293,"value":2025,"marks":2026,"data":2027},"According to NCSC, the customer is responsible only for:",[],{},{"nodeType":1686,"data":2029,"content":2030},{},[2031,2041],{"nodeType":1394,"data":2032,"content":2033},{},[2034],{"nodeType":1298,"data":2035,"content":2036},{},[2037],{"nodeType":1293,"value":2038,"marks":2039,"data":2040},"The configuration of the SaaS app and ",[],{},{"nodeType":1394,"data":2042,"content":2043},{},[2044],{"nodeType":1298,"data":2045,"content":2046},{},[2047],{"nodeType":1293,"value":2048,"marks":2049,"data":2050},"Making sure that the identity and access control features provided by the vendor are used properly.",[],{},{"nodeType":1298,"data":2052,"content":2053},{},[2054],{"nodeType":1293,"value":2055,"marks":2056,"data":2057},"It’s worth pointing out here that the way application configuration is presented here is a bit of a red herring. The vast majority of SaaS apps (and especially self-adopted apps) allow very little, if any, configuration. Sure, the big core apps like Salesforce, Google Workspace, Microsoft 365 do (and often require a dedicated team or partner to run them), but they are highly unlikely to be self-adopted by employees.  As far as configuration is concerned, Security teams will often be limited to enabling “force MFA for all users” or “disallow public sharing” type of controls that are accessible even to non-technical users.",[],{},{"nodeType":1298,"data":2059,"content":2060},{},[2061],{"nodeType":1293,"value":2062,"marks":2063,"data":2064},"For the vast majority of apps in the organization, Security’s responsibility will boil down to:",[],{},{"nodeType":1390,"data":2066,"content":2067},{},[2068,2078,2088],{"nodeType":1394,"data":2069,"content":2070},{},[2071],{"nodeType":1298,"data":2072,"content":2073},{},[2074],{"nodeType":1293,"value":2075,"marks":2076,"data":2077},"Account security, i.e. making sure MFA and SSO (where available) is in place. ",[],{},{"nodeType":1394,"data":2079,"content":2080},{},[2081],{"nodeType":1298,"data":2082,"content":2083},{},[2084],{"nodeType":1293,"value":2085,"marks":2086,"data":2087},"Ensuring  employees are using strong passwords, especially if MFA and/or SSO aren’t available.",[],{},{"nodeType":1394,"data":2089,"content":2090},{},[2091],{"nodeType":1298,"data":2092,"content":2093},{},[2094],{"nodeType":1293,"value":2095,"marks":2096,"data":2097},"Removing external accounts (and accounts for those that have left the company) when no longer needed.",[],{},{"nodeType":1298,"data":2099,"content":2100},{},[2101],{"nodeType":1293,"value":2102,"marks":2103,"data":2104},"Isn’t it risky to delegate responsibility? While delegating security responsibilities is great and takes a huge load off your team, we do, unfortunately, need to consider who we’re delegating it to. Those gray boxes in the diagram above need to be taken care of.",[],{},{"nodeType":1298,"data":2106,"content":2107},{},[2108],{"nodeType":1293,"value":2109,"marks":2110,"data":2111},"This is what’s sometimes understood as “supply chain” security. You need to trust the SaaS vendor to uphold their end of the bargain and, more often than not, also the SaaS/cloud vendors they use (their sub-processors) as well.",[],{},{"nodeType":1298,"data":2113,"content":2114},{},[2115],{"nodeType":1293,"value":2116,"marks":2117,"data":2118},"This sounds a lot scarier than it is and in practice many SaaS vendors do a great job, with many providing easy-to-audit, externally-verified, policies through a framework such as SOC2, and most do regular penetration tests and have bug bounty programs etc.",[],{},{"nodeType":1298,"data":2120,"content":2121},{},[2122],{"nodeType":1293,"value":2123,"marks":2124,"data":2125},"There are exceptions when it makes sense to think more carefully about whether a third party can be trusted. Common reasons Push customers have cited for not trusting third parties include; ",[],{},{"nodeType":1390,"data":2127,"content":2128},{},[2129],{"nodeType":1394,"data":2130,"content":2131},{},[2132],{"nodeType":1298,"data":2133,"content":2134},{},[2135],{"nodeType":1293,"value":2136,"marks":2137,"data":2138},"The data going into these apps is simply too high risk. Many organizations have very sensitive customer information or intellectual property that they simply aren’t willing to entrust to a third party. Many don’t trust a third party with administrative access to the systems where this data is held.",[],{},{"nodeType":1298,"data":2140,"content":2141},{},[2142],{"nodeType":1293,"value":2143,"marks":2144,"data":2145},"If the data in the app, or the access the app has represents some significant (but not unacceptable) risk, you may also care about:",[],{},{"nodeType":1390,"data":2147,"content":2148},{},[2149,2197,2207],{"nodeType":1394,"data":2150,"content":2151},{},[2152],{"nodeType":1298,"data":2153,"content":2154},{},[2155,2159,2168,2172,2181,2184,2193],{"nodeType":1293,"value":2156,"marks":2157,"data":2158},"Vendors who’ve had a string of repeated breaches or security incidents. This is troubling because it’s a fairly common pattern for attackers to breach apps in ways that don’t impact customer information, but then use the information they learn from these breaches to launch far more successful breaches in future. Consider the string of breaches at ",[],{},{"nodeType":1565,"data":2160,"content":2162},{"uri":2161},"https://www.bleepingcomputer.com/search/?q=lastpass+breach",[2163],{"nodeType":1293,"value":2164,"marks":2165,"data":2167},"LastPass",[2166],{"type":1573},{},{"nodeType":1293,"value":2169,"marks":2170,"data":2171},", ",[],{},{"nodeType":1565,"data":2173,"content":2175},{"uri":2174},"https://www.bleepingcomputer.com/search/?q=okta+breach",[2176],{"nodeType":1293,"value":2177,"marks":2178,"data":2180},"Okta",[2179],{"type":1573},{},{"nodeType":1293,"value":2169,"marks":2182,"data":2183},[],{},{"nodeType":1565,"data":2185,"content":2187},{"uri":2186},"https://www.bleepingcomputer.com/search/?q=twilio+breach",[2188],{"nodeType":1293,"value":2189,"marks":2190,"data":2192},"Twilio",[2191],{"type":1573},{},{"nodeType":1293,"value":2194,"marks":2195,"data":2196}," (and many others) or as a typical example of this.",[],{},{"nodeType":1394,"data":2198,"content":2199},{},[2200],{"nodeType":1298,"data":2201,"content":2202},{},[2203],{"nodeType":1293,"value":2204,"marks":2205,"data":2206},"Products that don’t offer adequate security features. Customers expect features such as MFA, SSO (either social login through OIDC or, ideally, SAML), and the ability to enforce these controls. This is especially important on platforms where the data is high-risk.",[],{},{"nodeType":1394,"data":2208,"content":2209},{},[2210],{"nodeType":1298,"data":2211,"content":2212},{},[2213],{"nodeType":1293,"value":2214,"marks":2215,"data":2216},"The vendor operates in a sanctioned country or may not have the resources to adequately protect your data. Clearly vendors operating from (or that have close ties with) sanctioned or politically-complicated countries represent additional risk, as do vendors that are “one man bands” or are so small that it is hard to imagine they can afford to spend significant resources on security.",[],{},{"nodeType":1456,"data":2218,"content":2219},{},[2220],{"nodeType":1293,"value":2221,"marks":2222,"data":2223},"The two questions you need to ask to assess risk ",[],{},{"nodeType":1298,"data":2225,"content":2226},{},[2227],{"nodeType":1293,"value":2228,"marks":2229,"data":2230},"The essence of the shared-responsibility model can summarized as two questions:",[],{},{"nodeType":1686,"data":2232,"content":2233},{},[2234,2244],{"nodeType":1394,"data":2235,"content":2236},{},[2237],{"nodeType":1298,"data":2238,"content":2239},{},[2240],{"nodeType":1293,"value":2241,"marks":2242,"data":2243},"Should we be using this app?",[],{},{"nodeType":1394,"data":2245,"content":2246},{},[2247],{"nodeType":1298,"data":2248,"content":2249},{},[2250],{"nodeType":1293,"value":2251,"marks":2252,"data":2253},"Are we using it securely?",[],{},{"nodeType":1471,"data":2255,"content":2259},{"target":2256},{"sys":2257},{"id":2258,"type":1476,"linkType":1477},"ToDXz2MBbEygwtJjiIKRX",[],{"nodeType":1298,"data":2261,"content":2262},{},[2263],{"nodeType":1293,"value":2264,"marks":2265,"data":2266},"A successful SaaS security program must address both these questions. We can’t spend all our time doing risk assessments and due diligence exercises on our