[{"data":1,"prerenderedAt":2123},["ShallowReactive",2],{"application-flags":3,"navbar":7,"always-visible-banner":95,"product-page-v-2":155,"allCustomerStories":341,"use-case-page":912,"video-carousel":1924,"product-outcomes":2023},[4],{"name":5,"enabled":6},"maintenanceMode",false,[8,59,76],{"createdDate":9,"id":10,"name":11,"modelId":12,"published":13,"stageModifiedSincePublish":6,"query":14,"data":15,"variations":50,"lastUpdated":51,"firstPublished":52,"testRatio":33,"createdBy":53,"lastUpdatedBy":53,"folders":54,"meta":55,"rev":58},1742213002749,"efff2a27faf4408e9f908eba4b5542fe","inductive-automation","1c6207a5f24948ab82d4a0b17f251193","published",[],{"testimonial":16,"description":43,"type":19,"link":44,"title":47,"testimonialLink":48,"image":49},{"@type":17,"id":18,"model":19,"value":20},"@builder.io/core:Reference","f028f2b685bb47cd8bf9e82a26dd5a79","testimonial",{"query":21,"folders":22,"createdDate":23,"id":18,"name":24,"modelId":25,"published":13,"data":26,"variations":30,"lastUpdated":31,"firstPublished":32,"testRatio":33,"createdBy":34,"lastUpdatedBy":34,"meta":35,"rev":42},[],[],1735823466309,"We found Push to be more accurate when compared to competitors and the browser agent offered features that others couldn’t match.","42035571a56940ac98bff4544aa79aa5",{"author":27,"jobTitle":28,"quote":24,"image":29},"Jason Waits","\u003Cp>CISO at Inductive Automation\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Ff04c0c0689ce4a89ac0f0708d78c0a07",{},1735910703862,1735823501152,1,"ST0tXQM8slWpFrmioqKHmENB2qe2",{"kind":36,"lastPreviewUrl":37,"breakpoints":38,"hasAutosaves":41},"data","",{"small":39,"medium":40},640,768,true,"n0c69wxpcx","Join the industry's top security minds as they break down the browser attack landscape.",{"url":45,"text":46},"https://pushsecurity.com/webinar/state-of-browser-security","Save Your Spot","State of Browser Attacks Series","/customer-stories/inductive-automation","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fe94fca10aa7b46ac8052b7ea22de54cd",{},1776257019270,1742221533648,"CydmZnOWU1XuAaLhEDCoYNM4Z8W2",[],{"breakpoints":56,"kind":36,"lastPreviewUrl":37,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},320,"brpv9ps5x2",{"createdDate":60,"id":61,"name":62,"modelId":12,"published":13,"query":63,"data":64,"variations":69,"lastUpdated":70,"firstPublished":71,"testRatio":33,"createdBy":53,"lastUpdatedBy":72,"folders":73,"meta":74,"rev":58},1742208588866,"1c7a4e423bf54ac1a328bb4063459ef2","Banner",[],{"type":65,"url":66,"text":67,"link":68},"web-banner","https://pushsecurity.com/resources/browser-attacks-report","Get our latest report analyzing browser attack techniques in 2026",{},{},1774258294825,1742208637545,"jKjF9r5jcvXU8tzZEfFQm31Iyvr2",[],{"kind":36,"lastPreviewUrl":37,"breakpoints":75,"hasAutosaves":41},{"xsmall":57,"small":39,"medium":40},{"createdDate":77,"id":78,"name":79,"modelId":12,"published":13,"stageModifiedSincePublish":6,"query":80,"data":81,"variations":89,"lastUpdated":90,"firstPublished":91,"testRatio":33,"createdBy":53,"lastUpdatedBy":53,"folders":92,"meta":93,"rev":58},1742208469288,"6763051b201f44a0838c6400c580ca67","Resource highlight",[],{"image":82,"type":83,"description":84,"link":85,"title":88},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F7b4a5ebf81d64e8c9d7fc35f6c96c4a9","resource","Learn about the latest techniques being used in the wild.",{"url":86,"text":87},"/resources/browser-attacks-report","Download now","Report: 2026 Browser Attack Techniques",{},1776255866789,1742208570400,[],{"kind":36,"lastPreviewUrl":37,"breakpoints":94,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},{"createdDate":96,"id":97,"name":98,"modelId":99,"published":13,"query":100,"data":101,"variations":145,"lastUpdated":146,"firstPublished":147,"testRatio":33,"createdBy":34,"lastUpdatedBy":148,"folders":149,"meta":150,"rev":154},1774965361051,"fd266d0172cc47429be7ad10f48c99ad","always visible banner","0678d178ec8b41efb8a23c09dba7874d",[],{"ctaText":102,"text":103,"url":37,"blocks":104,"state":141},"ewrererw","testrfesssssssssss",[105,129],{"@type":106,"@version":107,"id":108,"component":109,"responsiveStyles":119},"@builder.io/sdk:Element",2,"builder-ca12c06a52de41d7b8743da53118cd38",{"name":110,"tag":110,"options":111,"isRSC":118},"TopBannerContent",{"text":112,"ctaText":46,"url":45,"mainText":113,"cta":116},"New Webinar Series: Join John Hammond, Troy Hunt, and Matt Johansen for the State of Browser Attacks",{"content":114,"fontSize":115},"\u003Cp>New Webinar Series: Join John Hammond, Troy Hunt, and Matt Johansen for the State of Browser Attacks\u003C/p>","text-base",{"content":117,"fontSize":115,"url":45},"\u003Cp>\u003Cstrong style=\"font-weight:700;\">Save Your Spot\u003C/strong>\u003C/p>\n",null,{"large":120},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":126,"marginBottom":126,"fontSize":127,"fontWeight":128},"flex","column","relative","0","border-box",".56rem","1.125rem","700",{"id":130,"@type":106,"tagName":131,"properties":132,"responsiveStyles":136},"builder-pixel-dloynz89rbq","img",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},"https://cdn.builder.io/api/v1/pixel?apiKey=f3a1111ff5be48cdbb123cd9f5795a05","true","presentation",{"large":137},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},"block","hidden","none",{"deviceSize":142,"location":143},"large",{"path":37,"query":144},{},{},1775137295127,1774968080803,"ax7YYfD0OCeqT1Vxxv1G4FUbqVr1",[],{"breakpoints":151,"hasLinks":6,"kind":152,"lastPreviewUrl":153,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},"component","https://pushsecurity.com/?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests%2CmergePullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=always-visible-banner&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.always-visible-banner=fd266d0172cc47429be7ad10f48c99ad&builder.overrides.fd266d0172cc47429be7ad10f48c99ad=fd266d0172cc47429be7ad10f48c99ad&builder.options.locale=Default","vvf0k1j1pre",{"createdDate":156,"id":157,"name":158,"modelId":159,"published":13,"stageModifiedSincePublish":6,"query":160,"data":166,"variations":329,"lastUpdated":330,"firstPublished":331,"testRatio":33,"screenshot":332,"createdBy":333,"lastUpdatedBy":334,"folders":335,"meta":336,"rev":340},1768996260885,"35a9159019824514911f127177027fef","Product","8664f138e46a4dde818fca29fea925e7",[161],{"@type":162,"property":163,"operator":164,"value":165},"@builder.io/core:Query","urlPath","is","/product",{"seoDescription":167,"title":168,"seoTitle":169,"themeId":6,"blocks":170,"url":165,"state":326},"Give your blue team the edge with Push’s browser agent telemetry.","Product V2","Product | Push Security",[171,181,203,213,246,255,284,313,321],{"@type":106,"@version":107,"id":172,"component":173,"responsiveStyles":179},"builder-b0edb08ee35847a288a512fbefb1a6e5",{"name":174,"tag":174,"options":175,"isRSC":118},"ProductHero",{"title":176,"description":177,"image":178,"videoId":37},"\u003Cp>The most powerful \u003C/p>\u003Cp>\u003Cstrong style=\"color: rgb(255, 72, 36);\">AI-native \u003C/strong>security tool in the browser\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","\u003Cp>Agents that hunt, detect, and respond. Across every browser you use.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fbff0c05312bb4e7fb0ecbcc44335791a",{"large":180},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":182,"component":183,"responsiveStyles":201},"builder-f5cb79a594a34780971adea9d8c1d010",{"name":184,"tag":184,"options":185,"isRSC":118},"ResearchLedAgentPowered",{"heading":186,"content":187,"animationItems":188},"\u003Cp>Research-led. Agent-powered.\u003Cspan class=\"ql-cursor\">﻿\u003C/span>\u003C/p>","\u003Cp>Push is advanced by a team of red and blue team experts who discover new browser attack techniques before they've been seen in the wild.&nbsp;\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>Agentic AI is the force-multiplier that hunts-at-scale for new attacks across millions of browsers and trillions of events, identifying patterns and refining detections with greater speed and precision.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>This means new detections are shipped to customers within minutes of a threat being analyzed.&nbsp;\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>Attackers are fast, but we’re faster.&nbsp;\u003C/p>",{"column1":189,"column2":192,"column3":195,"column4":198},{"title":190,"subtext":191},"Expert threat research team","Discovers new browser attack TTPs before they're seen in the wild",{"title":193,"subtext":194},"Force-multiplied by agentic AI","Uses research to rapidly hunt for new threats at scale",{"title":196,"subtext":197},"Across millions of browsers","Running the Push Security browser extension globally",{"title":199,"subtext":200},"Producing trillions of events","All collected and analysed for threats by Push in real time",{"large":202},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":204,"component":205,"responsiveStyles":211},"builder-2a0e061eb5f84174a781728638078d07",{"name":206,"tag":206,"options":207,"isRSC":118},"BiggerPicture",{"heading":208,"content":209,"image":210},"\u003Cp>Security at machine speed\u003C/p>","\u003Cp>Push is AI-native by design. Autonomous agents operationalize robust browser telemetry and real-time control continuously, hunting for new attack techniques, writing detection rules, and deploying blocking scripts across millions of browsers and trillions of events without human intervention.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>Our threat research team provides the intelligence that powers the agents. New detections reach customers within minutes of a threat being analyzed.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>Attackers are fast. Push is faster.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F3ea580c37a264cb7995bf3441bbc5e87",{"large":212},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":214,"component":215,"responsiveStyles":244},"builder-fc986ea9d7e543f389f66c82781ca0c6",{"name":216,"tag":216,"options":217,"isRSC":118},"SecopsStack",{"heading":218,"content":219,"line1":220,"line2":226,"line3":232,"line4":238},"The modern SecOps stack","\u003Cp>Tools focused on the endpoint, network, and inbox are foundational. But attackers opened a new front inside the browser session, a layer those tools weren't built to inspect.\u003C/p>\n",{"label1":221,"label2":222,"content":223,"link":224},"Cloud services","CNAPP, ITDR & Email","\u003Cp>Your CNAPP and ITDR platforms secure your cloud infrastructure and your IdP, but not the browser session. Push secures access to your cloud resources via the browser.\u003C/p>",{"openInNewTab":41,"url":225},"/blog/push-plus-cloud-security",{"label1":227,"label2":228,"content":229,"link":230},"Browsers","Push Security","\u003Cp>Push Security provides blue teams with net-new visibility of browser-based attacks to complement your existing threat detection &amp; response stack.\u003C/p>",{"url":231,"openInNewTab":41},"/resources/product-brochure",{"label1":233,"label2":234,"content":235,"link":236},"Endpoints","EDR","\u003Cp>EDR doesn’t provide security in the browser layer. Push works alongside your EDR deployment to give you protection at the new layer for attackers.\u003C/p>",{"openInNewTab":41,"url":237},"/blog/push-plus-endpoint-security",{"label1":239,"label2":240,"content":241,"link":242},"Network","SSE","\u003Cp>Proxy based solutions like SSE, SWG, and CASB, see traffic, not what your users see. Push provides in-tab visibility into page structure, scripts, and user interaction.\u003C/p>",{"openInNewTab":41,"url":243},"/blog/push-plus-network-security",{"large":245},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":247,"component":248,"responsiveStyles":253},"builder-88d5019724df4b3b9ca56261352e9a51",{"name":249,"tag":249,"options":250,"isRSC":118},"WhyPush",{"heading":251,"subtext":252},"Hear what people are saying about Push","\u003Cp>Today’s security leaders know that defending the browser is key to the future of cyber defense. \u003C/p>",{"large":254},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":256,"component":257,"responsiveStyles":282},"builder-dce6bd38533a44bc8cf64d3267ab64b1",{"name":258,"tag":258,"options":259,"isRSC":118},"UsingPush",{"heading":260,"subsections":261},"Using the Push Platform",[262,267,272,277],{"heading":263,"content":264,"image":265,"imageDescription":266},"Stop attacks","\u003Cp>\u003Cstrong>Secure your organization via the browser.\u003C/strong>\u003C/p>\u003Cp>Detect and block in-browser threats in real time: phishing kits, token theft, and session hijacking. Push inspects page structure, content, and user interaction to spot cloned logins, malicious scripts, and credential misuse as the user sees them.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F64bf0069bca54712ad07b8443b15d613","Stop attacks image",{"heading":268,"content":269,"image":270,"imageDescription":271},"Investigate faster","\u003Cp>\u003Cstrong>Detect and respond like never before.\u003C/strong>\u003C/p>\u003Cp>Reconstruct what happened, fast. Push captures page loads, click paths, credential use, and token activity to build user/session timelines, revealing attacker behavior, blast radius, and OAuth exposure.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Ffebef747913045fab3b55f87e318914f","Browser detection table",{"heading":273,"content":274,"image":275,"imageDescription":276},"Protect users","\u003Cp>\u003Cstrong>Gaps are everywhere,&nbsp;and attackers are looking for them.\u003C/strong>\u003C/p>\u003Cp>Close common gaps before they're abused. Push flags missing MFA, password reuse, non-SSO logins, shadow apps, and risky extensions, then guides users to remediate or enforces policy in the browser.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F25958911f74d446897d0bfaa9ee4185d","Phishing danger detected",{"heading":278,"content":279,"image":280,"imageDescription":281},"Secure AI use","\u003Cp>\u003Cstrong>Your users are already using AI. Now you can see exactly how.\u003C/strong>\u003C/p>\u003Cp>See real user activity inside AI tools: what’s typed, pasted, uploaded, and authorized. From shadow AI apps to agent access and extensions, you get a clear view of where data is going and what’s being exposed, along with controls to act immediately.