supply chain while dropping the ball on account security. Similarly, we can’t just focus on making sure all accounts have MFA in place when the vendor is leaving the back door open.",[],{},{"nodeType":1333,"data":2268,"content":2269},{},[2270],{"nodeType":1293,"value":2271,"marks":2272,"data":2273},"When shared responsibility goes wrong",[],{},{"nodeType":1298,"data":2275,"content":2276},{},[2277],{"nodeType":1293,"value":2278,"marks":2279,"data":2280},"The following is an extract of some well-covered recent(ish) breaches of SaaS companies. As we go through it, pay attention to which side is dropping the ball in terms of the shared responsibility. The same organization can be:",[],{},{"nodeType":1390,"data":2282,"content":2283},{},[2284,2294,2304],{"nodeType":1394,"data":2285,"content":2286},{},[2287],{"nodeType":1298,"data":2288,"content":2289},{},[2290],{"nodeType":1293,"value":2291,"marks":2292,"data":2293},"the source of a breach, ",[],{},{"nodeType":1394,"data":2295,"content":2296},{},[2297],{"nodeType":1298,"data":2298,"content":2299},{},[2300],{"nodeType":1293,"value":2301,"marks":2302,"data":2303},"the ultimate target that motivated a breach at a partner that was a softer target, ",[],{},{"nodeType":1394,"data":2305,"content":2306},{},[2307],{"nodeType":1298,"data":2308,"content":2309},{},[2310],{"nodeType":1293,"value":2311,"marks":2312,"data":2313},"or simply the unlucky victim of a breach further down its supply chain.",[],{},{"nodeType":1298,"data":2315,"content":2316},{},[2317],{"nodeType":1293,"value":2318,"marks":2319,"data":2320},"That’s the thing about supply chain attacks, organizations are the attacker’s stepping stones. Where they are in the attack chain determines how we label their victims. ",[],{},{"nodeType":2322,"data":2323,"content":2324},"table",{},[2325,2352,2433,2490,2533,2659],{"nodeType":2326,"data":2327,"content":2328},"table-row",{},[2329,2341],{"nodeType":2330,"data":2331,"content":2332},"table-cell",{},[2333],{"nodeType":1298,"data":2334,"content":2335},{},[2336],{"nodeType":1293,"value":2337,"marks":2338,"data":2340},"Date",[2339],{"type":1610},{},{"nodeType":2330,"data":2342,"content":2343},{},[2344],{"nodeType":1298,"data":2345,"content":2346},{},[2347],{"nodeType":1293,"value":2348,"marks":2349,"data":2351},"SaaS attack",[2350],{"type":1610},{},{"nodeType":2326,"data":2353,"content":2354},{},[2355,2365],{"nodeType":2330,"data":2356,"content":2357},{},[2358],{"nodeType":1298,"data":2359,"content":2360},{},[2361],{"nodeType":1293,"value":2362,"marks":2363,"data":2364},"April 2021",[],{},{"nodeType":2330,"data":2366,"content":2367},{},[2368,2396],{"nodeType":1298,"data":2369,"content":2370},{},[2371,2374,2383,2387,2392],{"nodeType":1293,"value":37,"marks":2372,"data":2373},[],{},{"nodeType":1565,"data":2375,"content":2377},{"uri":2376},"https://about.codecov.io/security-update/",[2378],{"nodeType":1293,"value":2379,"marks":2380,"data":2382},"Backdoors inserted into some Codecov.io",[2381],{"type":1573},{},{"nodeType":1293,"value":2384,"marks":2385,"data":2386}," (a software development SaaS) tools after a credential breach grants access to their ",[],{},{"nodeType":1293,"value":2388,"marks":2389,"data":2391},"Google Cloud Project",[2390],{"type":1610},{},{"nodeType":1293,"value":2393,"marks":2394,"data":2395}," (cloud infrastructure SaaS).  ",[],{},{"nodeType":1298,"data":2397,"content":2398},{},[2399,2403,2412,2416,2421,2425,2429],{"nodeType":1293,"value":2400,"marks":2401,"data":2402},"This breach ",[],{},{"nodeType":1565,"data":2404,"content":2406},{"uri":2405},"https://www.twilio.com/blog/response-to-the-codecov-vulnerability",[2407],{"nodeType":1293,"value":2408,"marks":2409,"data":2411},"affected multiple customers",[2410],{"type":1573},{},{"nodeType":1293,"value":2413,"marks":2414,"data":2415},", including ",[],{},{"nodeType":1293,"value":2417,"marks":2418,"data":2420},"Atlassian",[2419],{"type":1610},{},{"nodeType":1293,"value":2422,"marks":2423,"data":2424}," (a developer and collaboration SaaS platform) and ",[],{},{"nodeType":1293,"value":2189,"marks":2426,"data":2428},[2427],{"type":1610},{},{"nodeType":1293,"value":2430,"marks":2431,"data":2432}," (communications tooling SaaS company).  ",[],{},{"nodeType":2326,"data":2434,"content":2435},{},[2436,2446],{"nodeType":2330,"data":2437,"content":2438},{},[2439],{"nodeType":1298,"data":2440,"content":2441},{},[2442],{"nodeType":1293,"value":2443,"marks":2444,"data":2445},"Jan 2022",[],{},{"nodeType":2330,"data":2447,"content":2448},{},[2449],{"nodeType":1298,"data":2450,"content":2451},{},[2452,2456,2460,2469,2473,2478,2482,2486],{"nodeType":1293,"value":2177,"marks":2453,"data":2455},[2454],{"type":1610},{},{"nodeType":1293,"value":2457,"marks":2458,"data":2459}," (identity provider SaaS) ",[],{},{"nodeType":1565,"data":2461,"content":2463},{"uri":2462},"https://www.okta.com/blog/2022/03/oktas-investigation-of-the-january-2022-compromise/",[2464],{"nodeType":1293,"value":2465,"marks":2466,"data":2468},"systems breached",[2467],{"type":1573},{},{"nodeType":1293,"value":2470,"marks":2471,"data":2472}," through a breach at ",[],{},{"nodeType":1293,"value":2474,"marks":2475,"data":2477},"Sitel",[2476],{"type":1610},{},{"nodeType":1293,"value":2479,"marks":2480,"data":2481},", a support partner - attackers got access to Okta’s instances of ",[],{},{"nodeType":1293,"value":2417,"marks":2483,"data":2485},[2484],{"type":1610},{},{"nodeType":1293,"value":2487,"marks":2488,"data":2489}," Jira, Slack, Splunk, RingCentral, and support tickets through Salesforce.  ",[],{},{"nodeType":2326,"data":2491,"content":2492},{},[2493,2503],{"nodeType":2330,"data":2494,"content":2495},{},[2496],{"nodeType":1298,"data":2497,"content":2498},{},[2499],{"nodeType":1293,"value":2500,"marks":2501,"data":2502},"March 2022",[],{},{"nodeType":2330,"data":2504,"content":2505},{},[2506],{"nodeType":1298,"data":2507,"content":2508},{},[2509,2513,2517,2521,2530],{"nodeType":1293,"value":2510,"marks":2511,"data":2512},"“0ktapus” phishing toolkit targeting ",[],{},{"nodeType":1293,"value":2177,"marks":2514,"data":2516},[2515],{"type":1610},{},{"nodeType":1293,"value":2518,"marks":2519,"data":2520}," customers ",[],{},{"nodeType":1565,"data":2522,"content":2524},{"uri":2523},"https://www.bleepingcomputer.com/news/security/twilio-hackers-hit-over-130-orgs-in-massive-okta-phishing-attack/",[2525],{"nodeType":1293,"value":2526,"marks":2527,"data":2529},"is released",[2528],{"type":1573},{},{"nodeType":1293,"value":37,"marks":2531,"data":2532},[],{},{"nodeType":2326,"data":2534,"content":2535},{},[2536,2546],{"nodeType":2330,"data":2537,"content":2538},{},[2539],{"nodeType":1298,"data":2540,"content":2541},{},[2542],{"nodeType":1293,"value":2543,"marks":2544,"data":2545},"Aug 2022",[],{},{"nodeType":2330,"data":2547,"content":2548},{},[2549,2590,2617,2632,2652],{"nodeType":1298,"data":2550,"content":2551},{},[2552,2556,2560,2564,2568,2577,2581,2586],{"nodeType":1293,"value":2189,"marks":2553,"data":2555},[2554],{"type":1610},{},{"nodeType":1293,"value":2557,"marks":2558,"data":2559}," (one such ",[],{},{"nodeType":1293,"value":2177,"marks":2561,"data":2563},[2562],{"type":1610},{},{"nodeType":1293,"value":2565,"marks":2566,"data":2567}," customer) ",[],{},{"nodeType":1565,"data":2569,"content":2571},{"uri":2570},"https://www.twilio.com/blog/august-2022-social-engineering-attack",[2572],{"nodeType":1293,"value":2573,"marks":2574,"data":2576},"was again breached",[2575],{"type":1573},{},{"nodeType":1293,"value":2578,"marks":2579,"data":2580}," and attackers used access to one of their products (",[],{},{"nodeType":1293,"value":2582,"marks":2583,"data":2585},"Authy",[2584],{"type":1610},{},{"nodeType":1293,"value":2587,"marks":2588,"data":2589},", an MFA mobile app) to bypass MFA for some of their customers. ",[],{},{"nodeType":1298,"data":2591,"content":2592},{},[2593,2597,2601,2604,2613],{"nodeType":1293,"value":2594,"marks":2595,"data":2596},"Attackers appear to also have used ",[],{},{"nodeType":1293,"value":2189,"marks":2598,"data":2600},[2599],{"type":1610},{},{"nodeType":1293,"value":1607,"marks":2602,"data":2603},[],{},{"nodeType":1565,"data":2605,"content":2607},{"uri":2606},"https://www.bleepingcomputer.com/news/security/okta-one-time-mfa-passcodes-exposed-in-twilio-cyberattack/",[2608],{"nodeType":1293,"value":2609,"marks":2610,"data":2612},"to gain access to