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F08fcf68cd5aa4bdfbd7e9617a83be9e5","AI dashboard",{"large":283},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":285,"component":286,"responsiveStyles":310},"builder-88f21980e70f4612b0ffaa30035b4aed",{"name":287,"tag":287,"options":288,"isRSC":118},"OneWeekGraph",{"sectionHeading":289,"curvePoints":290,"sectionSubtext":309},"One week in and already ahead of attackers",{"curvePoint1":291,"curvePoint2":298,"curvePoint3":302},{"heading":292,"subtext1":293,"subtext2":294,"graphic":295},"Day Zero","Rapid deployment via MDM, to every browser","Our record: 100k users in 1 hour during normal office hours.",{"url":296,"imageAltText":297},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F4b24e782df2f4f59927fd38f55e88219?format=webp","Browser icons",{"heading":299,"subtext1":300,"subtext2":301},"Day One","Instant protection and insights for your users","Stop phishing, session theft, and malware delivery from day 1",{"heading":303,"subtext1":304,"subtext2":305,"graphic":306},"Week One","Operationalize with 1st class IdP & SIEM integrations","Harness the power of browser telemetry to fix vulnerabilities and respond to incidents.",{"url":307,"imageAltText":308},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F9c9b34b1dd13482e9969a6d0ff681e55?format=webp","Service integration icons","\n",{"large":311},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"pointerEvents":312},"auto",{"@type":106,"@version":107,"id":314,"component":315,"responsiveStyles":319},"builder-13c02078886c4f50a5f680fbe9049a1c",{"name":316,"tag":316,"options":317,"isRSC":118},"ProductOutcomes",{"sectionHeading":318},"Outcomes that matter most",{"large":320},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":322,"@type":106,"tagName":131,"properties":323,"responsiveStyles":324},"builder-pixel-pp461lh4dtn",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":325},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":327},{"path":37,"query":328},{},{},1776193859659,1768996546191,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F337123defb7f40d281e225d59ce25d56","SfUPqW5tkibIPby49keNFMdHFTr1","kYgMv6WsbvfmlOUYqR2SFwGzw6e2",[],{"hasErrors":6,"lastPreviewUrl":337,"breakpoints":338,"hasLinks":6,"kind":339,"hasAutosaves":6},"https://pushsecurity.com/product?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CcreateProjects%2CsendPullRequests&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=product-page-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.product-page-v-2=35a9159019824514911f127177027fef&builder.overrides.35a9159019824514911f127177027fef=35a9159019824514911f127177027fef&builder.overrides.product-page-v-2:/product=35a9159019824514911f127177027fef&builder.options.locale=Default",{"xsmall":57,"small":39,"medium":40},"page","m6o3z64r5g",[342,504,662,798],{"createdDate":343,"id":344,"name":345,"modelId":346,"published":13,"query":347,"data":350,"variations":494,"lastUpdated":495,"firstPublished":496,"testRatio":33,"screenshot":497,"createdBy":53,"lastUpdatedBy":72,"folders":498,"meta":499,"rev":503},1762795321508,"08b65992e49d4c2c9db231662879f089","Cribl","989720d5a128470cb938ca12aedfef29",[348],{"@type":162,"property":163,"operator":164,"value":349},"/customer-stories/cribl",{"effectivePublishDate":351,"seoDescription":352,"seoTitle":353,"indexPageDescription":354,"resourcesPageTitle":353,"title":355,"ogImage":356,"indexPageDesciption":357,"resourcesPageDescription":352,"logo":356,"description":358,"themeId":6,"resourcesPageImage":359,"blocks":360,"url":349,"state":491},"Sat Nov 15 2025 00:00:00 GMT+0000 (Greenwich Mean Time)","How Cribl leverages Push to enhance proactive browser security.","Customer Story: Cribl","Using Push, Cribl confirmed and remediated unmonitored login paths across critical business apps — risks that had previously gone unquantified.","dummy","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F790a9cc56084478592eae39f53790e4c","Push helped Inductive find and secure shadow accounts and apps with high-fidelity data in a way that didn't interfere with employees productivity.","How Cribl leverages Push to enhance proactive browser security. ","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F5542d0f63c334af3bfcb4fe02fba2921",[361,374,404,420,439,456,476,486],{"@type":106,"@version":107,"id":362,"meta":363,"component":365,"responsiveStyles":372},"builder-d24b4ac0dd42473296e916eb5192bacf",{"previousId":364},"builder-358a6779ad884910828de44db2f7109a",{"name":366,"tag":367,"options":368,"isRSC":118},"CS Hero","CustomerStoriesHero",{"heroTitle":353,"heroDescription":369,"heroLogo":370,"glowColor":371},"\u003Cp>Using Push, Cribl confirmed and remediated unmonitored login paths across critical business apps — risks that had previously gone unquantified.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F000dad7ce3904fa9959f4ac8bc0681c0","#5EBCB7",{"large":373},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":375,"meta":376,"component":378,"responsiveStyles":402},"builder-b79065fa8efd4eb68427e7648ec49e0c",{"previousId":377},"builder-639f543377f343e1aeefd0da4c808dca",{"name":379,"tag":380,"options":381,"isRSC":118},"CS Summary","CustomerStoriesSummary",{"summaryTitle":382,"summaryDescription":383,"summaryStat1":384,"summaryStat2":388,"summaryStat3":392,"summaryStat4":393,"stats":394},"About Cribl","\u003Cp>Cribl is an American company developing a data platform for information technology and security operations teams. Their solutions give organizations control and flexibility over their observability and security data.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong style=\"color: rgb(255, 72, 36);\">Why Cribl chose Push:﻿\u003C/strong>\u003C/p>\u003Cul>\u003Cli>Cribl, a leader in data management for IT and security teams, wanted a security solution that could support its proactive approach to identity and browser security in a fast-moving, remote-first environment. Their goal was to enhance the security of identities and applications beyond what traditional IdP and SSO tools could cover, without slowing down their work.\u003C/li>\u003Cli>Push helped Cribl validate and quantify hard-to-detect risks, including misconfigured login pages for key business applications that were allowing a significant number of users to bypass SSO.\u003C/li>\u003Cli>The Cribl security team used Push's flexible, high-fidelity data to scale their existing detection and response workflows, reduce manual effort, and enforce policy with confidence, without introducing friction for end users.\u003C/li>\u003C/ul>",{"icon":385,"value":386,"gap":118,"extraValueText":37,"helpText":387},"faShieldCheck",1118,"Users protected",{"icon":389,"value":33,"gap":33,"extraValueText":390,"helpText":391},"faStopwatch","+","Hours saved per investigation",{"icon":37,"value":118,"extraValueText":37,"helpText":37},{"icon":37,"value":118,"extraValueText":37,"helpText":37},[395,400,401],{"formatValue":6,"icon":396,"value":397,"gap":398,"helpText":399,"extraValueText":37},"faBuildingFlag",2024,0,"Protected by Push since 2024",{"formatValue":41,"icon":385,"value":386,"gap":398,"helpText":387},{"formatValue":41,"icon":389,"value":33,"gap":398,"helpText":391,"extraValueText":390},{"large":403},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":405,"meta":406,"component":408,"responsiveStyles":417},"builder-02be3f7cafb3473baa83d3132b6aa9f2",{"previousId":407},"builder-c1e460bfc9dd4dd19a5eedad71702d9b",{"name":409,"tag":410,"options":411,"isRSC":118},"CS Quote Carousel","CustomerStoriesQuoteCarousel",{"quoteCarousel":412},[413],{"author":414,"jobTitle":415,"quote":416},"Alex Crusco","Staff Security Engineer","\u003Cp>We knew one of our biggest risks was tied to identity. Push was the only solution that could give us a true picture of that attack surface, connecting employee actions directly to the SaaS apps they use every day.\u003C/p>",{"large":418},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingBottom":419},"0px",{"@type":106,"@version":107,"id":421,"meta":422,"component":424,"responsiveStyles":437},"builder-70d8cc0ef9894b2485588da68e6662fd",{"previousId":423},"builder-1cb31d58a3084cebae42a5a4cceec88b",{"name":425,"tag":426,"options":427,"isRSC":118},"CS Quote Summary","CustomerStoriesQuoteSummary",{"theme":428,"sections":429,"title":435,"diagonalVariant":436},"dark-gradient",[430],{"text":431,"quotes":432},"\u003Cp>As a remote-first company, Cribl empowers its employees with the flexibility to innovate quickly. This freedom, though, creates a common challenge for security teams in remote-first environments: the inherent difficulty in gaining deep visibility into the browser-based attack surface, even with a robust security stack.\u003C/p>\u003Cp>\"I threat-modeled every single thing that we could think of that could possibly go wrong, and identity was high on that list,\" said Alex Crusco, Staff Security Engineer at Cribl. \"There are many ways attackers can manipulate users and gain access without triggering traditional alerts.\"\u003C/p>\u003Cp>The team needed a solution that wouldn't slow the business down but could deliver concrete high-confidence data about identity hygiene and risky app behavior. \"Without the right data, this problem was just a theory,\" said Aaron Thummel, Senior Security Analyst. \"Push gave us the data to quantify the risk and drive real change. It's hard to get a security initiative off the ground without solid numbers to back it up.\"\u003C/p>",[433],{"quote":434,"quoteBy":345},"\u003Cp>Without the right data, this problem was just a theory. Push gave us the data to quantify the risk and drive real change. It's hard to get a security initiative off the ground without solid numbers to back it up.\u003C/p>\n","Business Challenge","black-black",{"large":438},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":440,"meta":441,"component":443,"responsiveStyles":454},"builder-d75d70b0f4cc47708c02ed0405dd39fd",{"previousId":442},"builder-99a5a96c9ce04e3483b9e8156a81006c",{"name":425,"tag":426,"options":444,"isRSC":118},{"theme":445,"sections":446,"title":452,"diagonalVariant":453},"light-plain",[447],{"text":448,"quotes":449},"\u003Ch3>\u003Cstrong>Visibility limitations beyond the IdP\u003C/strong>\u003C/h3>\u003Cp>Before Push, the security team relied on correlating data from their IdP and other tools to investigate potential threats. This process was time-consuming, and it often lacked the browser-level context needed to trace incidents back to their source.\u003C/p>\u003Cp>\"I didn't have visibility into the browser before, so there was no way for me to determine what actually happened or how it started,\" explained Alex. \"It's more like backwards tracing, rather than, ‘How did it happen?’\"\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Ch3>\u003Cstrong>Validating hidden risks\u003C/strong>\u003C/h3>\u003Cp>Those limitations came into sharper focus when Cribl deployed Push. Early on, the team identified a misconfigured login page on a core business application that was still accessible, and in use.\u003C/p>\u003Cp>\"We found that a significant number of users were still logging in with just their username and password, bypassing SSO entirely,\" recalled Alex. \"Our team's diligence discovered this issue and, with the power of Push, addressed this hidden, previously unquantifiable risk.\"\u003C/p>\u003Cp>Equipped with this new telemetry, the team proactively reviewed login activity across other high-use apps. They discovered a similar misconfiguration on another widely used business platform, where password reuse and insecure login methods posed added risk. These discoveries confirmed what the team had long suspected, that some risks are only visible from inside the browser.\u003C/p>",[450],{"quote":451,"quoteBy":345},"We found that a significant number of users were still logging in with just their username and password, bypassing SSO entirely. With the power of Push, we addressed this hidden, previously unquantifiable risk.","Technical Challenge","black-white",{"large":455},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":457,"meta":458,"component":460,"responsiveStyles":473},"builder-4c118b46a5a8450fa931b9eb5dd044af",{"previousId":459},"builder-7de0aae035ff4029ab392358a324e878",{"name":425,"tag":426,"options":461,"isRSC":118},{"theme":428,"sections":462,"title":471,"diagonalVariant":472},[463,468],{"text":464,"quotes":465},"\u003Cp>Cribl chose Push to build on their existing security strategy and extend protection into the browser, the control point where users interact with critical apps every day. Push’s browser extension gave the team real-time visibility into SaaS usage, authentication methods, and identity posture. Rather than introducing new overhead, Push enhanced the workflows the team already had in place.\u003C/p>\u003Ch3>\u003Cstrong>From manual triage to automated remediation \u003C/strong>\u003C/h3>\u003Cp>Initially, Cribl analysts manually triaged Push alerts. But as they operationalized the data, they began building their own automations, starting with a custom Slack bot that notifies employees about issues like password reuse, in line with Cribl’s culture of positive, proactive security engagement.\u003C/p>\u003Cp>This shift from manual investigation to structured automation saved the team hours of effort per incident.\u003C/p>\u003Cp>“Now we can focus our efforts elsewhere,” said Aaron.&nbsp;\u003C/p>\u003Cp>Push’s structured telemetry also gave the team the confidence to work cross-functionally, partnering with IT to deprecate risky login paths and fully enforce SSO where needed.\u003C/p>\u003Cp>Using Push, Cribl confirmed and remediated unmonitored login paths across critical business apps, risks that had previously gone unquantified.\u003C/p>",[466],{"quote":467,"quoteBy":345},"The shift from manual investigation to structured automation saved the team hours of effort per incident.",{"text":469,"quotes":470},"\u003Ch3>\u003Cstrong>Integration spotlight\u003C/strong>\u003C/h3>\u003Cp>As the Cribl team operationalized Push’s browser-native telemetry, they found it incredibly useful for detection, enrichment, and investigation. So useful, in fact, that they built official Cribl packs to help other teams get the same benefits, without needing to write custom code.\u003C/p>\u003Cp>The result:\u003C/p>\u003Cul>\u003Cli>\u003Ca href=\"https://packs.cribl.io/packs/cc-push-security\" rel=\"noopener noreferrer\" target=\"_blank\">Cribl Stream Pack for Push\u003C/a>: Easily ingest, normalize, and route Push telemetry to your SIEM, SOAR, or data lake—while reducing event volume and cost.\u003C/li>\u003Cli>\u003Ca href=\"https://packs.cribl.io/packs/cc-search-push-security\" rel=\"noopener noreferrer\" target=\"_blank\">Cribl Search Pack for Push\u003C/a>: Pre-built dashboards for Push detections, posture, and browser activity, enabling faster investigation and historical analysis.\u003C/li>\u003C/ul>\u003Cp>Both are available via the \u003Ca href=\"https://packs.cribl.io/\" rel=\"noopener noreferrer\" target=\"_blank\">Cribl Dispensary\u003C/a>, and designed to help security teams operationalize browser-based detection and response with minimal effort.\u003C/p>\u003Cp>This native integration is part of Push’s broader strategy to work with the tools security teams already use, and get powerful telemetry into their hands, fast.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>",[],"Solution","white-black",{"large":474},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":475},"9px",{"@type":106,"@version":107,"id":477,"meta":478,"component":480,"responsiveStyles":484},"builder-98812dfd03154d1e93f8878686c5d57d",{"previousId":479},"builder-2d869b1b36854de8b473c370c7afee8d",{"name":481,"tag":482,"options":483,"isRSC":118},"CS Explore More","CustomerStoriesExploreMore",{},{"large":485},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":487,"@type":106,"tagName":131,"properties":488,"responsiveStyles":489},"builder-pixel-dgvrqiocnh",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":490},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":492},{"path":37,"query":493},{},{},1764673427456,1763395528235,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fbca4c4ff8c1a421fa199a6bf3dee17af",[],{"winningTest":118,"originalContentId":500,"hasLinks":6,"lastPreviewUrl":501,"kind":339,"breakpoints":502,"hasAutosaves":6},"ceec2869ab5c44b9ac568ee6e09b5e5e","https://app.stg.pushsecurity.com/customer-stories/cribl?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CcreateProjects&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=customer-stories&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.customer-stories=08b65992e49d4c2c9db231662879f089&builder.overrides.08b65992e49d4c2c9db231662879f089=08b65992e49d4c2c9db231662879f089&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"xsmall":57,"small":39,"medium":40},"5sypzuej1ar",{"createdDate":505,"id":506,"name":507,"modelId":346,"published":13,"query":508,"data":510,"variations":654,"lastUpdated":655,"firstPublished":656,"testRatio":33,"screenshot":657,"createdBy":53,"lastUpdatedBy":72,"folders":658,"meta":659,"rev":503},1759928101183,"9d3e1db8d71b44c097df0cecc0fca167","Inductive Automation",[509],{"@type":162,"property":163,"operator":164,"value":48},{"themeId":6,"seoDescription":511,"indexPageDescription":357,"resourcesPageDescription":511,"description":511,"title":355,"logo":512,"resourcesPageTitle":513,"indexPageDesciption":357,"seoTitle":513,"resourcesPageImage":514,"blocks":515,"url":48,"state":651},"Why Inductive Automation chose Push Security. ","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fdab2eea9bfa746bebd4ac559e93b532d","Customer Story: Inductive Automation","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fe48cc549e10f4ef3811a6fd0dcb88957",[516,525,556,568,582,597,607,638,646],{"@type":106,"@version":107,"id":517,"meta":518,"component":520,"responsiveStyles":523},"builder-ce3b478ca3d84bab908cb14ad7c1f4d1",{"previousId":519},"builder-9116cb4244a0433a8a8a04902f1a247d",{"name":366,"tag":367,"options":521,"isRSC":118},{"heroTitle":513,"heroDescription":522,"glowColor":371,"heroLogo":512},"\u003Cp>Inductive Automation, a software company for high-tech manufacturing, needed a way to reduce the security risks associated with unmanaged cloud identities, apps, and integrations.\u003C/p>",{"large":524},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":526,"meta":527,"component":529,"responsiveStyles":554},"builder-c6d6db7d467c40708cba33dea7daf2be",{"previousId":528},"builder-48915b18a7ed4fc9a21ec0b2f7ffea58",{"name":379,"tag":380,"options":530,"isRSC":118},{"summaryTitle":531,"summaryDescription":532,"summaryStat1":533,"summaryStat2":536,"summaryStat3":540,"summaryStat4":544,"stats":549},"About Inductive Automation","\u003Cp>Inductive Automation,&nbsp;a software company for high-tech manufacturing, needed a way to reduce the security risks associated with unmanaged cloud identities, apps, and integrations.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong style=\"color: rgb(255, 72, 36);\">Why Inductive Automation chose Push:﻿\u003C/strong>\u003C/p>\u003Cul>\u003Cli>Push helped Inductive find and secure shadow accounts and apps with high-fidelity data that didn’t interfere with employees’ productivity.\u003C/li>\u003Cli>Inductive was able to consolidate tools with Push and close a gap in their identity security program, all while improving their return on investment in SSO and their password manager.\u003C/li>\u003Cli>Inductive got complete visibility across their SaaS identities, apps, and integrations, allowing them to consolidate tools and stop chasing false positives from previous solutions.\u003C/li>\u003C/ul>",{"icon":534,"value":535,"extraValueText":390,"helpText":387,"gap":118},"faUsers",360,{"icon":537,"value":107,"extraValueText":37,"gap":538,"helpText":539},"faDollar",3,"Tools consolidated",{"icon":389,"value":541,"extraValueText":542,"helpText":543,"gap":33},5,"mins","Time to deploy",{"icon":545,"value":546,"extraValueText":547,"helpText":548},"faUserChart",99,"%","Uptake on deployment",[550,551,552,553],{"formatValue":41,"icon":534,"value":535,"gap":33,"extraValueText":390,"helpText":387},{"formatValue":41,"icon":537,"value":107,"gap":118,"extraValueText":37,"helpText":539},{"formatValue":41,"icon":389,"value":541,"gap":33,"extraValueText":542,"helpText":543},{"formatValue":41,"icon":545,"value":546,"gap":33,"extraValueText":547,"helpText":548},{"large":555},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":557,"meta":558,"component":560,"responsiveStyles":566},"builder-0801e2e4d31d4ba18490d1d2c4798ebb",{"previousId":559},"builder-da89546ce7e349818e03a7da8bc8a778",{"name":409,"tag":410,"options":561,"isRSC":118},{"quoteCarousel":562},[563],{"author":27,"jobTitle":564,"quote":565},"Chief Information Security Officer, Inductive Automation","\u003Cp>With Push, we loved the UI/UX and we loved the founders’ vision. We got a tool that was better quality and we reduced another vendor, so that’s always a win.\u003C/p>",{"large":567},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":569,"meta":570,"component":572,"responsiveStyles":580},"builder-8f8905bcdee541acb28b223c64cff2bb",{"previousId":571},"builder-ed504b3dd2c2473e9f977a455c82f267",{"name":425,"tag":426,"options":573,"isRSC":118},{"theme":428,"sections":574,"title":435,"diagonalVariant":436},[575],{"text":576,"quotes":577},"\u003Cp>As the software partner to critical industries in 100 countries, including nuclear power, water systems, pharmaceutical manufacturing and data centers, Inductive Automation deeply values security.&nbsp;\u003C/p>\u003Cp>Over the past decade, Inductive has built a security team that prioritizes nimble solutions to complex problems while supporting a business that has scaled rapidly, with 30 percent growth year-over-year for multiple years. Inductive’s workforce is also highly skilled, with about 70 percent of the company in technical roles.\u003C/p>\u003Cp>To secure identities and apps in the cloud, Inductive needed an approach that would not disrupt their velocity while also closing the security gaps for a long tail of powerful apps and integrations.\u003C/p>",[578],{"quote":579,"quoteBy":507},"An issue with our software could cause downstream effects that have massive ramifications.",{"large":581},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":583,"meta":584,"component":586,"responsiveStyles":595},"builder-ddb6030401ab4311b8ce1bc5abdde4fc",{"previousId":585},"builder-6db6a18a48334bb6b91dbd6c5e19342d",{"name":425,"tag":426,"options":587,"isRSC":118},{"theme":445,"sections":588,"title":594,"diagonalVariant":453},[589],{"text":590,"quotes":591},"\u003Cp>With a strong strategy around centralizing identity via SSO, Inductive’s security team were paying close attention to the explosion of third-party apps and integrations that could access critical business systems and data while flying under the radar.\u003C/p>\u003Cp>I was always worried about the gaps, like what about the apps that don’t have SSO or don’t have MFA?” Jason said. “Everything, every major breach you read of, goes back to identity in some way. So protecting those identities is just like a foundational component of a modern security program. You can’t protect what you don’t know. So if you have people spinning up apps with weak passwords and no MFA, and you don’t even know that app exists. I mean, it’s just a massive potential issue for you.\"\u003C/p>\u003Cp>With Inductive’s culture of experimentation and innovation, the security team embraces a “guardrails, not gates” approach. So legacy cloud access security broker (CASB) solutions were a poor fit for multiple reasons.\u003C/p>\u003Cp>“So we really wanted to wrap our heads around what people were doing in a way that wasn’t heavy and draconian,” Jason said. “We didn’t want to proxy all traffic and decrypt it all and break sessions. And, you know, weaken some of the fundamental security of internet browsing so we could get that visibility and then cause performance impacts as a result.”\u003C/p>\u003Cp>Other market solutions were so niche, they only tackled part of the problem, and for a while, Waits’ team used two tools in order to manage OAuth apps and to find and secure shadow SaaS and accounts.\u003C/p>\u003Cp>But the solutions didn’t “spark joy,” he said. They relied on data sources like email that were prone to false positives — what Jason calls “chasing ghosts.”\u003C/p>\u003Cp>They started looking for a modern solution that could validate their security controls across a portfolio of managed apps while finding and fixing issues on the unmanaged ones, too.\u003C/p>\u003Cp>“We were trying to look at the lightest way we could get that visibility, and wrap our heads around this problem in a way that's very user-friendly,” he said. \u003C/p>",[592],{"quote":593,"quoteBy":507},"\u003Cp>We didn’t want to proxy all traffic and decrypt it all and break sessions. And, you know, weaken some of the fundamental security of internet browsing so we could get that visibility and then cause performance impacts as a result.\u003C/p>","Technical challenge",{"large":596},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":598,"meta":599,"component":601,"responsiveStyles":605},"builder-9599d92cf81b4ecc944727ae0fa96b4e",{"previousId":600},"builder-717c8aa9eea04fdd9da96d5c24cd1e64",{"name":602,"tag":602,"options":603,"isRSC":118},"PageDescription",{"description":604},"\u003Cp>Modern phishing has changed a lot in the past decade or so. MFA-bypassing&nbsp;Attacker-in-the-Middle (AitM) kits are table stakes — anyone can pick up a copy of Evilginx and immediately blow past most email and network security solutions on the market.&nbsp;&nbsp;\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>But the most sophisticated attacks — the ones that usually hit the headlines in the form of major breaches — are doing much more than this. The latest generation of fully customized AitM phishing kits are dynamically obfuscating the code that loads the web page, implementing bot protection through custom CAPTCHA, and using runtime anti-analysis features, making them increasingly difficult to detect by the tools most enterprises are using to combat the problem.&nbsp;\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong style=\"color: rgb(249, 173, 44);\">Read our analysis of how modern phishing tools and techniques have changed the game — and what security teams can do to level the playing field.  \u003C/strong>\u003C/p>",{"large":606},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":608,"meta":609,"component":611,"responsiveStyles":636},"builder-e702b1bf1c7248a19f9edb3b157481c2",{"previousId":610},"builder-ffdb35908521490b84d21cd36c87f29d",{"name":425,"tag":426,"options":612,"isRSC":118},{"theme":428,"sections":613,"title":471,"diagonalVariant":472},[614,619,622,625,628,631],{"text":615,"quotes":616},"\u003Cp>Inductive chose Push after a competitive vendor review. With Push, the Inductive team was able to get rid of two other security tools, saving budget and time. With high-fidelity data from Push’s browser activity detection approach, they now confidently rely on Push as the source of truth for their cloud app portfolio.\u003C/p>\u003Cp>“We’re not mandated to do a bunch of bogus compliance stuff. So we don’t buy tools to check boxes. Everything we do, we do it to solve a problem,” Jason said. “But the whole ‘Does it spark joy?’ is my benchmark. So with Push, we loved the UI/UX and we loved the founders’ vision. We got a tool that was better quality and we reduced another vendor, so that’s always a win.”\u003C/p>",[617],{"quote":618,"quoteBy":507},"We got a tool that was better quality and we reduced another vendor, so that’s always a win.",{"text":620,"quotes":621},"\u003Ch3>Broad visibility across apps and OAuth integrations\u003C/h3>\u003Cp>By providing broader visibility with more accurate data across cloud identity, third-party cloud apps, and OAuth integrations, Push helps Inductive get a complete picture of their ecosystem.&nbsp;\u003C/p>\u003Cp>Push helped Inductive find and secure apps used only in pockets of the organization and get them managed centrally.\u003C/p>",[],{"text":623,"quotes":624},"\u003Ch3>Automated remediation\u003C/h3>\u003Cp>“Automation is in our name,” said Jason, so Push’s automated remediation workflows were a huge draw.&nbsp;\u003C/p>\u003Cp>Push’s use of a Slackbot to directly engage end-users to help them make simple but meaningful security improvements was a perfect fit for Inductive’s culture. This approach offloads Inductive’s security team while also being more effective: “It’s not someone from the security team reaching out and saying, ‘Hey, what are you doing?!’ It feels less accusatory if it’s a Slackbot,” Jason said. It’s also a much more scalable solution for their 4-person team.\u003C/p>",[],{"text":626,"quotes":627},"\u003Ch3>Easy deployment\u003C/h3>\u003Cp>With Inductive’s managed Chrome browser program, they were able to deploy the Push browser extension to 99 percent of their devices in 5 minutes in the middle of a regular workday. The deployment was so seamless that they received no help desk requests, Jason said.\u003C/p>",[],{"text":629,"quotes":630},"\u003Ch3>Return on investment\u003C/h3>\u003Cp>Push also helps Inductive improve their return on investment in a recent migration to a new enterprise password manager and an ongoing emphasis on centrally managing apps via SSO. They use Push’s detection of shadow apps and accounts, as well as its password manager detection capabilities, to close the gaps they find.\u003C/p>",[],{"text":632,"quotes":633},"\u003Ch3>A foundational source of truth\u003C/h3>\u003Cp>Push has become a trusted source of truth for Inductive’s cloud portfolio, providing the foundation for their vendor risk management program.\u003C/p>\u003Cp>“We have a cybersecurity strategy we’re implementing company-wide with a big identity component. So being able to validate that is just super critical. Otherwise it’s all a paper policy,” Jason said. “We don’t like to say we’re going to do something. We like to do it and&nbsp;validate&nbsp;that we are doing it. It only takes one little incident, one little crack, so staying on top of this is just really important for us.”\u003C/p>",[634],{"quote":635,"quoteBy":507},"We have a cybersecurity strategy we’re implementing company-wide with a big identity component. So being able to validate that is just super critical. Otherwise it’s all a paper policy.",{"large":637},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":639,"meta":640,"component":642,"responsiveStyles":644},"builder-1d0bbf6cc53e4641b5fee22e518bf8e9",{"previousId":641},"builder-cb724ebb498e4d0c811fad38906e9ab7",{"name":481,"tag":482,"options":643,"isRSC":118},{},{"large":645},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":647,"@type":106,"tagName":131,"properties":648,"responsiveStyles":649},"builder-pixel-h5x0avfjkrk",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":650},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":652},{"path":37,"query":653},{},{},1764673408653,1760696983767,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Ffd740e1fb14b4218a5c28b23f3d328d3",[],{"hasLinks":6,"lastPreviewUrl":660,"originalContentId":500,"breakpoints":661,"kind":339,"winningTest":118,"hasAutosaves":6},"https://app.stg.pushsecurity.com/customer-stories/inductive-automation?