SMS’s",[2611],{"type":1573},{},{"nodeType":1293,"value":2614,"marks":2615,"data":2616}," that were delivering Okta MFA codes to customers: ",[],{},{"nodeType":1298,"data":2618,"content":2619},{},[2620,2624,2628],{"nodeType":1293,"value":2621,"marks":2622,"data":2623},"This leads to a breach at",[],{},{"nodeType":1293,"value":1607,"marks":2625,"data":2627},[2626],{"type":1610},{},{"nodeType":1293,"value":2629,"marks":2630,"data":2631},"Mailchimp (email marketing SaaS), which in turn affects many upstream customers like Digital Ocean (infrastructure hosting SaaS) and Signal Messenger",[],{},{"nodeType":1298,"data":2633,"content":2634},{},[2635,2639,2648],{"nodeType":1293,"value":2636,"marks":2637,"data":2638},"Klaviyo (another email marketing SaaS) ",[],{},{"nodeType":1565,"data":2640,"content":2642},{"uri":2641},"https://www.bleepingcomputer.com/news/security/email-marketing-firm-hacked-to-steal-crypto-focused-mailing-lists/",[2643],{"nodeType":1293,"value":2644,"marks":2645,"data":2647},"is also impacted",[2646],{"type":1573},{},{"nodeType":1293,"value":2649,"marks":2650,"data":2651},". ",[],{},{"nodeType":1298,"data":2653,"content":2654},{},[2655],{"nodeType":1293,"value":2656,"marks":2657,"data":2658},"Breaches on these email marketing SaaS apps lead to even more downstream breaches for customers in finance and crypto spaces, such as Trezor, Edge Wallet, Cointelegraph, Ethereum FESP, Messari and Decrypt.",[],{},{"nodeType":2326,"data":2660,"content":2661},{},[2662,2672],{"nodeType":2330,"data":2663,"content":2664},{},[2665],{"nodeType":1298,"data":2666,"content":2667},{},[2668],{"nodeType":1293,"value":2669,"marks":2670,"data":2671},"Sept and Dec 2022",[],{},{"nodeType":2330,"data":2673,"content":2674},{},[2675],{"nodeType":1298,"data":2676,"content":2677},{},[2678,2682,2691,2695,2699,2703,2718],{"nodeType":1293,"value":2679,"marks":2680,"data":2681},"Product source code ",[],{},{"nodeType":1565,"data":2683,"content":2685},{"uri":2684},"https://www.bleepingcomputer.com/news/security/oktas-source-code-stolen-after-github-repositories-hacked/",[2686],{"nodeType":1293,"value":2687,"marks":2688,"data":2690},"stolen from the Github repositories",[2689],{"type":1573},{},{"nodeType":1293,"value":2692,"marks":2693,"data":2694}," of ",[],{},{"nodeType":1293,"value":2177,"marks":2696,"data":2698},[2697],{"type":1610},{},{"nodeType":1293,"value":2700,"marks":2701,"data":2702}," and ",[],{},{"nodeType":1565,"data":2704,"content":2706},{"uri":2705},"https://www.bleepingcomputer.com/news/security/auth0-warns-that-some-source-code-repos-may-have-been-stolen/",[2707,2713],{"nodeType":1293,"value":2708,"marks":2709,"data":2712},"Auth0",[2710,2711],{"type":1573},{"type":1610},{},{"nodeType":1293,"value":2714,"marks":2715,"data":2717}," (an Okta subsidiary",[2716],{"type":1573},{},{"nodeType":1293,"value":2719,"marks":2720,"data":2721}," that is also an identity provider SaaS platform)",[],{},{"nodeType":1298,"data":2723,"content":2724},{},[2725],{"nodeType":1293,"value":2726,"marks":2727,"data":2728},"This is a very shallow summary of a small sample of events during this time frame, but it’s interesting how interrelated these SaaS services are. Many are part of each other’s supply chains (for example, Twilio is targeted as an Okta customer itself, and used to compromise Okta customer MFA codes that are delivered by Twilio to other Okta customers) and so breaches in one SaaS have rippling effects that sometimes take months or even years to materialize after a breach occurs.",[],{},{"nodeType":1298,"data":2730,"content":2731},{},[2732,2736,2744],{"nodeType":1293,"value":2733,"marks":2734,"data":2735},"There’s an interesting trend to call out here: breaches at a SaaS vendor appear to lead to (or correlate with) further breaches, such as the string of breaches at ",[],{},{"nodeType":1565,"data":2737,"content":2739},{"uri":2738},"https://thehackernews.com/2023/02/lastpass-reveals-second-attack.html",[2740],{"nodeType":1293,"value":2164,"marks":2741,"data":2743},[2742],{"type":1573},{},{"nodeType":1293,"value":2745,"marks":2746,"data":2747},". But it’s incredibly unclear how to balance the risk of using these vendors, especially when some of these companies (like Okta) are a big part of many organization’s security strategies.",[],{},{"nodeType":1298,"data":2749,"content":2750},{},[2751],{"nodeType":1293,"value":2752,"marks":2753,"data":2754},"Ultimately, though… ",[],{},{"nodeType":1298,"data":2756,"content":2757},{},[2758],{"nodeType":1293,"value":2759,"marks":2760,"data":2763},"The root of most of these networks of supply chain attacks are simple account compromises. ",[2761,2762],{"type":1610},{"type":312},{},{"nodeType":1298,"data":2765,"content":2766},{},[2767,2771,2776],{"nodeType":1293,"value":2768,"marks":2769,"data":2770},"While most organizations think of the supply chain aspect (should we be using this app?) as the majority of the problem, or at least the first problem to solve - ",[],{},{"nodeType":1293,"value":2772,"marks":2773,"data":2775},"account security",[2774],{"type":312},{},{"nodeType":1293,"value":2777,"marks":2778,"data":2779}," is ultimately at the heart of the problem. A developer or support engineer with a weak password or missing MFA is all it takes for them to get phished, kicking off this string of attacks. Unlike the complex supply chain risk questions, account security issues are straightforward to fix. We’d be a whole lot closer to securing the whole supply chain if we could improve account security for all employees across all the SaaS apps they use. ",[],{},{"nodeType":1333,"data":2781,"content":2782},{},[2783],{"nodeType":1293,"value":2784,"marks":2785,"data":2786},"Where do we go from here?",[],{},{"nodeType":1298,"data":2788,"content":2789},{},[2790],{"nodeType":1293,"value":2791,"marks":2792,"data":2793},"So we’ve discussed the domino-like string of effects from SaaS sales, to PLG, to self-adoption, to shadow SaaS, to growing SaaS risks and the news stories we read about.",[],{},{"nodeType":1298,"data":2795,"content":2796},{},[2797],{"nodeType":1293,"value":2798,"marks":2799,"data":2800},"We’ve unpacked the shared responsibility model - and I hope I’ve convinced you that we need to look at both the supply chain and account security side equally (and in parallel!) to manage this risk. ",[],{},"SaaS sprawl isn't a problem - if you completely change your approach","Employees using a new work app used to be the final step of the software-onboarding process. Now it's the first. Security must adapt to secure business data. \n","2023-06-22T00:00:00.000Z","saas-has-changed-how-we-adopt-software-how-should-security-adapt",{"items":2806},[2807,2811],{"sys":2808,"name":2810},{"id":2809},"6A5RXS31ZQx3PwryGb1IMy","Browser-based attacks",{"sys":2812,"name":2814},{"id":2813},"3SA5H01UkKauuiTdt0KC6q","Shadow IT",{"items":2816},[2817],{"fullName":2818,"firstName":2819,"jobTitle":2820,"profilePicture":2821},"Jacques Louw","Jacques","Co-founder / CRO",{"url":2822},"https://images.ctfassets.net/y1cdw1ablpvd/39m8bektV23lnCRcEq0G8h/2a08f6276a50744f1a4b499b273f6bb2/Push_Founders_at_Cahoots_October_28_2022_by_Doug_Coombe-21.jpg",{"__typename":1325,"sys":2824,"content":2826,"title":3574,"synopsis":3575,"hashTags":118,"publishedDate":3576,"slug":3577,"tagsCollection":3578,"authorsCollection":3584},{"id":2825},"6ppEa7WXiKcgLQ9yGn7q3k",{"json":2827},{"nodeType":1306,"data":2828,"content":2829},{},[2830,2837,2843,2850,2859,2866,2871,2878,2883,2890,2897,2904,2911,2918,2924,2931,2937,2944,2960,2967,2974,2979,2985,2991,3007,3026,3033,3040,3047,3054,3061,3068,3090,3097,3104,3111,3118,3125,3132,3139,3146,3160,3190,3199,3205,3212,3219,3226,3249,3256,3263,3270,3277,3284,3291,3298,3305,3310,3317,3324,3331,3343,3350,3357,3364,3370,3377,3384,3391,3414,3421,3428,3435,3451,3458,3465,3472,3535,3541,3548,3555,3562,3568],{"nodeType":1298,"data":2831,"content":2832},{},[2833],{"nodeType":1293,"value":2834,"marks":2835,"data":2836},"Employees using a new work SaaS application used to be the final step of the software-onboarding process. ",[],{},{"nodeType":1298,"data":2838,"content":2839},{},[2840],{"nodeType":1293,"value":1351,"marks":2841,"data":2842},[],{},{"nodeType":1298,"data":2844,"content":2845},{},[2846],{"nodeType":1293,"value":2847,"marks":2848,"data":2849},"SaaS providers bypass IT and security and hook employees with free apps and trials. This has led to sensitive data on shadow SaaS applications that’s accessible