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CcreateProjects&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=customer-stories&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.customer-stories=9d3e1db8d71b44c097df0cecc0fca167&builder.overrides.9d3e1db8d71b44c097df0cecc0fca167=9d3e1db8d71b44c097df0cecc0fca167&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"xsmall":57,"small":39,"medium":40},{"createdDate":663,"id":664,"name":665,"modelId":346,"published":13,"query":666,"data":669,"variations":790,"lastUpdated":791,"firstPublished":792,"testRatio":33,"screenshot":793,"createdBy":53,"lastUpdatedBy":72,"folders":794,"meta":795,"rev":503},1754571334372,"3d9a9922aa394c27b2847b3fd7101841","Upvest",[667],{"@type":162,"property":163,"operator":164,"value":668},"/customer-stories/upvest",{"seoTitle":670,"seoDescription":671,"indexPageDescription":672,"title":673,"logo":674,"themeId":6,"resourcesPageDescription":671,"indexPageDesciption":675,"description":671,"resourcesPageTitle":670,"resourcesPageImage":676,"blocks":677,"url":668,"state":787},"Customer Story: Upvest","Why Upvest chose Push Security.","Upvest partnered with Push to achieve a scalable and  user-centric way to secure SaaS apps and reduce third-party risks across a complex ecosystem of integrations  and apps.","upvest","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F07979505bdc841c3b807c4355147a770","Upvest partnered with  Push to achieve a scalable and  user-centric way to secure SaaS apps and reduce third-party risks across a complex ecosystem of integrations  and apps.","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F1e030d40870f4ac0917f0cf7c166a441",[678,684,710,720,731,750,777,782],{"@type":106,"@version":107,"id":519,"component":679,"responsiveStyles":682},{"name":366,"tag":367,"options":680,"isRSC":118},{"heroTitle":670,"heroDescription":681,"heroLogo":674,"glowColor":371},"\u003Cp>Upvest, a cloud-native German fintech, needed a scalable and user-centric way to secure SaaS apps and reduce third-party risks from a complex ecosystem of OAuth integrations.\u003C/p>",{"large":683},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":528,"component":685,"responsiveStyles":708},{"name":379,"tag":380,"options":686,"isRSC":118},{"summaryTitle":687,"summaryDescription":688,"summaryStat1":689,"summaryStat2":691,"summaryStat3":695,"summaryStat4":699,"stats":701},"About Upvest","\u003Cp>Upvest is a financial technology startup that provides Investment API infrastructure to financial organizations and neobanks. Upvest is headquartered in Berlin, Germany, and was founded in 2017.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong style=\"color: rgb(255, 72, 36);\">Why Upvest chose Push:﻿\u003C/strong>\u003C/p>\u003Cul>\u003Cli>Upvest, a fintech company that provides investment infrastructure to financial organizations, needed a way to secure the cloud identities, apps, and third-party integrations that make up their core infrastructure as a SaaS-first organization.\u003C/li>\u003Cli>Push helped Upvest get high-fidelity data on their SaaS estate while engaging with users directly in the browser to guide their security choices.\u003C/li>\u003Cli>Upvest now has a unique source of telemetry to use for automating the management of SaaS and identifying security issues.\u003C/li>\u003C/ul>",{"icon":534,"value":690,"extraValueText":390,"helpText":387,"gap":118},180,{"icon":692,"value":33,"extraValueText":693,"gap":538,"helpText":694},"faClock","hour","Proof of concept setup",{"icon":696,"value":697,"extraValueText":37,"helpText":698},"faEarth",2017,"Founded in Berlin, Germany",{"icon":385,"value":538,"extraValueText":390,"helpText":700},"Regulations complied with",[702,705,706],{"formatValue":6,"icon":396,"value":703,"gap":398,"extraValueText":37,"helpText":704},2022,"Protected by Push since 2022",{"formatValue":41,"icon":534,"value":690,"gap":398,"extraValueText":390,"helpText":387},{"formatValue":41,"icon":692,"value":33,"gap":707,"extraValueText":693,"helpText":694},4,{"large":709},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":559,"component":711,"responsiveStyles":718},{"name":409,"tag":410,"options":712,"isRSC":118},{"quoteCarousel":713},[714],{"author":715,"jobTitle":716,"quote":717},"Sebastien Jeanquier","Chief Security Officer","\u003Cp>Being a regulated entity, we need to have considered everything from a regulatory standpoint, a compliance standpoint, a pure security standpoint, and a data protection standpoint... this was going to represent an almost existential problem for us in the future if we didn’t tackle it now.\u003C/p>",{"large":719},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":571,"component":721,"responsiveStyles":729},{"name":425,"tag":426,"options":722,"isRSC":118},{"theme":428,"sections":723,"title":435,"diagonalVariant":436},[724],{"text":725,"quotes":726},"\u003Cp>Operating in the highly regulated German financial services environment, Upvest has carefully built a culture of security throughout its workforce.\u003C/p>\u003Cp>“Security is all of our responsibility and we democratize it to every department in the company,” explains Sebastien Jeanquier, chief security officer at Upvest.\u003C/p>\u003Cp>When Jeanquier joined the financial technology startup five years ago with a background in security consulting and penetration testing, he had a rare opportunity to build a security program from the ground up based on what he’d learned from years of red teaming.\u003C/p>\u003Cp>“I really wanted to move somewhere where I was going to be able to build as greenfield as possible to take what I saw as the best practices from every security domain,” he says.\u003C/p>\u003Cp>As a cloud-native company, Upvest must demonstrate security mastery of its entire cloud ecosystem in order to meet internal requirements and regulatory standards. In seeking out a tool to secure cloud apps and identities, Upvest needed a solution that would meet its high standards and fit its user-centric culture.\u003C/p>",[727],{"quote":728,"quoteBy":665},"Security is all of our responsibility and we democratize it to every department in the company.",{"large":730},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":585,"component":732,"responsiveStyles":748},{"name":425,"tag":426,"options":733,"isRSC":118},{"theme":445,"sections":734,"title":594},[735,740,745],{"text":736,"quotes":737},"\u003Ch3>\u003Cstrong>Meeting a high bar for security and regulatory compliance\u003C/strong>\u003C/h3>\u003Cp>Operating in Germany and the EU, Upvest holds multiple banking licenses with BaFin, Germany’s financial regulator, and is bound to Germany’s strict privacy standards, in addition to GDPR, so finding technical solutions that support these regulations is paramount.\u003C/p>\u003Cp>“Our original product was in the blockchain space. We’ve since pivoted into the more traditional finance space. But if anything, our security requirements and our compliance and regulatory controls actually have only gone up,” Jeanquier explains.\u003C/p>\u003Cp>For Upvest’s security team, a top-of-mind goal was how to get their arms around the full portfolio of cloud identities, SaaS apps, and OAuth integrations that represented core business assets.\u003C/p>\u003Cp>“Being a regulated entity, it means that we need to be able to demonstrate the fact that we have considered everything from a regulatory standpoint, a compliance standpoint, a pure security standpoint, and a data protection standpoint,” says Jeanquier. “And so shadow IT is something that we were keen to get ahead of. We’re SaaS native. We don’t have any other applications internally. And so this was going to represent an almost existential problem for us in the future if we didn’t tackle it now.”\u003C/p>",[738],{"quote":739,"quoteBy":665},"We’re SaaS native. We don’t have any other applications internally. And so this was going to represent an almost existential problem for us in the future if we didn’t tackle it now.",{"text":741,"quotes":742},"\u003Ch3>\u003Cstrong>Challenge of managing third-party integrations\u003C/strong>\u003C/h3>\u003Cp>The Upvest team was particularly concerned about the potential for a fast-growing tangle of OAuth integrations. They had been looking for solutions that would allow them to quickly see and take action on these third-party app integrations.\u003C/p>\u003Cp>“Any user can go to pretty much any service and grant it access into your environment,” Jeanquier says. “And unless you’re keeping tabs on it, it’s very easy for some really small application run by three people somewhere to just request excessive access. It's that supply chain risk that could end up resulting in a lot more compromises than we would otherwise see if we were being attacked directly.”\u003C/p>\u003Cp>The Upvest security team was also focused on finding and securing any non-SSO identities in their environment, which could pose a significant risk if an offboarded employee retained access to business systems or data.\u003C/p>\u003Cp>The team quickly found that existing tools such as Google Workspace weren’t purpose-built for the kind of context and scalability they needed in order to make efficient and informed security decisions about their SaaS accounts and third-party integrations.\u003C/p>\u003Cp>“We could have dug down and written some custom tooling to try and identify what's being used by whom, and doing a regular batch job of trying to identify what they're doing,” says Jeanquier. “But I didn’t really see any good solution for tackling this at scale.”\u003C/p>",[743],{"quote":744,"quoteBy":665},"Unless you’re keeping tabs on it, it’s very easy for some really small application run by three people somewhere to just request excessive access. It's that supply chain risk that could end up resulting in a lot more compromises.",{"text":746,"quotes":747},"\u003Ch3>\u003Cstrong>Desire to preserve a positive security culture\u003C/strong>\u003C/h3>\u003Cp>The team also needed a solution that would fit their company culture. They didn’t want to limit the possibilities for employee innovation by outright blocking access to apps and integrations.\u003C/p>\u003Cp>But they needed to be able to monitor for excessively permissioned, untrustworthy apps and remove them — while communicating security best practices to employees.\u003C/p>\u003Cp>“It’s really about trying to engender as much as possible that culture of awareness,” Jeanquier says. “Awareness not just for our end-users, but also for us as a team across both security and IT, and trying to encourage as much as possible our processes to be followed.”\u003C/p>",[],{"large":749},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":610,"component":751,"responsiveStyles":775},{"name":425,"tag":426,"options":752,"isRSC":118},{"theme":428,"sections":753,"title":471},[754,757,762,765,770],{"text":755,"quotes":756},"\u003Cp>Upvest chose Push because the product provided a unique browser agent-based approach to solving the problem of shadow SaaS and identities, while also aligning strongly with Upvest’s security culture.\u003C/p>\u003Cp>As an early customer, Jeanquier also embraced the opportunity to provide input on product direction and use cases.\u003C/p>\u003Cp>“We very much shared the vision of what it is we were trying to tackle in terms of a security challenge in the modern-day SaaS world,” he says.\u003C/p>",[],{"text":758,"quotes":759},"\u003Ch3>\u003Cstrong>Meeting employees where they work\u003C/strong>\u003C/h3>\u003Cp>With Push, the Upvest security team was able to maintain their user-centric approach to security by getting the rich contextual information they needed on the apps, accounts, and third-party OAuth integrations being used across their workforce — without having to resort to outright blocking.\u003C/p>\u003Cp>Push’s guardrails features, including the ability to communicate security policy directly with employees using&nbsp;that appear in the browser, were a perfect fit for Upvest. These messages help reinforce security policy and prompt secure behavior right at the point of access: The app signup or login screens.\u003C/p>\u003Cp>“You can write as much policy as you want, but ultimately users are going to jump over the lowest hurdle,” Jeanquier says. “The Push browser extension gives you a seat on the user's side where you can start to enforce some of these best practices.”\u003C/p>",[760],{"quote":761,"quoteBy":665},"You can write as much policy as you want, but ultimately users are going to jump over the lowest hurdle. Push gives you a seat on the user's side where you can start to enforce some of these best practices.",{"text":763,"quotes":764},"\u003Ch3>\u003Cstrong>A scalable way to meet regulatory requirements\u003C/strong>\u003C/h3>\u003Cp>To balance Upvest’s user-centric security culture with their stringent regulatory requirements, they also needed a scalable way to reliably identify and review every cloud app used across the business — without getting in employees’ way.\u003C/p>\u003Cp>Push provides them with insights into not just which apps and integrations are being used, but also the specific details about which users, which accounts, which login methods, and how recently a login was observed. This context allows Upvest to quickly act on newly adopted apps that aren’t approved for use, and to have a complete picture of their estate when performing app reviews to meet compliance standards.\u003C/p>\u003Cp>“Because of the regulatory landscape, it won’t fly for you to suddenly decide that you want to use a specific file-sharing app for something. And that you just go and log in and start using that for company data,” Jeanquier says. “The regulatory requirements mandate that we have assessed every app from the perspective of data protection, confidentiality requirements, assessed the vendor themselves, and so on.”\u003C/p>",[],{"text":766,"quotes":767},"\u003Ch3>\u003Cstrong>Shedding light on shadow IT and non-SSO identities\u003C/strong>\u003C/h3>\u003Cp>Push’s use of a browser agent was also a key differentiator for Upvest because the approach provides a high-fidelity source of information.\u003C/p>\u003Cp>“From my perspective, I think a lot of value comes from the browser extension. There is a lot that you can do both in terms of passive guardrailing as well as active education that can only happen at the browser level.”\u003C/p>\u003Cp>Upvest was able to monitor employee SaaS account creation and logins in real time and identify apps in use across the business that were not approved or had not been reviewed by the security team. The Push browser agent also supplied the login methods used to access these accounts, so that the Upvest team could track their SSO coverage and identify non-SSO apps. This was information they otherwise had no way of collecting.\u003C/p>",[768],{"quote":769,"quoteBy":665},"Because of the regulatory landscape, it won’t fly for you to suddenly decide that you want to use a specific file-sharing app for something.",{"text":771,"quotes":772},"\u003Ch3>\u003Cstrong>Essential building block for security operations\u003C/strong>\u003C/h3>\u003Cp>With a focus on agility and efficiency, the Upvest security team also sees the telemetry provided by Push as a valuable input to their security operations and automation efforts.\u003C/p>\u003Cp>They are currently exploring how to use Push’s&nbsp;REST API and webhooks&nbsp;to build detections for security incidents and to automate basic SaaS and account management tasks.\u003C/p>\u003Cp>“Push is uniquely positioned to be able to expose certain actions and practices to us as a team which could then allow us to say, okay on the basis of this particular type of action which we consider to be a very strong signal, let us know and we’ll do something off the back of that using some automated workflows,” explains Jeanquier.\u003C/p>\u003Cp>“This kind of automated security orchestration is the way forward with regards to orchestrating very specific and rapid responses to very clear-cut security signals.”\u003C/p>",[773],{"quote":774,"quoteBy":665},"This kind of automated security orchestration is the way forward with regards to orchestrating very specific and rapid responses to very clear-cut security signals.",{"large":776},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":641,"component":778,"responsiveStyles":780},{"name":481,"tag":482,"options":779,"isRSC":118},{},{"large":781},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":783,"@type":106,"tagName":131,"properties":784,"responsiveStyles":785},"builder-pixel-uwv8wqe4z2",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":786},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":788},{"path":37,"query":789},{},{},1764673376391,1754571937914,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F17710b7416ff49c59d08560c9aabb2c3",[],{"lastPreviewUrl":796,"breakpoints":797,"kind":339,"hasLinks":6,"hasAutosaves":6},"https://app.stg.pushsecurity.com/customer-stories/upvest?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CcreateProjects&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=customer-stories&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.customer-stories=3d9a9922aa394c27b2847b3fd7101841&builder.overrides.3d9a9922aa394c27b2847b3fd7101841=3d9a9922aa394c27b2847b3fd7101841&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"xsmall":57,"small":39,"medium":40},{"createdDate":799,"id":500,"name":800,"modelId":346,"published":13,"query":801,"data":804,"variations":904,"lastUpdated":905,"firstPublished":906,"testRatio":33,"screenshot":907,"createdBy":53,"lastUpdatedBy":72,"folders":908,"meta":909,"rev":503},1749126907543,"Convex",[802],{"@type":162,"property":163,"operator":164,"value":803},"/customer-stories/convex",{"themeId":6,"indexPageDescription":805,"resourcesPageDescription":806,"seoTitle":807,"seoDescription":806,"logo":808,"indexPageDesciption":357,"description":806,"resourcesPageTitle":807,"title":355,"resourcesPageImage":809,"blocks":810,"url":803,"state":901},"Convex Insurance chose Push to close the gap left by traditional CASB solutions, enabling them to enhance their identity security and gain control of shadow SaaS at the same time.","Why Convex Insurance chose Push Security. ","Customer Story: Convex Insurance","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F25b3ec2a3c714329a945a4701bf15bae","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F46b15e4e61394b28963f940a70f7259c",[811,817,836,846,858,869,891,896],{"@type":106,"@version":107,"id":364,"component":812,"responsiveStyles":815},{"name":366,"tag":367,"options":813,"isRSC":118},{"heroTitle":807,"heroDescription":814,"heroLogo":808,"glowColor":371},"\u003Cp>Convex Insurance chose Push to close the gap left by traditional CASB solutions, enabling them to enhance their identity security and gain control of shadow SaaS at the same time.\u003C/p>",{"large":816},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":377,"component":818,"responsiveStyles":834},{"name":379,"tag":380,"options":819,"isRSC":118},{"summaryTitle":820,"summaryDescription":821,"summaryStat1":822,"summaryStat2":825,"summaryStat3":826,"summaryStat4":828,"stats":830},"About Convex Insurance","\u003Cp>Convex Insurance is an international specialty insurer founded in 2019 and operating in Bermuda, London, and Luxembourg. Convex provides underwriting for complex specialty risks, including in the areas of energy, commercial property, crisis management, and aerospace.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong style=\"color: rgb(255, 72, 36);\">Why Convex chose Push:﻿\u003C/strong>\u003C/p>\u003Cul>\u003Cli>Convex Insurance, an international specialty insurer, needed a way to secure identities on cloud apps — including apps not on SSO.\u003C/li>\u003Cli>Push helped Convex get a unified view across both their identity security posture and their estate of third-party apps and OAuth integrations.\u003C/li>\u003Cli>Convex was able to get reliable data in order to put further weight behind their security policies. The security team was also able to use Push’s automated self-remediation ChatOps workflows to reduce the manual effort of fixing issues.\u003C/li>\u003C/ul>",{"icon":385,"value":823,"gap":118,"extraValueText":390,"helpText":824},1000,"Number of apps",{"icon":692,"value":33,"gap":538,"extraValueText":693,"helpText":694},{"icon":696,"value":538,"extraValueText":390,"helpText":827},"Locations protected",{"icon":385,"value":829,"extraValueText":37,"helpText":387},1750,[831,832,833],{"icon":385,"value":823,"extraValueText":390,"helpText":824,"formatValue":41},{"icon":692,"value":33,"extraValueText":693,"helpText":694,"formatValue":41,"gap":107},{"icon":385,"value":829,"extraValueText":37,"helpText":387,"formatValue":41,"gap":398},{"large":835},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":407,"component":837,"responsiveStyles":844},{"name":409,"tag":410,"options":838,"isRSC":118},{"quoteCarousel":839},[840],{"author":841,"jobTitle":842,"quote":843},"Michael Earl","Security Operations Lead","\u003Cp>With Push, suddenly we had the potential of installing something into our estate that would give us even better information to make decisions about our SaaS and identity security posture so we could get a unified picture of the risks.\u003C/p>",{"large":845},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":423,"component":847,"responsiveStyles":856},{"name":425,"tag":426,"options":848,"isRSC":118},{"theme":428,"sections":849,"title":435,"diagonalVariant":436},[850],{"text":851,"quotes":852},"\u003Cp>As a specialty insurer handling complex requirements, Convex Insurance relies on security solutions that provide the flexibility their workforce needs in order to deliver services in areas as diverse as crisis management, marine cargo, renewable energy, and satellite launches in multiple countries and territories.\u003C/p>\u003Cp>“At Convex, we embrace the role that our staff play in helping secure the business and we empower them to make good decisions while providing them with the information they need to do that,” says Michael Earl, security operations lead at Convex.\u003C/p>\u003Cp>Convex has also welcomed the use of cloud apps to supercharge productivity, with employees using a large number of SaaS apps, from the mundane to the obscure.&nbsp;\u003C/p>\u003Cp>However, the widespread use of cloud apps posed a challenge for the Convex security team in getting a unified view across their app estate and identity posture. Existing tools provided a lot of data, but it was a time-consuming process to glean the insights the team needed to effectively enforce security policies.\u003C/p>\u003Cp>The potential blindspot of unmanaged apps and identities was a concern and led to hard conversations among the security team.\u003C/p>",[853],{"quote":854,"quoteBy":855},"If we have a breach at a third party that some of our users are signed up to, we need to immediately understand where we have accounts and data so we can take appropriate steps.","Convex Insurance",{"large":857},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":442,"component":859,"responsiveStyles":867},{"name":425,"tag":426,"options":860,"isRSC":118},{"theme":445,"sections":861,"title":452,"diagonalVariant":453},[862],{"text":863,"quotes":864},"\u003Ch3>\u003Cstrong>CASB approach was time-consuming\u003C/strong>\u003C/h3>\u003Cp>Early attempts to solve the challenge of getting full visibility of both identity posture and their app estate were time-consuming.\u003C/p>\u003Cp>This entailed combing through CASB logs to identify visited URLs and HTTP methods, as well as evidence of POST data and transferred bytes. Then the security team would try to infer if employees were using unsanctioned applications or storing data where it wasn’t approved to go. “It was quite a manual exercise,” Michael says.&nbsp;\u003C/p>\u003Cp>That spotty evidence made it hard for the security team to have informed conversations with end-users.&nbsp;\u003C/p>\u003Cp>“When you have a conversation with an employee, you want to make sure you have the proper information on whether they were actually using an app so you don’t put someone on the defensive when they were just doing their job,” Michael says.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Ch3>\u003Cstrong>Seeking visibility of non-SSO cloud identities\u003C/strong>\u003C/h3>\u003Cp>At the same time, the team was looking for additional ways to get the visibility they needed for securing non-SSO cloud identities. In particular, they were worried about identities that could exist on unmanaged apps.\u003C/p>\u003Cp>“In our industry, it is the SaaS apps that are not SSO-integrated that are potentially the biggest danger,” says Alistair McGlinchy, IT security engineer at Convex.\u003C/p>\u003Cp>“So if a third party has their password database attacked and there has been any password reuse, an attacker can password-spray and get to the point where MFA is the only blocker for somebody trying to authenticate.”\u003C/p>",[865],{"quote":866,"quoteBy":855},"In our industry, it is the SaaS apps that are not SSO-integrated that are potentially the biggest danger.",{"large":868},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":459,"component":870,"responsiveStyles":889},{"name":425,"tag":426,"options":871,"isRSC":118},{"theme":428,"sections":872,"title":471,"diagonalVariant":472},[873,878,881,886],{"text":874,"quotes":875},"\u003Cp>Convex chose Push initially to help them further secure identities on a large catalog of cloud apps. In learning more about the product, they realized Push would also give them a unique unified view of both identity posture and their third-party apps and OAuth integrations — even unsanctioned or “shadow” apps.\u003C/p>\u003Cp>“Other than you guys, we just didn’t have any awareness of anything in the market that matched the level of intelligence that Push can provide about how our employees use passwords,” Michael says. “ And then we learned about all the additional features, like you can see where all of your apps are integrated and what people are doing with them.\u003C/p>\u003Cp>You’ve got this nice unified view of all of the OAuth scopes and things that people have been granting. The product works. It ticks all the boxes, really.”\u003C/p>",[876],{"quote":877,"quoteBy":855},"The product works. It ticks all the boxes, really.",{"text":879,"quotes":880},"\u003Ch3>\u003Cstrong>Easy deployment\u003C/strong>\u003C/h3>\u003Cp>Setting up a proof of concept was a 1-hour video call, Alistair recalls.&nbsp;\u003C/p>\u003Cp>“It was one of the more straightforward onboarding and trial experiences that we’ve had, and that’s continued post-procurement as well,” Michael says.\u003C/p>\u003Cp>The team was able to select a test group and deploy the Push browser extension via MDM. The Convex team also appreciated Push’s support for Google Workspace and alternative identity providers.\u003C/p>",[],{"text":882,"quotes":883},"\u003Ch3>\u003Cstrong>Immediate value\u003C/strong>\u003C/h3>\u003Cp>During the trial, the security team found high-risk password reuse among their own IT team.\u003C/p>\u003Cp>Armed with this information, they could follow up with employees directly — or use Push’s automated self-remediation ChatOps workflows to facilitate that conversation without it feeling awkward for either party.\u003C/p>\u003Cp>“As far as we’re concerned, it is better coming from an automated platform,” Michael says. “We’re a small team, so we don’t have a lot of time to manually follow up on every possible issue. We absolutely need tools that both detect and notify about the problem and facilitate the remediation steps.”\u003C/p>\u003Cp>They were also able to identify non-SSO apps with heavy usage and restrict their use, as well as gauge their employees’ use of AI and LLM tools.\u003C/p>",[884],{"quote":885,"quoteBy":855},"It was one of the more straightforward onboarding and trial experiences that we’ve had, and that’s continued post-procurement as well.",{"text":887,"quotes":888},"\u003Ch3>\u003Cstrong>Putting more weight behind security policies\u003C/strong>\u003C/h3>\u003Cp>With the data provided by the Push platform, the Convex security team now has the evidence they need to be able to reinforce security policies for their cloud estate.\u003C/p>\u003Cp>“It gives us all the information that we need to attack the problem and provide even better security for our business,” Michael says.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>",[],{"large":890},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":479,"component":892,"responsiveStyles":894},{"name":481,"tag":482,"options":893,"isRSC":118},{},{"large":895},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":897,"@type":106,"tagName":131,"properties":898,"responsiveStyles":899},"builder-pixel-4o1xy772lk3",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":900},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":902},{"path":37,"query":903},{},{},1764673394915,1749126936428,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F10953d20c9db4987ac26800a13bcbf48",[],{"breakpoints":910,"hasLinks":6,"lastPreviewUrl":911,"kind":339,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},"https://app.stg.pushsecurity.com/customer-stories/convex?