via unmanaged cloud accounts – all those accounts that aren’t protected by SSO or logged into via social login accounts. This leads to security threats because attackers know SaaS is a blind spot for most organizations.",[],{},{"nodeType":1298,"data":2851,"content":2852},{},[2853],{"nodeType":1293,"value":2854,"marks":2855,"data":2858},"Attackers exploit this unmonitored attack surface with new takes on old techniques that are going undetected.",[2856,2857],{"type":1610},{"type":312},{},{"nodeType":1298,"data":2860,"content":2861},{},[2862],{"nodeType":1293,"value":2863,"marks":2864,"data":2865},"We’ve gone from this:",[],{},{"nodeType":1471,"data":2867,"content":2870},{"target":2868},{"sys":2869},{"id":1475,"type":1476,"linkType":1477},[],{"nodeType":1298,"data":2872,"content":2873},{},[2874],{"nodeType":1293,"value":2875,"marks":2876,"data":2877},"To this: ",[],{},{"nodeType":1471,"data":2879,"content":2882},{"target":2880},{"sys":2881},{"id":1631,"type":1476,"linkType":1477},[],{"nodeType":1298,"data":2884,"content":2885},{},[2886],{"nodeType":1293,"value":2887,"marks":2888,"data":2889},"Security is now coming in at the end of their old software procurement process and needs to figure out how to regain control of their data. ",[],{},{"nodeType":1333,"data":2891,"content":2892},{},[2893],{"nodeType":1293,"value":2894,"marks":2895,"data":2896},"You don’t want to stop employees from adopting SaaS apps… ",[],{},{"nodeType":1298,"data":2898,"content":2899},{},[2900],{"nodeType":1293,"value":2901,"marks":2902,"data":2903},"Employees self-adopting SaaS platforms might sound like a security nightmare, but it doesn’t have to be. This actually enables employees to be more productive and your business to be more competitive. ",[],{},{"nodeType":1298,"data":2905,"content":2906},{},[2907],{"nodeType":1293,"value":2908,"marks":2909,"data":2910},"This new landscape has fundamentally changed how software is brought into the business. The days of security acting as a gatekeeper that all apps must pass through before they can touch live data are over. The market forces driving self-service apps aren’t stopping, so the security industry needs to adapt.",[],{},{"nodeType":1333,"data":2912,"content":2913},{},[2914],{"nodeType":1293,"value":2915,"marks":2916,"data":2917},"What’s the impact of self-adoption on security?",[],{},{"nodeType":1456,"data":2919,"content":2920},{},[2921],{"nodeType":1293,"value":1720,"marks":2922,"data":2923},[],{},{"nodeType":1298,"data":2925,"content":2926},{},[2927],{"nodeType":1293,"value":2928,"marks":2929,"data":2930},"Most SaaS providers have moved to the product-led growth (PLG) model as the fastest and easiest way to get users for their apps. They want employees to start using SaaS without going through IT and security teams’ lengthy approval processes. This SaaS vendor sales model has had a massive impact on security and introduced SaaS security risks, but most security teams are unaware of the scale and scope of the problem because they can’t get necessary visibility into all the tools and apps their employees are using.",[],{},{"nodeType":1456,"data":2932,"content":2933},{},[2934],{"nodeType":1293,"value":1040,"marks":2935,"data":2936},[],{},{"nodeType":1298,"data":2938,"content":2939},{},[2940],{"nodeType":1293,"value":2941,"marks":2942,"data":2943},"This problem is often called “Shadow SaaS” and it’s also the first problem to solve -  the old adage “you can’t secure what you don’t know about” is as true in the SaaS world as it is in any other security domain.",[],{},{"nodeType":1298,"data":2945,"content":2946},{},[2947,2951,2956],{"nodeType":1293,"value":2948,"marks":2949,"data":2950},"The lack of visibility means many IT and security teams missed the explosion of SaaS apps, plugins, extensions, and integrations that make up the modern IT stack. More crucially,",[],{},{"nodeType":1293,"value":2952,"marks":2953,"data":2955}," they’ve missed the movement of company data into these apps.",[2954],{"type":312},{},{"nodeType":1293,"value":2957,"marks":2958,"data":2959}," ",[],{},{"nodeType":1456,"data":2961,"content":2962},{},[2963],{"nodeType":1293,"value":2964,"marks":2965,"data":2966},"SaaS Sprawl",[],{},{"nodeType":1298,"data":2968,"content":2969},{},[2970],{"nodeType":1293,"value":2971,"marks":2972,"data":2973},"Complicating matters further, many of these apps are duplicate, abandoned or unmanaged - an issue often called “SaaS sprawl.”",[],{},{"nodeType":1471,"data":2975,"content":2978},{"target":2976},{"sys":2977},{"id":1741,"type":1476,"linkType":1477},[],{"nodeType":1456,"data":2980,"content":2981},{},[2982],{"nodeType":1293,"value":1747,"marks":2983,"data":2984},[],{},{"nodeType":1298,"data":2986,"content":2987},{},[2988],{"nodeType":1293,"value":1754,"marks":2989,"data":2990},[],{},{"nodeType":1298,"data":2992,"content":2993},{},[2994,2998,3003],{"nodeType":1293,"value":2995,"marks":2996,"data":2997},"In both cases, ",[],{},{"nodeType":1293,"value":2999,"marks":3000,"data":3002},"Security is getting visibility too late to be of much value",[3001],{"type":312},{},{"nodeType":1293,"value":3004,"marks":3005,"data":3006},". Once a team has been using an app (even on a free tier) for a year, there’s not much Security can do that will convince employees/teams to move to a more secure app. ",[],{},{"nodeType":1298,"data":3008,"content":3009},{},[3010,3016,3021],{"nodeType":1293,"value":3011,"marks":3012,"data":3015},"To change that, Security needs to intervene and get involved very early in the app adoption process ",[3013,3014],{"type":1610},{"type":312},{},{"nodeType":1293,"value":3017,"marks":3018,"data":3020},"- long before finance is involved.",[3019],{"type":312},{},{"nodeType":1293,"value":2957,"marks":3022,"data":3025},[3023,3024],{"type":1610},{"type":312},{},{"nodeType":1298,"data":3027,"content":3028},{},[3029],{"nodeType":1293,"value":3030,"marks":3031,"data":3032},"Incident Response is necessary, of course, when a SaaS account is breached, but can’t recover the lost data after attackers have had access to it. ",[],{},{"nodeType":1456,"data":3034,"content":3035},{},[3036],{"nodeType":1293,"value":3037,"marks":3038,"data":3039},"Holy S*it - there are so many apps!",[],{},{"nodeType":1298,"data":3041,"content":3042},{},[3043],{"nodeType":1293,"value":3044,"marks":3045,"data":3046},"Once teams get visibility into the scope of the Shadow SaaS and sprawl problem, they’re usually surprised by the sheer volume of apps employees have adopted. \n\nThen they realize they need to do risk assessments on dozens of apps a month instead of the dozen a year that were going through IT in the old, managed and controlled process. To deal with this massive influx of new apps, security teams feel they must either radically increase the headcount, cut corners or drastically increase acceptable risk levels for data security. Neither of these are great options.",[],{},{"nodeType":1456,"data":3048,"content":3049},{},[3050],{"nodeType":1293,"value":3051,"marks":3052,"data":3053},"This is why SSPMs and CASBs exist, right?",[],{},{"nodeType":1298,"data":3055,"content":3056},{},[3057],{"nodeType":1293,"value":3058,"marks":3059,"data":3060},"SaaS Security Posture Management (SSPMs) and Cloud Access Security Brokers (CASBs) are the most common categories of solutions meant to attack this visibility blindspot issue, but none of these tools are getting the full picture of the problem. ",[],{},{"nodeType":1298,"data":3062,"content":3063},{},[3064],{"nodeType":1293,"value":3065,"marks":3066,"data":3067},"At best, they simply chip away at the problem and make security feel like they’ve got a handle on employee-adopted SaaS. At worst, they give a false sense of security while only actually covering a small portion of the SaaS apps where business data actually lives. ",[],{},{"nodeType":1298,"data":3069,"content":3070},{},[3071,3075,3087],{"nodeType":1293,"value":3072,"marks":3073,"data":3074},"The key thing to consider about any of these solutions is what data sources they’re using to collect (typically network data, financial records, email data, application or endpoint data). We won’t dig into the full list of pros and cons of these types of tools, but we encourage you to read about them more ",[],{},{"nodeType":3076,"data":3077,"content":3081},"entry-hyperlink",{"target":3078},{"sys":3079},{"id":3080,"type":1476,"linkType":1477},"45iZ69EdPF4629gZ6yf7p5",[3082],{"nodeType":1293,"value":3083,"marks":3084,"data":3086},"here",[3085],{"type":1573},{},{"nodeType":1293,"value":2649,"marks":3088,"data":3089},[],{},{"nodeType":1298,"data":3091,"content":3092},{},[3093],{"nodeType":1293,"value":3094,"marks":3095,"data":3096},"SSPM tools typically don’t do SaaS discovery - they don’t find apps employees log into, but they do tackle the application hardening and monitoring problem because they focus on policy enforcement and log-monitoring through APIs. ",[],{},{"nodeType":1298,"data":3098,"content":3099},{},[3100],{"nodeType":1293,"value":3101,"marks":3102,"data":3103},"Both SSPMs and CASBs make sense logically as a way to regain control of the situation. But we’d like to challenge the thinking that regaining control has to mean enforcing rigid security policies and restricting app access. ",[],{},{"nodeType":1333,"data":3105,"content":3106},{},[3107],{"nodeType":1293,"value":3108,"marks":3109,"data":3110},"Adjust your thinking to secure SaaS",[],{},{"nodeType":1456,"data":3112,"content":3113},{},[3114],{"nodeType":1293,"value":3115,"marks":3116,"data":3117},"Resist the temptation to revert to the old ways ",[],{},{"nodeType":1298,"data":3119,"content":3120},{},[3121],{"nodeType":1293,"value":3122,"marks":3123,"data":3124},"When the idea of the options above proves daunting or impossible, Security often tries to revert to the old process - putting security measures in place to regain the ability to set the pace of adoption by re-establishing the gate. ",[],{},{"nodeType":1298,"data":3126,"content":3127},{},[3128],{"nodeType":1293,"value":3129,"marks":3130,"data":3131},"Practically, this means that you’re deploying technical controls to try block all SaaS apps until they are approved (and marked as allowed) by IT or Security. Technically, this makes total sense. But the unforeseen consequence is that it positions Security as blockers (aka the “Department of No”) and puts them at odds with the rest of the business, rather than working towards a shared goal. ",[],{},{"nodeType":1456,"data":3133,"content":3134},{},[3135],{"nodeType":1293,"value":3136,"marks":3137,"data":3138},"Why being the “Department of No” doesn’t work ",[],{},{"nodeType":1298,"data":3140,"content":3141},{},[3142],{"nodeType":1293,"value":3143,"marks":3144,"data":3145},"This block-everything-until-security-approves-it position requires incredible executive support to maintain. For all but the most risk-sensitive organizations (read .gov), this position also normalizes employee behavior to bypass Security in favor of working quickly and effectively. ",[],{},{"nodeType":1298,"data":3147,"content":3148},{},[3149,3153,3157],{"nodeType":1293,"value":3150,"marks":3151,"data":3152},"In the end, Security actually ",[],{},{"nodeType":1293,"value":1841,"marks":3154,"data":3156},[3155],{"type":312},{},{"nodeType":1293,"value":1846,"marks":3158,"data":3159},[],{},{"nodeType":1390,"data":3161,"content":3162},{},[3163,3172,3181],{"nodeType":1394,"data":3164,"content":3165},{},[3166],{"nodeType":1298,"data":3167,"content":3168},{},[3169],{"nodeType":1293,"value":1859,"marks":3170,"data":3171},[],{},{"nodeType":1394,"data":3173,"content":3174},{},[3175],{"nodeType":1298,"data":3176,"content":3177},{},[3178],{"nodeType":1293,"value":1869,"marks":3179,"data":3180},[],{},{"nodeType":1394,"data":3182,"content":3183},{},[3184],{"nodeType":1298,"data":3185,"content":3186},{},[3187],{"nodeType":1293,"value":1879,"marks":3188,"data":3189},[],{},{"nodeType":1298,"data":3191,"content":3192},{},[3193],{"nodeType":1293,"value":3194,"marks":3195,"data":3198},"Each blocking action leads to a worse security outcome and blinds the security team further - losing control rather than regaining it.",[3196,3197],{"type":1610},{"type":312},{},{"nodeType":1298,"data":3200,"content":3201},{},[3202],{"nodeType":1293,"value":1895,"marks":3203,"data":3204},[],{},{"nodeType":1456,"data":3206,"content":3207},{},[3208],{"nodeType":1293,"value":3209,"marks":3210,"data":3211},"Don’t worry, there’s a better way, but you must adapt your thinking",[],{},{"nodeType":1298,"data":3213,"content":3214},{},[3215],{"nodeType":1293,"value":3216,"marks":3217,"data":3218},"The first thing we need to do as an industry is agree that we don’t want to be the blockers. We don’t want to stop employees from self-adopting apps. We understand they are best placed to find and select the tools that are going to allow them to be more productive and help your company succeed. ",[],{},{"nodeType":1298,"data":3220,"content":3221},{},[3222],{"nodeType":1293,"value":3223,"marks":3224,"data":3225},"We need to:",[],{},{"nodeType":1390,"data":3227,"content":3228},{},[3229,3239],{"nodeType":1394,"data":3230,"content":3231},{},[3232],{"nodeType":1298,"data":3233,"content":3234},{},[3235],{"nodeType":1293,"value":3236,"marks":3237,"data":3238},"embrace SaaS app self-adoption, and ",[],{},{"nodeType":1394,"data":3240,"content":3241},{},[3242],{"nodeType":1298,"data":3243,"content":3244},{},[3245],{"nodeType":1293,"value":3246,"marks":3247,"data":3248},"stop asking employees to adapt to fit our legacy processes. ",[],{},{"nodeType":1298,"data":3250,"content":3251},{},[3252],{"nodeType":1293,"value":3253,"marks":3254,"data":3255},"Security can no longer be a gate with a default stance of “No, until.” Instead Security needs to be a partner that says “Yes, unless.”",[],{},{"nodeType":1456,"data":3257,"content":3258},{},[3259],{"nodeType":1293,"value":3260,"marks":3261,"data":3262},"From the “Department of No” to the “Department of Yes, Unless?”",[],{},{"nodeType":1298,"data":3264,"content":3265},{},[3266],{"nodeType":1293,"value":3267,"marks":3268,"data":3269},"To adapt to this new SaaS-first world, security must move from saying “No, until we’ve had time to fully vet and onboard this app officially” to “Yes! You can use that app, unless we quickly identify security risks that outweigh the value of the tool.”",[],{},{"nodeType":1298,"data":3271,"content":3272},{},[3273],{"nodeType":1293,"value":3274,"marks":3275,"data":3276},"We know this is deeply uncomfortable for many security practitioners, but it will lead to a better long-term outcome.",[],{},{"nodeType":1333,"data":3278,"content":3279},{},[3280],{"nodeType":1293,"value":3281,"marks":3282,"data":3283},"How to regain control of the SaaS explosion",[],{},{"nodeType":1456,"data":3285,"content":3286},{},[3287],{"nodeType":1293,"value":3288,"marks":3289,"data":3290},"Step 1: Understand how employees typically test drive and eventually adopt SaaS",[],{},{"nodeType":1298,"data":3292,"content":3293},{},[3294],{"nodeType":1293,"value":3295,"marks":3296,"data":3297},"Obviously, self-adoption of SaaS is fundamentally different to IT/Security adopted and managed from a risk perspective. With SaaS, there’s no giant commitment upfront. Apps don’t (usually) just go from unknown and unused to adopted in a day. Just like adopting software was a process for Security and IT back in the day, employees follow a (less rigid) process with SaaS - from testing > to using > to finding value > to inviting teammates, etc. ",[],{},{"nodeType":1298,"data":3299,"content":3300},{},[3301],{"nodeType":1293,"value":3302,"marks":3303,"data":3304},"The risk grows as we proceed through the adoption process as employees add more data into the app and integrate it with other apps. The workflow below outlines a fairly typical SaaS testing and adopting process for employees:",[],{},{"nodeType":1471,"data":3306,"content":3309},{"target":3307},{"sys":3308},{"id":1944,"type":1476,"linkType":1477},[],{"nodeType":1456,"data":3311,"content":3312},{},[3313],{"nodeType":1293,"value":3314,"marks":3315,"data":3316},"Step 2: Get involved early to have a real security impact",[],{},{"nodeType":1298,"data":3318,"content":3319},{},[3320],{"nodeType":1293,"value":3321,"marks":3322,"data":3323},"The upside for Security is that because SaaS adoption is a process over time, we can use that time to assess the risk of the app before it’s fully adopted, as long as we know about the app from the start. ",[],{},{"nodeType":1298,"data":3325,"content":3326},{},[3327],{"nodeType":1293,"value":3328,"marks":3329,"data":3330},"The goal is to catch those apps that are high risk, either because the data going into them (or that will be) is high risk or because the app can perform some high-risk action (like managing your inventory or sending emails to customers