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CcreateProjects&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=customer-stories&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.customer-stories=ceec2869ab5c44b9ac568ee6e09b5e5e&builder.overrides.ceec2869ab5c44b9ac568ee6e09b5e5e=ceec2869ab5c44b9ac568ee6e09b5e5e&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",[913,1091,1210,1328,1446,1566,1686,1805],{"createdDate":914,"id":915,"name":916,"modelId":917,"published":13,"stageModifiedSincePublish":6,"query":918,"data":921,"variations":1081,"lastUpdated":1082,"firstPublished":1083,"testRatio":33,"screenshot":1084,"createdBy":34,"lastUpdatedBy":334,"folders":1085,"meta":1086,"rev":1090},1744829487099,"387451215c314dd5bd654668cdc1a197","Zero-day phishing","cca4143377554c5a9163cc203a8ed2ba",[919],{"@type":162,"property":163,"operator":164,"value":920},"/uc/zero-day-phishing-protection",{"inputs":922,"customFonts":923,"seoTitle":971,"title":971,"tsCode":37,"seoDescription":972,"fontAwesomeIcon":973,"jsCode":37,"blocks":974,"url":920,"state":1078},[],[924],{"family":925,"kind":926,"version":927,"lastModified":928,"files":929,"category":948,"menu":949,"subsets":950,"variants":953},"DM Sans","webfonts#webfont","v14","2023-07-13",{"100":930,"200":931,"300":932,"500":933,"600":934,"700":935,"800":936,"900":937,"800italic":938,"900italic":939,"700italic":940,"100italic":941,"italic":942,"regular":943,"200italic":944,"500italic":945,"300italic":946,"600italic":947},"https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAop1hTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAIpxhTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwA_JxhTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAkJxhTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAfJthTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwARZthTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAIpthTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAC5thTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat8JCm3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat8gCm3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat9uCm3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat-JDG3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat-JDW3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAopxhTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat8JDW3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat-7DW3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat_XDW3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat9XCm3zRmYJpso5.ttf","sans-serif","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAopxRT23z.ttf",[951,952],"latin","latin-ext",[954,955,956,957,958,959,128,960,961,962,963,964,965,966,967,968,969,970],"100","200","300","regular","500","600","800","900","100italic","200italic","300italic","italic","500italic","600italic","700italic","800italic","900italic","Zero-day phishing protection","Detect phishing TTPs directly in the browser and stop credential theft.","faFishingRod",[975,1073],{"@type":106,"@version":107,"tagName":976,"id":977,"children":978},"div","builder-76c6b8d1499346c7bc1fd56ae4e93638",[979,996,1004,1011,1023,1037,1048,1059,1065],{"@type":106,"@version":107,"layerName":980,"id":981,"component":982,"responsiveStyles":993},"UseCaseHero","builder-5228fe062bef4a40a91e43f1112832fa",{"name":980,"options":983,"isRSC":118},{"title":971,"description":984,"points":985,"video":992},"\u003Cp>Push detects phishing as it happens. Autonomous agents hunt for new phishing techniques, identify kit signatures, and deploy detections within minutes of a new attack being analyzed. From cloned login pages to AiTM credential harvesting, Push sees what traditional filters miss and stops threats before they escalate.\u003C/p>",[986,988,990],{"item":987},"Detect phishing that bypasses traditional filters, including AiTM, SSO password theft, and fake login pages",{"item":989},"Stop never-before-seen attacks with AI-native behavioral and on-page analysis inside the browser",{"item":991},"Investigate faster with unified browser, user, and page context","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F40433ceeb4f94b43a82e039a0f4fd411%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=40433ceeb4f94b43a82e039a0f4fd411&alt=media&optimized=true",{"large":994},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":995},"transparent",{"@type":106,"@version":107,"id":997,"component":998,"responsiveStyles":1001},"builder-96634044407e491299e291ed64669e39",{"name":999,"options":1000,"isRSC":118},"TrustedBy",{"AllPartners":41,"backgroundTransparent":6},{"large":1002},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":1003},"#000",{"@type":106,"@version":107,"id":1005,"component":1006,"responsiveStyles":1009},"builder-2c3768f930534557bb8978e32b6a6a0f",{"name":1007,"options":1008,"isRSC":118},"Diagonal",{"darkMode":41},{"large":1010},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"layerName":1012,"id":1013,"component":1014,"responsiveStyles":1021},"TextImageBlockVertical","builder-7c3c1c2840424db2ad2ccbfaf382dd64",{"name":1012,"tag":1012,"options":1015,"isRSC":118},{"darkMode":6,"maxWidth":1016,"maxTextWidth":1017,"title":1018,"description":1019,"animatedTitle":37,"image":1020,"reverse":6,"descriptionPaddingHorizontal":118},1200,800,"\u003Ch2>Why stop at the inbox?\u003C/h2>","\u003Cp>Phishing attacks have evolved. Whether attackers lure users with QR codes, instant messages, or OAuth consent screens, the outcome is the same: it plays out in the browser. Push gives you real-time detection for in-browser threats, stopping phishing and consent-based attacks before they lead to compromise\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F7fdcac241f0e4a049166d7076858adeb",{"large":1022},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1024,"component":1025,"responsiveStyles":1033},"builder-41c978b3669749cf947e622b4e79e4d7",{"name":1026,"options":1027,"isRSC":118},"TextImageBlockHorizontal",{"darkMode":6,"maxWidth":1016,"imageMaxWidth":1028,"textPaddingTop":1029,"title":1030,"description":1031,"reverse":41,"image":1032},600,100,"\u003Cp>Detect phishing at the edge\u003C/p>","\u003Cp>Push uses industry-first telemetry to detect phishing based on behavior, not static indicators. Autonomous agents analyze how phishing pages behave and how users interact with them, uncovering fake logins, credential theft, and phishing kits the moment they load in the browser.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F9df3d180c97b4e61af142af2ccd68721",{"large":1034},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":1035,"paddingTop":1036,"marginTop":419},"DM Sans, sans-serif","20px",{"@type":106,"@version":107,"id":1038,"component":1039,"responsiveStyles":1045},"builder-d2a7bc941feb43cdb898bc116b203cf9",{"name":1026,"options":1040,"isRSC":118},{"darkMode":6,"maxWidth":1016,"imageMaxWidth":1028,"textPaddingTop":1041,"title":1042,"description":1043,"reverse":6,"image":1044},120,"\u003Ch2>Go beyond blocklists and IOCs\u003C/h2>","\u003Cp>Push goes beyond URLs and easy-to-change indicators. It reads the full phishing playbook like script behavior, session hijacks, DOM changes, user inputs, then connects the dots in real time. This gives your team a complete picture of how the phishing attempt worked, not just an alert.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fabfd58db169b433e96d3f1261797156e",{"large":1046},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":1047},"36px",{"@type":106,"@version":107,"layerName":1026,"id":1049,"component":1050,"responsiveStyles":1056},"builder-42c32198083f4880acb37c5cb76934da",{"name":1026,"options":1051,"isRSC":118},{"darkMode":6,"maxWidth":1016,"imageMaxWidth":1028,"textPaddingTop":1052,"title":1053,"description":1054,"reverse":41,"image":1055},140,"\u003Ch2>Enhance your phishing response\u003C/h2>","\u003Cp>When phishing enters your environment, speed matters. Push gives you instant access to the telemetry that counts like session data, user behavior, and page activity, so you can investigate fast, trigger in-browser prompts, or forward alerts to your SIEM or SOAR for response. All in real time, right from the browser.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fbb195aec46904056b85e8688629e558e",{"large":1057},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":1058},"47px",{"@type":106,"@version":107,"id":1060,"component":1061,"responsiveStyles":1063},"builder-9a95b9cbc4854421a92ef7b90f6c7adb",{"name":1007,"options":1062,"isRSC":118},{"darkMode":6},{"large":1064},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1066,"component":1067,"responsiveStyles":1071},"builder-0afa17a9f25c4661a90f314d5578aa18",{"name":1068,"tag":1068,"options":1069,"isRSC":118},"LatestResources",{"sectionHeading":37,"customClass":1070},"bg-black",{"large":1072},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":1074,"@type":106,"tagName":131,"properties":1075,"responsiveStyles":1076},"builder-pixel-h6onu0ubr9",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":1077},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":1079},{"path":37,"query":1080},{},{},1776275046831,1745499158657,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fff60c30a8442489c8ed7e0af9599d14f",[],{"lastPreviewUrl":1087,"winningTest":118,"breakpoints":1088,"kind":339,"hasLinks":6,"originalContentId":1089,"hasAutosaves":6},"https://pushsecurity.com/uc/zero-day-phishing-protection?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CcreateProjects%2CsendPullRequests&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=387451215c314dd5bd654668cdc1a197&builder.overrides.387451215c314dd5bd654668cdc1a197=387451215c314dd5bd654668cdc1a197&builder.overrides.use-case-page:/uc/zero-day-phishing-protection=387451215c314dd5bd654668cdc1a197&builder.options.locale=Default",{"xsmall":57,"small":39,"medium":40},"2daa5670b8504fc7ba4700633e8bd921","wjcv5yvqyja",{"createdDate":1092,"id":1093,"name":1094,"modelId":917,"published":13,"stageModifiedSincePublish":6,"query":1095,"data":1098,"variations":1202,"lastUpdated":1203,"firstPublished":1204,"testRatio":33,"screenshot":1205,"createdBy":34,"lastUpdatedBy":334,"folders":1206,"meta":1207,"rev":1090},1756833377777,"54f8256648f54d439303734b1e69221b","Browser extension security",[1096],{"@type":162,"property":163,"operator":164,"value":1097},"/uc/browser-extension-security",{"seoDescription":1099,"jsCode":37,"fontAwesomeIcon":1100,"tsCode":37,"title":1094,"seoTitle":1094,"customFonts":1101,"inputs":1106,"blocks":1107,"url":1097,"state":1199},"Shine a light on risky browser extensions.","faPuzzlePiece",[1102],{"kind":926,"family":925,"version":927,"files":1103,"category":948,"lastModified":928,"subsets":1104,"variants":1105,"menu":949},{"100":930,"200":931,"300":932,"500":933,"600":934,"700":935,"800":936,"900":937,"100italic":941,"italic":942,"regular":943,"900italic":939,"800italic":938,"700italic":940,"200italic":944,"300italic":946,"500italic":945,"600italic":947},[951,952],[954,955,956,957,958,959,128,960,961,962,963,964,965,966,967,968,969,970],[],[1108,1194],{"@type":106,"@version":107,"tagName":976,"id":1109,"meta":1110,"children":1111},"builder-71d0648c1d2f4ede8d0d0b5b28b7b94c",{"previousId":977},[1112,1128,1135,1142,1151,1161,1171,1181,1188],{"@type":106,"@version":107,"id":1113,"meta":1114,"component":1115,"responsiveStyles":1126},"builder-ff325b4b8fad4edea53f38865947e854",{"previousId":981},{"name":980,"options":1116,"isRSC":118},{"title":1094,"description":1117,"points":1118,"video":1125},"\u003Cp>Browser extensions introduce new code, new permissions, and new potential for risk. Many include AI features, and most go completely unnoticed. Push gives you full visibility into every extension used across your workforce, across major browsers, so you can uncover shadow IT, assess risky permissions, and block unsafe tools before they lead to compromise.\u003C/p>",[1119,1121,1123],{"item":1120},"Discover every browser extension in use",{"item":1122},"Spot risky or unsanctioned behavior",{"item":1124},"Make informed decisions on extension policy","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fc538aad95d7f403aa3c3551af72f67c0?alt=media&token=1411fa6d-2eac-4e6c-94bf-ea117da12d67&apiKey=f3a1111ff5be48cdbb123cd9f5795a05",{"large":1127},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":995},{"@type":106,"@version":107,"id":1129,"meta":1130,"component":1131,"responsiveStyles":1133},"builder-fb89d128c64e47cf9cbb11d90fc24523",{"previousId":997},{"name":999,"options":1132,"isRSC":118},{"AllPartners":41,"backgroundTransparent":6},{"large":1134},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":1003},{"@type":106,"@version":107,"id":1136,"meta":1137,"component":1138,"responsiveStyles":1140},"builder-54388d35126c4d0096eeebaf8c4448cd",{"previousId":1005},{"name":1007,"options":1139,"isRSC":118},{"darkMode":41},{"large":1141},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"layerName":1012,"id":1143,"component":1144,"responsiveStyles":1149},"builder-3c8fa6785dd6466abf52a2470d66d85a",{"name":1012,"tag":1012,"options":1145,"isRSC":118},{"darkMode":6,"maxWidth":1016,"maxTextWidth":1017,"title":1146,"description":1147,"image":1148,"reverse":6},"\u003Ch2>Take control of browser extensions\u003C/h2>","\u003Cp>Attackers are increasingly using malicious browser extensions to gain access to data processed and stored in the browser. And the problem is, most security teams have no visibility into what extensions are being used. Push changes that. With browser-native telemetry, the Push extension continuously inventories browser extensions across your environment, flags the risky ones, and gives you intelligence to act.&nbsp;\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F0a004f16a6874f4c8fdf14344acc9fec",{"large":1150},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1152,"meta":1153,"component":1154,"responsiveStyles":1159},"builder-93738f98109a4009affb349afd7bb182",{"previousId":1024},{"name":1026,"options":1155,"isRSC":118},{"darkMode":6,"maxWidth":1016,"imageMaxWidth":1028,"textPaddingTop":1029,"title":1156,"description":1157,"reverse":41,"image":1158},"\u003Ch2>Discover every extension in use\u003C/h2>","\u003Cp>Push gives you structured, searchable data about every extension in your environment, so you’re not just seeing what’s there, but also understanding how it got there, what it can do, and who it affects. It’s the kind of granular insight that’s nearly impossible to get from traditional tools, and it lays the groundwork for better policy decisions and faster investigations.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F0e5727ca99474f14b1b7916bf6bbb782",{"large":1160},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":1035,"paddingTop":1036,"marginTop":419},{"@type":106,"@version":107,"id":1162,"meta":1163,"component":1164,"responsiveStyles":1169},"builder-83393acb12ee4fdd840839185b51edb4",{"previousId":1038},{"name":1026,"options":1165,"isRSC":118},{"darkMode":6,"maxWidth":1016,"imageMaxWidth":1028,"textPaddingTop":1041,"title":1166,"description":1167,"reverse":6,"image":1168},"\u003Ch2>Spot risky or malicious extensions\u003C/h2>","\u003Cp>Push highlights extensions with dangerous permissions, broad access, or poor reputations. This includes AI extensions that request access far beyond what their stated purpose requires. You can quickly detect sideloaded, manually installed, or development-mode extensions that bypass normal controls. And because Push shows you who’s using them and where, you can respond precisely and effectively.