or your behalf). Security can focus their efforts on these high-risk vendors and apps to make sure they can be trusted with their data. ",[],{},{"nodeType":1298,"data":3332,"content":3333},{},[3334,3338],{"nodeType":1293,"value":3335,"marks":3336,"data":3337},"But this is key: ",[],{},{"nodeType":1293,"value":3339,"marks":3340,"data":3342},"Security needs to get involved early in the adoption process. ",[3341],{"type":312},{},{"nodeType":1456,"data":3344,"content":3345},{},[3346],{"nodeType":1293,"value":3347,"marks":3348,"data":3349},"Step 3: Get real-time visibility into SaaS apps and risks as employees sign up for them",[],{},{"nodeType":1298,"data":3351,"content":3352},{},[3353],{"nodeType":1293,"value":3354,"marks":3355,"data":3356},"You guessed it - Push can help!",[],{},{"nodeType":1298,"data":3358,"content":3359},{},[3360],{"nodeType":1293,"value":3361,"marks":3362,"data":3363},"We detect employees signing up to new apps and integrating third-party apps to your core work platforms in real-time. That allows you to step in at the earliest opportunity to vet the app for critical issues and guide the employee through the appropriate app onboarding steps. This allows you to focus on the new stuff and buy yourself time. ",[],{},{"nodeType":1471,"data":3365,"content":3369},{"target":3366},{"sys":3367},{"id":3368,"type":1476,"linkType":1477},"1hqMZl60NhvhHIfnO7FttV",[],{"nodeType":1456,"data":3371,"content":3372},{},[3373],{"nodeType":1293,"value":3374,"marks":3375,"data":3376},"Step 4: Avoid wasting time on false-positives",[],{},{"nodeType":1298,"data":3378,"content":3379},{},[3380],{"nodeType":1293,"value":3381,"marks":3382,"data":3383},"You need to trust your data if you want to take action based on the visibility you have of what apps employees are using and how they’re using them. Doing risk assessments or chasing employees about apps they’re not using wastes time and burns goodwill. ",[],{},{"nodeType":1298,"data":3385,"content":3386},{},[3387],{"nodeType":1293,"value":3388,"marks":3389,"data":3390},"Good data allows you to:",[],{},{"nodeType":1390,"data":3392,"content":3393},{},[3394,3404],{"nodeType":1394,"data":3395,"content":3396},{},[3397],{"nodeType":1298,"data":3398,"content":3399},{},[3400],{"nodeType":1293,"value":3401,"marks":3402,"data":3403},"Quickly and accurately identify new SaaS apps and integrations as employees adopt them. ",[],{},{"nodeType":1394,"data":3405,"content":3406},{},[3407],{"nodeType":1298,"data":3408,"content":3409},{},[3410],{"nodeType":1293,"value":3411,"marks":3412,"data":3413},"Identify the security issues that attackers can exploit to compromise your data through common attacks like Credential Stuffing. ",[],{},{"nodeType":1456,"data":3415,"content":3416},{},[3417],{"nodeType":1293,"value":3418,"marks":3419,"data":3420},"Step 5: Use Browser extension data to get the most accurate and useful data for SaaS visibility and risk ",[],{},{"nodeType":1298,"data":3422,"content":3423},{},[3424],{"nodeType":1293,"value":3425,"marks":3426,"data":3427},"Push collects data directly from the app using a browser extension, rather than guessing possible use from other sources like network traffic or email. ",[],{},{"nodeType":1298,"data":3429,"content":3430},{},[3431],{"nodeType":1293,"value":3432,"marks":3433,"data":3434},"That makes Push the only SaaS security solution that can directly observe all SaaS use and the only solution that can identify account security issues across hundreds of apps - completely automatically. ",[],{},{"nodeType":1298,"data":3436,"content":3437},{},[3438,3442,3447],{"nodeType":1293,"value":3439,"marks":3440,"data":3441},"No need for API support, no need for an admin account. It just works. For ",[],{},{"nodeType":1293,"value":3443,"marks":3444,"data":3446},"all",[3445],{"type":1610},{},{"nodeType":1293,"value":3448,"marks":3449,"data":3450}," your SaaS.",[],{},{"nodeType":1456,"data":3452,"content":3453},{},[3454],{"nodeType":1293,"value":3455,"marks":3456,"data":3457},"Step 6: Identify account security risks and discover shadow SaaS at the same time",[],{},{"nodeType":1298,"data":3459,"content":3460},{},[3461],{"nodeType":1293,"value":3462,"marks":3463,"data":3464},"Of course you need to start by discovering SaaS and getting a reliable inventory - but this on its own won’t stop accounts on those apps from getting breached. The most common way SaaS accounts are breached is through attacks like credential stuffing that target weak, breached or shared passwords on accounts that don’t have MFA enabled. ",[],{},{"nodeType":1298,"data":3466,"content":3467},{},[3468],{"nodeType":1293,"value":3469,"marks":3470,"data":3471},"Push can identify account security issues to prevent these common attacks. These include:",[],{},{"nodeType":1390,"data":3473,"content":3474},{},[3475,3485,3495,3505,3515,3525],{"nodeType":1394,"data":3476,"content":3477},{},[3478],{"nodeType":1298,"data":3479,"content":3480},{},[3481],{"nodeType":1293,"value":3482,"marks":3483,"data":3484},"Compromised passwords",[],{},{"nodeType":1394,"data":3486,"content":3487},{},[3488],{"nodeType":1298,"data":3489,"content":3490},{},[3491],{"nodeType":1293,"value":3492,"marks":3493,"data":3494},"Guessable passwords",[],{},{"nodeType":1394,"data":3496,"content":3497},{},[3498],{"nodeType":1298,"data":3499,"content":3500},{},[3501],{"nodeType":1293,"value":3502,"marks":3503,"data":3504},"Account-sharing between multiple employees",[],{},{"nodeType":1394,"data":3506,"content":3507},{},[3508],{"nodeType":1298,"data":3509,"content":3510},{},[3511],{"nodeType":1293,"value":3512,"marks":3513,"data":3514},"Sharing passwords across multiple accounts",[],{},{"nodeType":1394,"data":3516,"content":3517},{},[3518],{"nodeType":1298,"data":3519,"content":3520},{},[3521],{"nodeType":1293,"value":3522,"marks":3523,"data":3524},"Missing MFA",[],{},{"nodeType":1394,"data":3526,"content":3527},{},[3528],{"nodeType":1298,"data":3529,"content":3530},{},[3531],{"nodeType":1293,"value":3532,"marks":3533,"data":3534},"Password manager use",[],{},{"nodeType":1471,"data":3536,"content":3540},{"target":3537},{"sys":3538},{"id":3539,"type":1476,"linkType":1477},"3hR2N6WoP5WDyD6O6zdJP1",[],{"nodeType":1298,"data":3542,"content":3543},{},[3544],{"nodeType":1293,"value":3545,"marks":3546,"data":3547},"We identify these issues at the same time we discover shadow SaaS apps, so you can tackle account compromise at the same time as SaaS discovery to reduce your SaaS security risk exposure faster.",[],{},{"nodeType":1456,"data":3549,"content":3550},{},[3551],{"nodeType":1293,"value":3552,"marks":3553,"data":3554},"Step 7: Automatically reduce the risks we find by engaging employees",[],{},{"nodeType":1298,"data":3556,"content":3557},{},[3558],{"nodeType":1293,"value":3559,"marks":3560,"data":3561},"How do we actually reduce the risks? We engage employees directly via Slack or MS Teams, explain the account security issue we’ve identified in a way they’ll understand, and help them understand how it’s putting them and the business at risk. Then we guide them on how to fix it.",[],{},{"nodeType":1471,"data":3563,"content":3567},{"target":3564},{"sys":3565},{"id":3566,"type":1476,"linkType":1477},"7Hgf81IlfZKoUMOp26ZXmq",[],{"nodeType":1298,"data":3569,"content":3570},{},[3571],{"nodeType":1293,"value":37,"marks":3572,"data":3573},[],{},"7 Steps to secure your data across shadow SaaS apps","Attackers commonly target SaaS apps because they know employees sign up without running them past IT first. Learn how to adjust to secure your data.\n","2023-06-26T00:00:00.000Z","3-steps-to-secure-your-data-across-shadow-saas-apps",{"items":3579},[3580,3582],{"sys":3581,"name":2814},{"id":2813},{"sys":3583,"name":1321},{"id":1320},{"items":3585},[3586],{"fullName":3587,"firstName":3587,"jobTitle":118,"profilePicture":3588},"The Push Team",{"url":3589},"https://images.ctfassets.net/y1cdw1ablpvd/7xpR9kiHAQWtZBj2rpOmmU/052ddfbb96afb37962278062047ab16d/Twitter_Linkedin_icon_white.png",{"items":3591},[3592],{"fullName":3593,"firstName":3594,"jobTitle":3595,"profilePicture":3596},"Sally Soulliere","Sally","Head of Brand & Content",{"url":3597},"https://images.ctfassets.net/y1cdw1ablpvd/7Gh4SbbEj6Zsbd6OzGto8Q/885041a4ddeccc5ef3045c0e22975ef4/T016S22KZ96-U036FPETQRH-330f87708d26-192.jpeg",{"json":3599,"links":3986},{"nodeType":1306,"data":3600,"content":3601},{},[3602,3608,3615,3622,3629,3637,3644,3651,3658,3664,3671,3678,3685,3692,3698,3705,3712,3718,3725,3732,3739,3750,3757,3776,3826,3832,3839,3846,3852,3859,3866,3885,3891,3898,3921,3928,3934,3942,3949,3955,3967,3974,3980],{"nodeType":1333,"data":3603,"content":3604},{},[3605],{"nodeType":1293,"value":1337,"marks":3606,"data":3607},[],{},{"nodeType":1298,"data":3609,"content":3610},{},[3611],{"nodeType":1293,"value":3612,"marks":3613,"data":3614},"SaaS vendors have changed how software is adopted into a business. Now, the majority of SaaS vendors use a product-led growth model - which simply means they want users (your employees) to self-adopt their apps, start using them (with real data), and become a useful tool for the employee. ",[],{},{"nodeType":1298,"data":3616,"content":3617},{},[3618],{"nodeType":1293,"value":3619,"marks":3620,"data":3621},"Vendors want to bypass the security and IT software-onboarding processes we’d all gotten used to in the past. They know if they prove their tool is valuable with the user from the start, it’s much easier and quicker for them to gain traction and customers than it was waiting for security and IT teams to audit (and potentially refuse) their software.",[],{},{"nodeType":1298,"data":3623,"content":3624},{},[3625],{"nodeType":1293,"value":3626,"marks":3627,"data":3628},"The result of this...",[],{},{"nodeType":1298,"data":3630,"content":3631},{},[3632],{"nodeType":1293,"value":3633,"marks":3634,"data":3636},"Employees are self-adopting SaaS apps and creating new cloud identities on their own, without IT approval",[3635],{"type":1610},{},{"nodeType":1298,"data":3638,"content":3639},{},[3640],{"nodeType":1293,"value":3641,"marks":3642,"data":3643},"This self-adoption has turned the product-adoption process on its head - leaving security and IT teams blind to which apps sensitive company data is flowing into.",[],{},{"nodeType":1298,"data":3645,"content":3646},{},[3647],{"nodeType":1293,"value":3648,"marks":3649,"data":3650},"Now that IT and security have to not only find these accounts, identities and apps, but keep sensitive corporate data secure across all cloud services, where do you start? ",[],{},{"nodeType":1298,"data":3652,"content":3653},{},[3654],{"nodeType":1293,"value":3655,"marks":3656,"data":3657},"You could consider a solution like Push, which has built-in features to find and secure identities your employees have created and guide them to harden their accounts against attacks.",[],{},{"nodeType":1471,"data":3659,"content":3663},{"target":3660},{"sys":3661},{"id":3662,"type":1476,"linkType":1477},"6iKFd9Qys2SSuNqKVQB7ka",[],{"nodeType":1333,"data":3665,"content":3666},{},[3667],{"nodeType":1293,"value":3668,"marks":3669,"data":3670},"Push gives you complete visibility, helps you identify risks, and works with employees to secure accounts ",[],{},{"nodeType":1298,"data":3672,"content":3673},{},[3674],{"nodeType":1293,"value":3675,"marks":3676,"data":3677},"It probably won’t come as a surprise to find out that we’ve designed Push so security teams can get a handle on employee-adopted SaaS apps without needing to block them.",[],{},{"nodeType":1456,"data":3679,"content":3680},{},[3681],{"nodeType":1293,"value":3682,"marks":3683,"data":3684},"1. Get visibility of shadow SaaS apps and shadow identities",[],{},{"nodeType":1298,"data":3686,"content":3687},{},[3688],{"nodeType":1293,"value":3689,"marks":3690,"data":3691},"If you’re going to get a handle on employee-adopted SaaS apps, you need to get visibility \nof them first. Push uses data from our browser extension to find SaaS apps that employees sign  into with usernames and passwords and SSO (OIDC). This gives you complete visibility of your SaaS environment, including shadow SaaS apps and cloud accounts that are not managed by IT. ",[],{},{"nodeType":1471,"data":3693,"content":3697},{"target":3694},{"sys":3695},{"id":3696,"type":1476,"linkType":1477},"64S2LPmlKfXD924iZaRMc6",[],{"nodeType":1456,"data":3699,"content":3700},{},[3701],{"nodeType":1293,"value":3702,"marks":3703,"data":3704},"2. Detect the new apps, integrations and identities in real time",[],{},{"nodeType":1298,"data":3706,"content":3707},{},[3708],{"nodeType":1293,"value":3709,"marks":3710,"data":3711},"Push detects employees signing up to new apps, or integrating third-party apps to your core work platforms in real-time. That allows you to step in at the earliest opportunity to check out the app and guide the employee through the appropriate app onboarding steps. ",[],{},{"nodeType":1471,"data":3713,"content":3717},{"target":3714},{"sys":3715},{"id":3716,"type":1476,"linkType":1477},"3XcJ9NQtRq7jUt5iAuxZMt",[],{"nodeType":1456,"data":3719,"content":3720},{},[3721],{"nodeType":1293,"value":3722,"marks":3723,"data":3724},"3. Avoid wasting time on false-positives",[],{},{"nodeType":1298,"data":3726,"content":3727},{},[3728],{"nodeType":1293,"value":3729,"marks":3730,"data":3731},"You need to trust your data if you want to take action to manage risks. Email and network data all infers SaaS usage from indicators such as emails from vendors and website visits. But as you can imagine, that won’t always point to usage, and so false positives are inevitable. Doing risk assessments or chasing employees about apps employees are not actually using wastes time and burns goodwill. ",[],{},{"nodeType":1298,"data":3733,"content":3734},{},[3735],{"nodeType":1293,"value":3736,"marks":3737,"data":3738},"Push uses a browser extension to accurately identify the SaaS apps employees are using and any security issues that attackers can exploit to compromise your data through common attacks like credential stuffing and brute forcing. ",[],{},{"nodeType":3740,"data":3741,"content":3742},"blockquote",{},[3743],{"nodeType":1298,"data":3744,"content":3745},{},[3746],{"nodeType":1293,"value":3747,"marks":3748,"data":3749},"Push is the only identity security solution that can directly observe all SaaS use and detect account vulnerabilities - completely automatically. No need for API support, no need for an admin account. It just works.",[],{},{"nodeType":1456,"data":3751,"content":3752},{},[3753],{"nodeType":1293,"value":3754,"marks":3755,"data":3756},"4. Identify account security risks and discover shadow SaaS at the same time",[],{},{"nodeType":1298,"data":3758,"content":3759},{},[3760,3764,3772],{"nodeType":1293,"value":3761,"marks":3762,"data":3763},"Supply chain risk is important, but we’d argue the risk of identity-based attacks are greater for most organizations. 49% of the incidents in the 2023 Verizon DBIR involved credentials, and Crowdstrike have reported that 80% of the attacks they detected ",[],{},{"nodeType":1565,"data":3765,"content":3767},{"uri":3766},"https://www.crowdstrike.com/cybersecurity-101/identity-security/identity-based-attacks/",[3768],{"nodeType":1293,"value":3769,"marks":3770,"data":3771},"used identity-based attack techniques",[],{},{"nodeType":1293,"value":3773,"marks":3774,"data":3775},". Push can identify account security issues that make it possible for attackers to compromise your employees accounts using credential stuffing, brute forcing and consent phishing attacks. These include:",[],{},{"nodeType":1390,"data":3777,"content":3778},{},[3779,3788,3798,3807,3817],{"nodeType":1394,"data":3780,"content":3781},{},[3782],{"nodeType":1298,"data":3783,"content":3784},{},[3785],{"nodeType":1293,"value":3482,"marks":3786,"data":3787},[],{},{"nodeType":1394,"data":3789,"content":3790},{},[3791],{"nodeType":1298,"data":3792,"content":3793},{},[3794],{"nodeType":1293,"value":3795,"marks":3796,"data":3797},"Guessable passwords (and not using a password manager for storing complex passwords)",[],{},{"nodeType":1394,"data":3799,"content":3800},{},[3801],{"nodeType":1298,"data":3802,"content":3803},{},[3804],{"nodeType":1293,"value":3502,"marks":3805,"data":3806},[],{},{"nodeType":1394,"data":3808,"content":3809},{},[3810],{"nodeType":1298,"data":3811,"content":3812},{},[3813],{"nodeType":1293,"value":3814,"marks":3815,"data":3816},"Reusing passwords across multiple accounts",[],{},{"nodeType":1394,"data":3818,"content":3819},{},[3820],{"nodeType":1298,"data":3821,"content":3822},{},[3823],{"nodeType":1293,"value":3522,"marks":3824,"data":3825},[],{},{"nodeType":1471,"data":3827,"content":3831},{"target":3828},{"sys":3829},{"id":3830,"type":1476,"linkType":1477},"3y9oXd2vV1IGL0ci97qXz1",[],{"nodeType":1298,"data":3833,"content":3834},{},[3835],{"nodeType":1293,"value":3836,"marks":3837,"data":3838},"We