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fa104d58c8da34fbb8901f738fb21453b",{"large":1170},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":1047},{"@type":106,"@version":107,"layerName":1026,"id":1172,"meta":1173,"component":1174,"responsiveStyles":1179},"builder-da98e3de949646d89c53a0d1c2784664",{"previousId":1049},{"name":1026,"options":1175,"isRSC":118},{"darkMode":6,"maxWidth":1016,"imageMaxWidth":1028,"textPaddingTop":1052,"title":1176,"description":1177,"reverse":41,"image":1178},"\u003Ch2>Accelerate security reviews\u003C/h2>","\u003Cp>Most teams have extension policies, they just don’t have the data to enforce them. Push reveals how each extension entered your environment, whether it was installed manually, sideloaded, or deployed in dev mode. You’ll see which users are running what, and where, so you can surface violations, investigate quickly, and respond with confidence.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F229f355be6f243b180f410d237a75bb3",{"large":1180},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":1058},{"@type":106,"@version":107,"id":1182,"meta":1183,"component":1184,"responsiveStyles":1186},"builder-1a689287d1a1418997d57db578a71105",{"previousId":1060},{"name":1007,"options":1185,"isRSC":118},{"darkMode":6},{"large":1187},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1189,"component":1190,"responsiveStyles":1192},"builder-feb4e75029f84c10b6498ef1f8f79128",{"name":1068,"tag":1068,"options":1191,"isRSC":118},{"sectionHeading":37,"customClass":1070},{"large":1193},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":1195,"@type":106,"tagName":131,"properties":1196,"responsiveStyles":1197},"builder-pixel-jc4lv2mnufo",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":1198},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":1200},{"path":37,"query":1201},{},{},1776275365038,1757000441666,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F8d496cf111644ee5afcc046b72d1ca5a",[],{"kind":339,"winningTest":118,"breakpoints":1208,"lastPreviewUrl":1209,"hasLinks":6,"originalContentId":915,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},"https://pushsecurity.com/uc/browser-extension-security?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CcreateProjects%2CsendPullRequests&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=54f8256648f54d439303734b1e69221b&builder.overrides.54f8256648f54d439303734b1e69221b=54f8256648f54d439303734b1e69221b&builder.overrides.use-case-page:/uc/browser-extension-security=54f8256648f54d439303734b1e69221b&builder.options.locale=Default",{"createdDate":1211,"id":1212,"name":1213,"modelId":917,"published":13,"query":1214,"data":1217,"variations":1320,"lastUpdated":1321,"firstPublished":1322,"testRatio":33,"screenshot":1323,"createdBy":34,"lastUpdatedBy":333,"folders":1324,"meta":1325,"rev":1090},1744923509705,"94bebb7bb99d48629ad157e80cf4d81d","Account takeover detection",[1215],{"@type":162,"property":163,"operator":164,"value":1216},"/uc/account-takeover-detection",{"title":1213,"customFonts":1218,"jsCode":37,"seoTitle":1213,"seoDescription":1223,"fontAwesomeIcon":1224,"tsCode":37,"blocks":1225,"url":1216,"state":1317},[1219],{"kind":926,"category":948,"variants":1220,"menu":949,"files":1221,"family":925,"subsets":1222,"version":927,"lastModified":928},[954,955,956,957,958,959,128,960,961,962,963,964,965,966,967,968,969,970],{"100":930,"200":931,"300":932,"500":933,"600":934,"700":935,"800":936,"900":937,"300italic":946,"500italic":945,"800italic":938,"700italic":940,"italic":942,"900italic":939,"600italic":947,"200italic":944,"regular":943,"100italic":941},[951,952],"Stop ATO with stolen credential and compromised token detection.","faUserSecret",[1226,1312],{"@type":106,"@version":107,"tagName":976,"id":1227,"meta":1228,"children":1229},"builder-e7913a774cae44c5a23d6081c5c30a52",{"previousId":977},[1230,1246,1253,1260,1269,1279,1289,1299,1306],{"@type":106,"@version":107,"id":1231,"meta":1232,"component":1233,"responsiveStyles":1244},"builder-f1f1ab1601bc4c0f8c2a8aafd173675d",{"previousId":981},{"name":980,"options":1234,"isRSC":118},{"title":1213,"description":1235,"points":1236,"video":1243},"\u003Cp>Attackers don’t need to phish, they just need a password that works. Push monitors for signs of credential-based attacks in real time, directly in the browser, catching account takeover attempts before the damage spreads. From ghost logins to credential stuffing, Push cuts off the paths attackers use to quietly slip in the back door.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>",[1237,1239,1241],{"item":1238},"Identify credential-based ATO as it unfolds",{"item":1240},"Surface hijacked sessions and token misuse",{"item":1242},"Strengthen authentication where your IdP can’t","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb4dd9db24bc9495b8a686b1b4d492016%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=b4dd9db24bc9495b8a686b1b4d492016&alt=media&optimized=true",{"large":1245},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":995},{"@type":106,"@version":107,"id":1247,"meta":1248,"component":1249,"responsiveStyles":1251},"builder-0bc0d1c78ece4994993c3a6427a4d533",{"previousId":997},{"name":999,"options":1250,"isRSC":118},{"AllPartners":41,"backgroundTransparent":6},{"large":1252},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":1003},{"@type":106,"@version":107,"id":1254,"meta":1255,"component":1256,"responsiveStyles":1258},"builder-e45de8f3768c4f16938dbf78e4e87524",{"previousId":1005},{"name":1007,"options":1257,"isRSC":118},{"darkMode":41},{"large":1259},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1261,"component":1262,"responsiveStyles":1267},"builder-c98e8bfd341146c1b67c02d5698ff093",{"name":1012,"tag":1012,"options":1263,"isRSC":118},{"darkMode":6,"maxWidth":1016,"maxTextWidth":1017,"title":1264,"description":1265,"image":1266,"reverse":6},"\u003Ch2>Assume less. See more.\u003C/h2>","\u003Cp>Most account takeovers don’t start with a breach, they start with a login. Whether it’s a reused password, a local account, or an outdated login flow, Push shows you how accounts are actually accessed day to day, not just how policies say they should be. That means no more blind spots around ghost logins, bypassed SSO, or stale access paths that quietly persist.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F18630ad2746d4eb7b7fcc0428b11a8f0",{"large":1268},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1270,"meta":1271,"component":1272,"responsiveStyles":1277},"builder-55c1fc38ddc04fd1a0d6a8e2fb819e00",{"previousId":1024},{"name":1026,"options":1273,"isRSC":118},{"darkMode":6,"maxWidth":1016,"imageMaxWidth":1028,"textPaddingTop":1029,"title":1274,"description":1275,"reverse":41,"image":1276},"\u003Ch2>Catch stolen credential use in real time\u003C/h2>","\u003Cp>Push monitors login activity directly in the browser to detect signs of credential-based attacks like leaked password use or suspicious login flows. By analyzing attacker TTPs instead of relying on known indicators, Push spots credential stuffing and account takeover attempts the moment they begin, not after they’ve succeeded.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F52b0123cac2c4dfdb1dc0af6adf9d603",{"large":1278},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":1035,"paddingTop":419,"marginTop":419},{"@type":106,"@version":107,"id":1280,"meta":1281,"component":1282,"responsiveStyles":1287},"builder-dfb31737b30948c6b95323655d571a50",{"previousId":1038},{"name":1026,"options":1283,"isRSC":118},{"darkMode":6,"maxWidth":1016,"imageMaxWidth":1028,"textPaddingTop":1041,"title":1284,"description":1285,"reverse":6,"image":1286},"\u003Ch2>Detect session hijacks and stealth access\u003C/h2>","\u003Cp>Attackers don’t always need a login screen, they often sidestep it entirely using stolen session tokens. Push detects when valid sessions are reused in unexpected ways, identifying hijacked sessions and stealth access attempts that traditional tools miss. Because we monitor directly in the browser, you see what’s happening inside active sessions in real time.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F94a6859a99e04d309ffe5841f3dbdf5c",{"large":1288},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":1047},{"@type":106,"@version":107,"layerName":1026,"id":1290,"meta":1291,"component":1292,"responsiveStyles":1297},"builder-f7585b90eb974d03a7dc7eae5b58d227",{"previousId":1049},{"name":1026,"options":1293,"isRSC":118},{"darkMode":6,"maxWidth":1016,"imageMaxWidth":1028,"textPaddingTop":1052,"title":1294,"description":1295,"reverse":41,"image":1296},"\u003Ch2>Harden accounts before they’re compromised\u003C/h2>","\u003Cp>Push goes beyond alerts. It identifies apps that still allow local logins, even when SSO is configured, so you can remove weak access paths. Push also flags users without MFA, reused work credentials, or weak passwords, and prompts users in-browser to fix risky behaviors before they’re exploited.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F01c1b638f1b6497093a4f2b8ceddb5bb",{"large":1298},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":1058},{"@type":106,"@version":107,"id":1300,"meta":1301,"component":1302,"responsiveStyles":1304},"builder-ad81d1e3afec49a791214194eae09bdc",{"previousId":1060},{"name":1007,"options":1303,"isRSC":118},{"darkMode":6},{"large":1305},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1307,"component":1308,"responsiveStyles":1310},"builder-8dac1aa4b9d148628d92252bd8eff822",{"name":1068,"tag":1068,"options":1309,"isRSC":118},{"sectionHeading":37,"customClass":1070},{"large":1311},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":1313,"@type":106,"tagName":131,"properties":1314,"responsiveStyles":1315},"builder-pixel-bp9ni6h4vze",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":1316},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":1318},{"path":37,"query":1319},{},{},1770892814499,1745499162732,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F58b660fa94aa4b30b0faeb9b663ae41a",[],{"lastPreviewUrl":1326,"hasLinks":6,"originalContentId":915,"breakpoints":1327,"winningTest":118,"kind":339,"hasAutosaves":41},"https://pushsecurity.com/uc/account-takeover-detection?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=94bebb7bb99d48629ad157e80cf4d81d&builder.overrides.94bebb7bb99d48629ad157e80cf4d81d=94bebb7bb99d48629ad157e80cf4d81d&builder.overrides.use-case-page:/uc/account-takeover-detection=94bebb7bb99d48629ad157e80cf4d81d&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"xsmall":57,"small":39,"medium":40},{"createdDate":1329,"id":1330,"name":1331,"modelId":917,"published":13,"query":1332,"data":1335,"variations":1438,"lastUpdated":1439,"firstPublished":1440,"testRatio":33,"screenshot":1441,"createdBy":34,"lastUpdatedBy":333,"folders":1442,"meta":1443,"rev":1090},1745009370904,"23eb48fb56d3451cab77cb6ed140ee6d","Attack path hardening",[1333],{"@type":162,"property":163,"operator":164,"value":1334},"/uc/attack-path-hardening",{"tsCode":37,"seoDescription":1336,"jsCode":37,"customFonts":1337,"fontAwesomeIcon":1342,"seoTitle":1331,"title":1331,"blocks":1343,"url":1334,"state":1435},"Harden access paths with visibility,  detection, and guardrails.",[1338],{"kind":926,"files":1339,"version":927,"lastModified":928,"subsets":1340,"menu":949,"category":948,"variants":1341,"family":925},{"100":930,"200":931,"300":932,"500":933,"600":934,"700":935,"800":936,"900":937,"regular":943,"italic":942,"800italic":938,"500italic":945,"600italic":947,"200italic":944,"900italic":939,"700italic":940,"100italic":941,"300italic":946},[951,952],[954,955,956,957,958,959,128,960,961,962,963,964,965,966,967,968,969,970],"faRadar",[1344,1430],{"@type":106,"@version":107,"tagName":976,"id":1345,"meta":1346,"children":1347},"builder-1d8553eddcaa44d7bba9e2f4ca13af2a",{"previousId":1227},[1348,1364,1371,1378,1387,1397,1407,1417,1424],{"@type":106,"@version":107,"id":1349,"meta":1350,"component":1351,"responsiveStyles":1362},"builder-84fe3d7c85a743cf8cef649aa974f1ef",{"previousId":1231},{"name":980,"options":1352,"isRSC":118},{"title":1331,"description":1353,"points":1354,"video":1361},"\u003Cp>Push continuously monitors your environment for exposed login paths, weak credentials, and missing protections like MFA. It detects the gaps attackers exploit and helps you close them before they’re used.\u003C/p>",[1355,1357,1359],{"item":1356},"Find weak spots like reused passwords, local logins, and missing MFA",{"item":1358},"Monitor how users actually log in across apps, flows, and tools",{"item":1360},"Enforce secure access with in-browser guardrails","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fdbdcf52892034f1bbddded77f753a343%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=dbdcf52892034f1bbddded77f753a343&alt=media&optimized=true",{"large":1363},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":995},{"@type":106,"@version":107,"id":1365,"meta":1366,"component":1367,"responsiveStyles":1369},"builder-b3f66f5b08054cc78a06fecfc3ae2337",{"previousId":1247},{"name":999,"options":1368,"isRSC":118},{"AllPartners":41,"backgroundTransparent":6},{"large":1370},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":1003},{"@type":106,"@version":107,"id":1372,"meta":1373,"component":1374,"responsiveStyles":1376},"builder-4c73418b84be49ed85e6e13d2625c5a0",{"previousId":1254},{"name":1007,"options":1375,"isRSC":118},{"darkMode":41},{"large":1377},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1379,"component":1380,"responsiveStyles":1385},"builder-dec0246085e1485c803f7152b1922a81",{"name":1012,"tag":1012,"options":1381,"isRSC":118},{"darkMode":6,"maxWidth":1016,"maxTextWidth":1017,"title":1382,"description":1383,"image":1384,"reverse":6},"\u003Ch2>Find the gaps that lead to compromise\u003C/h2>","\u003Cp>Misconfigurations don’t show up in your config files, they show up in how users actually access apps. Push monitors real login behavior in the browser, surfacing risky patterns like local login access, duplicate accounts, or missing protections that leave doors wide open.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F309a59bba8d247a19476bb369397460e",{"large":1386},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1388,"meta":1389,"component":1390,"responsiveStyles":1395},"builder-ebf049a645604a249550996a88f8f3b6",{"previousId":1270},{"name":1026,"options":1391,"isRSC":118},{"darkMode":6,"maxWidth":1016,"imageMaxWidth":1028,"textPaddingTop":1029,"title":1392,"description":1393,"reverse":41,"image":1394},"\u003Ch2>See real login behavior\u003C/h2>","\u003Cp>Push watches authentication flows as they happen, giving you a live view of how users log in, which methods they choose, and where protections like MFA are missing. Plus, uncover every app and account in use, even shadow IT you didn’t know existed, without relying on stale config files or IdP assumptions. \u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb51f6b0357cc451b87a7a5016d984e5e",{"large":1396},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":1035,"paddingTop":1036,"marginTop":419},{"@type":106,"@version":107,"id":1398,"meta":1399,"component":1400,"responsiveStyles":1405},"builder-431d175c59004669b0b2776b07d71737",{"previousId":1280},{"name":1026,"options":1401,"isRSC":118},{"darkMode":6,"maxWidth":1016,"imageMaxWidth":1028,"textPaddingTop":1041,"title":1402,"description":1403,"reverse":6,"image":1404},"\u003Ch2>Find and fix posture drift\u003C/h2>","\u003Cp>Security posture isn’t static. Push continuously monitors for issues like missing MFA or legacy login methods. When something falls out of policy, you know immediately with custom notifications so you can act before it turns into risk.