identify these issues at the same time we discover shadow SaaS apps, so you can tackle identity-based attack risks at the same time as supply chain risk to reduce your overall risk exposure faster.",[],{},{"nodeType":1298,"data":3840,"content":3841},{},[3842],{"nodeType":1293,"value":3843,"marks":3844,"data":3845},"Push can help you reduce these risks by engaging employees directly via Slack or MS Teams, explain the account security issue we’ve identified in a way they’ll understand, and guide them on how to fix it.",[],{},{"nodeType":1471,"data":3847,"content":3851},{"target":3848},{"sys":3849},{"id":3850,"type":1476,"linkType":1477},"2ff4hEKJ1CqKjPMaVPTxHp",[],{"nodeType":1456,"data":3853,"content":3854},{},[3855],{"nodeType":1293,"value":3856,"marks":3857,"data":3858},"5. Use Push to secure accounts that aren’t behind SSO",[],{},{"nodeType":1298,"data":3860,"content":3861},{},[3862],{"nodeType":1293,"value":3863,"marks":3864,"data":3865},"In an ideal world, you could stick all your SaaS apps and accounts behind your SSO solution. With SAML SSO, there’s just one identity, just one password, and you can centrally deprovision accounts when employees leave the organization. You’re probably already paying for a SAML IdP (Identity Provider) like Google Directory or Azure AD. Many others are using tools like Okta.",[],{},{"nodeType":1298,"data":3867,"content":3868},{},[3869,3873,3882],{"nodeType":1293,"value":3870,"marks":3871,"data":3872},"Unfortunately,  ",[],{},{"nodeType":1565,"data":3874,"content":3876},{"uri":3875},"https://pushsecurity.com/blog/what-is-credential-stuffing/",[3877],{"nodeType":1293,"value":3878,"marks":3879,"data":3881},"SSO is only available on around 31% of work apps we explored",[3880],{"type":1573},{},{"nodeType":1293,"value":2649,"marks":3883,"data":3884},[],{},{"nodeType":1471,"data":3886,"content":3890},{"target":3887},{"sys":3888},{"id":3889,"type":1476,"linkType":1477},"73E93otbLKilAM2U48WRho",[],{"nodeType":1298,"data":3892,"content":3893},{},[3894],{"nodeType":1293,"value":3895,"marks":3896,"data":3897},"So, with SSO unavailable for most apps, you can rely on Push to ensure strong access controls on non-SSO accounts, things like: ",[],{},{"nodeType":1390,"data":3899,"content":3900},{},[3901,3911],{"nodeType":1394,"data":3902,"content":3903},{},[3904],{"nodeType":1298,"data":3905,"content":3906},{},[3907],{"nodeType":1293,"value":3908,"marks":3909,"data":3910},"using strong, unique passwords, and",[],{},{"nodeType":1394,"data":3912,"content":3913},{},[3914],{"nodeType":1298,"data":3915,"content":3916},{},[3917],{"nodeType":1293,"value":3918,"marks":3919,"data":3920},"utilizing multi factor authentication (MFA). ",[],{},{"nodeType":1298,"data":3922,"content":3923},{},[3924],{"nodeType":1293,"value":3925,"marks":3926,"data":3927},"These authentication controls, when used in conjunction with one another,  are very effective in protecting SaaS accounts from identity-based attack techniques. When Push detects that these controls are not in place, we automatically engage users via Slack or Teams and guide them to fix the issues.",[],{},{"nodeType":1471,"data":3929,"content":3933},{"target":3930},{"sys":3931},{"id":3932,"type":1476,"linkType":1477},"6b8N3UOfciGnDBu78I1I2i",[],{"nodeType":1298,"data":3935,"content":3936},{},[3937],{"nodeType":1293,"value":3938,"marks":3939,"data":3941},"Prevent new identity vulnerabilities being created",[3940],{"type":1610},{},{"nodeType":1298,"data":3943,"content":3944},{},[3945],{"nodeType":1293,"value":3946,"marks":3947,"data":3948},"Once you’ve been able to fix the security issues on all your existing cloud accounts, you want to make sure that new vulnerabilities don’t creep back in.. When Push detects an employee creating a new account in their browser, we’ll guide them \nto set up strong access controls on their account. ",[],{},{"nodeType":1471,"data":3950,"content":3954},{"target":3951},{"sys":3952},{"id":3953,"type":1476,"linkType":1477},"PUluIhvb6a498j1lD5W6N",[],{"nodeType":1456,"data":3956,"content":3957},{},[3958,3962],{"nodeType":1293,"value":3959,"marks":3960,"data":3961},"\n6. Get a handle on employee-adopted apps ",[],{},{"nodeType":1293,"value":3963,"marks":3964,"data":3966},"without being a blocker",[3965],{"type":312},{},{"nodeType":1298,"data":3968,"content":3969},{},[3970],{"nodeType":1293,"value":3971,"marks":3972,"data":3973},"By using Push, you gain complete visibility of all SaaS apps in your environment, including those adopted by employees without the oversight of IT and Security. We’ll automatically find the security issues that put your data at risk and guide employees to fix them. This allows you to embrace app self-adoption and adopt a default allow approach that enables your business while scaling security so you don’t lose control of SaaS security risks.  ",[],{},{"nodeType":1471,"data":3975,"content":3979},{"target":3976},{"sys":3977},{"id":3978,"type":1476,"linkType":1477},"2y0INxqAi594O7rCAVKhTI",[],{"nodeType":1298,"data":3981,"content":3982},{},[3983],{"nodeType":1293,"value":37,"marks":3984,"data":3985},[],{},{"entries":3987},{"hyperlink":3988,"inline":3989,"block":3990},[],[],[3991,3998,4007,4013,4021,4027,4035,4043,4051],{"sys":3992,"__typename":3993,"type":3994,"ctaText":3995,"buttonLabel":3996,"buttonColour":3997,"buttonUrl":118},{"id":3662},"CtaWidget","Demo","Learn how Push can help you secure identities across your org","Book a demo!","sunny orange",{"sys":3999,"__typename":4000,"title":4001,"caption":4002,"layoutMode":118,"file":4003},{"id":3696},"Image","Apps dash_PLG blog","Push dashboard of applications in use",{"url":4004,"width":4005,"height":4006},"https://images.ctfassets.net/y1cdw1ablpvd/725D6oAs9P55D6ffUZQ943/ea8128093af916eea79c13d429755f6e/image3.png",1999,1034,{"sys":4008,"__typename":4000,"title":4009,"caption":4010,"layoutMode":118,"file":4011},{"id":3716},"New SaaS acct chatops","A ChatOps message from Push to administrators about a new app signup",{"url":4012,"width":4005,"height":4006},"https://images.ctfassets.net/y1cdw1ablpvd/6lrpt8ch3nqSaU0kSMc0ig/cfc44aecacdb399e5a5ef739a724e77d/image7.png",{"sys":4014,"__typename":4000,"title":4015,"caption":4016,"layoutMode":118,"file":4017},{"id":3830},"Employee identities dashboard ","Employee identities dashboard showing the security status for each account/identity",{"url":4018,"width":4019,"height":4020},"https://images.ctfassets.net/y1cdw1ablpvd/3TFVCYgvSaiUlWFamaHhCd/3a845d4c7bd69058a4fa27099dd4cc2d/image2.png",1580,945,{"sys":4022,"__typename":4000,"title":4023,"caption":4024,"layoutMode":118,"file":4025},{"id":3850},"MFA ChatOps message ","A chat message to guide an employee to turn on MFA",{"url":4026,"width":4005,"height":4006},"https://images.ctfassets.net/y1cdw1ablpvd/3C4b1X7FvwlfGnSonGC0aT/2c14caaadc2252cde79be9db059acaf2/image6.png",{"sys":4028,"__typename":4000,"title":4029,"caption":4030,"layoutMode":118,"file":4031},{"id":3889},"SSO tax image","SSO is the gold standard, but it's unavailable or impractical for many apps",{"url":4032,"width":4033,"height":4034},"https://images.ctfassets.net/y1cdw1ablpvd/7DvBY7bwHWeF20RZvxQlHQ/9957f75e59dee10b28d13b38e4d88e9f/Screenshot_2023-10-06_at_10.17.51_AM.png",1752,988,{"sys":4036,"__typename":4000,"title":4037,"caption":4038,"layoutMode":118,"file":4039},{"id":3932},"Push MFA not registered","Identities dashboard in Push showing MFA-related security issues",{"url":4040,"width":4041,"height":4042},"https://images.ctfassets.net/y1cdw1ablpvd/LzyT5HwjDRbiCj2Eqvtmg/2371f3c9437a78551548babc02fe24bc/image4.png",1388,1113,{"sys":4044,"__typename":4000,"title":4045,"caption":4046,"layoutMode":118,"file":4047},{"id":3953},"In-Browser password guidance","Push can guide employees in the browser, as they're signing up, to create strong credentials from the start",{"url":4048,"width":4049,"height":4050},"https://images.ctfassets.net/y1cdw1ablpvd/5ttm9ljSgqZfEY1J6ZjIP4/2b1f734bc12cafb7952b1d1e26ec6870/image5.png",1346,877,{"sys":4052,"__typename":3993,"type":4053,"ctaText":4054,"buttonLabel":4055,"buttonColour":4056,"buttonUrl":118},{"id":3978},"LinkedIn","See more original research and technical content from Push","Follow us on LinkedIn","orange","content:blog:manage-third-party-data-access.json","json","content","blog/manage-third-party-data-access.json","blog/manage-third-party-data-access",1776359990654]