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F324e39127dfc41e592b1183dfb39892d",{"large":1406},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":1047},{"@type":106,"@version":107,"layerName":1026,"id":1408,"meta":1409,"component":1410,"responsiveStyles":1415},"builder-3dffdcbe0a484e2ca4c03f019b6d40ee",{"previousId":1290},{"name":1026,"options":1411,"isRSC":118},{"darkMode":6,"maxWidth":1016,"imageMaxWidth":1028,"textPaddingTop":1052,"title":1412,"description":1413,"reverse":41,"image":1414},"\u003Ch2>Guide users with in-browser guardrails\u003C/h2>","\u003Cp>Push doesn’t just surface problems, it helps you fix them. When users sign in without MFA, reuse a password, or use insecure credentials, Push prompts them directly in the browser to secure their access. It’s faster, more effective, and actually gets results.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fee8b75d13e45488aba55434a8b49ebb0",{"large":1416},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":1058},{"@type":106,"@version":107,"id":1418,"meta":1419,"component":1420,"responsiveStyles":1422},"builder-976bc222cd7647ff905f1e01cfedc453",{"previousId":1300},{"name":1007,"options":1421,"isRSC":118},{"darkMode":6},{"large":1423},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1425,"component":1426,"responsiveStyles":1428},"builder-8c47ec2fd0f74382bb3e6c870555632c",{"name":1068,"tag":1068,"options":1427,"isRSC":118},{"sectionHeading":37,"customClass":1070},{"large":1429},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":1431,"@type":106,"tagName":131,"properties":1432,"responsiveStyles":1433},"builder-pixel-hqgadf1h59w",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":1434},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":1436},{"path":37,"query":1437},{},{},1770892844854,1745499166112,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F6ca12bf728a045f1a31d40c0beb3bfe5",[],{"kind":339,"lastPreviewUrl":1444,"breakpoints":1445,"hasLinks":6,"originalContentId":1212,"winningTest":118,"hasAutosaves":6},"https://pushsecurity.com/uc/attack-path-hardening?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=23eb48fb56d3451cab77cb6ed140ee6d&builder.overrides.23eb48fb56d3451cab77cb6ed140ee6d=23eb48fb56d3451cab77cb6ed140ee6d&builder.overrides.use-case-page:/uc/attack-path-hardening=23eb48fb56d3451cab77cb6ed140ee6d&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"xsmall":57,"small":39,"medium":40},{"createdDate":1447,"id":1448,"name":1449,"modelId":917,"published":13,"query":1450,"data":1453,"variations":1558,"lastUpdated":1559,"firstPublished":1560,"testRatio":33,"screenshot":1561,"createdBy":34,"lastUpdatedBy":333,"folders":1562,"meta":1563,"rev":1090},1761675020232,"ea4f309d2ffe46c5aa97ebf0fda4e2e3","ClickFix Protection",[1451],{"@type":162,"property":163,"operator":164,"value":1452},"/uc/clickfix-protection",{"seoDescription":1454,"fontAwesomeIcon":1455,"customFonts":1456,"seoTitle":1461,"jsCode":37,"tsCode":37,"title":1461,"blocks":1462,"url":1452,"state":1555},"Block attacks that trick users into running malicious code.","faLaptopCode",[1457],{"files":1458,"subsets":1459,"menu":949,"version":927,"kind":926,"family":925,"lastModified":928,"variants":1460,"category":948},{"100":930,"200":931,"300":932,"500":933,"600":934,"700":935,"800":936,"900":937,"200italic":944,"800italic":938,"700italic":940,"600italic":947,"100italic":941,"italic":942,"regular":943,"300italic":946,"500italic":945,"900italic":939},[951,952],[954,955,956,957,958,959,128,960,961,962,963,964,965,966,967,968,969,970],"ClickFix protection",[1463,1550],{"@type":106,"@version":107,"tagName":976,"id":1464,"meta":1465,"children":1466},"builder-d7eefdde0f2a4b2b9de3dcb2978fd6cb",{"previousId":1345},[1467,1483,1490,1497,1507,1517,1527,1537,1544],{"@type":106,"@version":107,"id":1468,"meta":1469,"component":1470,"responsiveStyles":1481},"builder-56e2c54bcce040a4af8b92ae03706c12",{"previousId":1349},{"name":980,"options":1471,"isRSC":118},{"title":1461,"description":1472,"points":1473,"image":1480},"\u003Cp>ClickFix attacks are one of the fastest-growing threats, tricking users into copying malicious code from a webpage and running it locally. This technique bypasses traditional EDR, email gateways, and network filters, leading directly to ransomware and data theft. Push stops this attack at the source, in the browser, by detecting and blocking the malicious behavior before the user can ever paste the code.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>",[1474,1476,1478],{"item":1475},"Detect ClickFix, FileFix, and fake CAPTCHA in the browser",{"item":1477},"Block malicious copy-and-paste actions before code is executed",{"item":1479},"See full telemetry into which users were targeted and what they saw","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F7b74af62889847ebb3927364485b0546",{"large":1482},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":995},{"@type":106,"@version":107,"id":1484,"meta":1485,"component":1486,"responsiveStyles":1488},"builder-05f9614d4e3e4dc88b3ee8658f54e10e",{"previousId":1365},{"name":999,"options":1487,"isRSC":118},{"AllPartners":41,"backgroundTransparent":6},{"large":1489},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":1003},{"@type":106,"@version":107,"id":1491,"meta":1492,"component":1493,"responsiveStyles":1495},"builder-c4fb5179366243c1b6c32d368675cf47",{"previousId":1372},{"name":1007,"options":1494,"isRSC":118},{"darkMode":41},{"large":1496},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1498,"meta":1499,"component":1500,"responsiveStyles":1505},"builder-261af50705fd445d8cca4a6ba20d5391",{"previousId":1379},{"name":1012,"tag":1012,"options":1501,"isRSC":118},{"darkMode":6,"maxWidth":1016,"maxTextWidth":1017,"title":1502,"description":1503,"reverse":6,"image":1504},"\u003Ch2>Stop ClickFix-style attacks before they become a breach\u003C/h2>","\u003Cp>Traditional security tools are blind to malicious copy and paste attacks because the attack exploits a gap between the browser and the endpoint. EDR only sees the payload after it runs, and network tools see only part of the picture.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F98b2f7e08dec4eafaf8e24937605b8cf",{"large":1506},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1508,"meta":1509,"component":1510,"responsiveStyles":1515},"builder-7d21b8aab8064c40b1e5dd23c4749309",{"previousId":1388},{"name":1026,"options":1511,"isRSC":118},{"darkMode":6,"maxWidth":1016,"imageMaxWidth":1028,"textPaddingTop":1029,"title":1512,"description":1513,"reverse":41,"image":1514},"\u003Ch2>Discover lures at the source\u003C/h2>","\u003Cp>Push inspects page behavior to identify ClickFix attacks as they happen. By inspecting the page, its structure, and how the user interacts with it, Push can detect and block these in-browser threats in real time. This deep, TTP-based inspection spots the trap even on novel pages that are built to bypass traditional web filters and blocklists.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F665bf47e01544c75bf9ddafd3917927b",{"large":1516},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":1035,"paddingTop":1036,"marginTop":419},{"@type":106,"@version":107,"id":1518,"meta":1519,"component":1520,"responsiveStyles":1525},"builder-fb91943adf6149259ed9e1e6566c9afe",{"previousId":1398},{"name":1026,"options":1521,"isRSC":118},{"darkMode":6,"maxWidth":1016,"imageMaxWidth":1028,"textPaddingTop":1041,"title":1522,"description":1523,"reverse":6,"image":1524},"\u003Ch2>Block the malicious action\u003C/h2>","\u003Cp>When Push detects a malicious script, it intercepts the user's action and blocks the code from being copied to the clipboard. The user is protected, the attack is stopped, and no malicious code ever reaches the endpoint. Unlike broad DLP tools, this action is surgical, targeting only malicious behavior without disrupting normal work.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F5ee68f81f1ac416685cbfe91298cf827",{"large":1526},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":1047},{"@type":106,"@version":107,"layerName":1026,"id":1528,"meta":1529,"component":1530,"responsiveStyles":1535},"builder-bfac95fada864e5a8259b955b5b5f98b",{"previousId":1408},{"name":1026,"options":1531,"isRSC":118},{"darkMode":6,"maxWidth":1016,"imageMaxWidth":1028,"textPaddingTop":1052,"title":1532,"description":1533,"reverse":41,"image":1534},"\u003Ch2>Accelerate ClickFix investigations\u003C/h2>","\u003Cp>When an attack happens, knowing what the user saw or did is critical. Push provides rich browser session data for rapid investigation and containment. Security teams get detailed telemetry on which users were targeted, what lure they were served, and when the block occurred. This enables defenders to reconstruct what happened and respond quickly, even when other tools miss the activity entirely.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F6cdf2a8aeddc4e9a9023cbf974e40239",{"large":1536},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":1058},{"@type":106,"@version":107,"id":1538,"meta":1539,"component":1540,"responsiveStyles":1542},"builder-136892e831684a6987f87d3be67c33d1",{"previousId":1418},{"name":1007,"options":1541,"isRSC":118},{"darkMode":6},{"large":1543},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1545,"component":1546,"responsiveStyles":1548},"builder-dec26b739f2f42beb5a73cfc6c675b60",{"name":1068,"tag":1068,"options":1547,"isRSC":118},{"sectionHeading":37,"customClass":1070},{"large":1549},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":1551,"@type":106,"tagName":131,"properties":1552,"responsiveStyles":1553},"builder-pixel-jb7i4u6v2mk",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":1554},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":1556},{"path":37,"query":1557},{},{},1770892881888,1761847585203,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F375467b8bef34ed1a8a1cc5b8b67d75f",[],{"lastPreviewUrl":1564,"originalContentId":1330,"winningTest":118,"hasLinks":6,"kind":339,"breakpoints":1565,"hasAutosaves":6},"https://pushsecurity.com/uc/clickfix-protection?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=ea4f309d2ffe46c5aa97ebf0fda4e2e3&builder.overrides.ea4f309d2ffe46c5aa97ebf0fda4e2e3=ea4f309d2ffe46c5aa97ebf0fda4e2e3&builder.overrides.use-case-page:/uc/clickfix-protection=ea4f309d2ffe46c5aa97ebf0fda4e2e3&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"xsmall":57,"small":39,"medium":40},{"createdDate":1567,"id":1568,"name":1569,"modelId":917,"published":13,"query":1570,"data":1573,"variations":1678,"lastUpdated":1679,"firstPublished":1680,"testRatio":33,"screenshot":1681,"createdBy":34,"lastUpdatedBy":333,"folders":1682,"meta":1683,"rev":1090},1745009743870,"a9d5556e77f84a37b5bd52310a7110c1","Incident response",[1571],{"@type":162,"property":163,"operator":164,"value":1572},"/uc/incident-response",{"seoDescription":1574,"customFonts":1575,"title":1569,"jsCode":37,"fontAwesomeIcon":1580,"seoTitle":1581,"tsCode":37,"blocks":1582,"url":1572,"state":1675},"Investigate and respond faster with unique browser telemetry.",[1576],{"kind":926,"subsets":1577,"menu":949,"variants":1578,"category":948,"family":925,"version":927,"lastModified":928,"files":1579},[951,952],[954,955,956,957,958,959,128,960,961,962,963,964,965,966,967,968,969,970],{"100":930,"200":931,"300":932,"500":933,"600":934,"700":935,"800":936,"900":937,"900italic":939,"600italic":947,"200italic":944,"300italic":946,"100italic":941,"700italic":940,"800italic":938,"regular":943,"italic":942,"500italic":945},"faSatelliteDish","Browser based incident response",[1583,1670],{"@type":106,"@version":107,"tagName":976,"id":1584,"meta":1585,"children":1586},"builder-653c4aed737b4def88dc4cd2d695660a",{"previousId":1345},[1587,1604,1611,1618,1627,1637,1647,1657,1664],{"@type":106,"@version":107,"id":1588,"meta":1589,"component":1590,"responsiveStyles":1602},"builder-18190bd36518467d9154d27d7e945b9b",{"previousId":1349},{"name":980,"options":1591,"isRSC":118},{"title":1592,"description":1593,"points":1594,"video":1601},"Browser-based incident response","\u003Cp>Push gives you real-time visibility into what actually happened during a breach, right in the browser where the attack played out. From credential theft to session hijacking, Push captures high-fidelity telemetry so you can investigate quickly, contain confidently, and shut it down before it spreads.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>",[1595,1597,1599],{"item":1596},"Reconstruct what happened with real browser session context",{"item":1598},"Investigate faster with real-world session context",{"item":1600},"Trigger response actions automatically through your SIEM or SOAR","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fd00e39d3b6e346c296261d875cf55652%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=d00e39d3b6e346c296261d875cf55652&alt=media&optimized=true",{"large":1603},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":995},{"@type":106,"@version":107,"id":1605,"meta":1606,"component":1607,"responsiveStyles":1609},"builder-8a0a8ea63f5d48dd8a6726f2d49cf0ca",{"previousId":1365},{"name":999,"options":1608,"isRSC":118},{"AllPartners":41,"backgroundTransparent":6},{"large":1610},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":1003},{"@type":106,"@version":107,"id":1612,"meta":1613,"component":1614,"responsiveStyles":1616},"builder-2df65c3f54334df2b26e7cb744886cdc",{"previousId":1372},{"name":1007,"options":1615,"isRSC":118},{"darkMode":41},{"large":1617},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1619,"component":1620,"responsiveStyles":1625},"builder-2c32c869efc2423ab69ef06b150e9f97",{"name":1012,"tag":1012,"options":1621,"isRSC":118},{"darkMode":6,"maxWidth":1016,"maxTextWidth":1017,"title":1622,"description":1623,"image":1624,"reverse":6},"\u003Ch2>See attacks unfold, not just their aftermath\u003C/h2>","\u003Cp>Attacks happen in the browser, not in logs. Push captures what traditional tools miss: what users clicked, what loaded, what was entered, and how attackers moved. That gives you real-world evidence, not just assumptions, when every second matters.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F36fc719bd1de4a38b916f4d25c81a26d",{"large":1626},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1628,"meta":1629,"component":1630,"responsiveStyles":1635},"builder-370e53c6016e432db01e9193a2ce90f6",{"previousId":1388},{"name":1026,"options":1631,"isRSC":118},{"darkMode":6,"maxWidth":1016,"imageMaxWidth":1028,"textPaddingTop":1029,"title":1632,"description":1633,"reverse":41,"image":1634},"\u003Ch2>Investigate faster with high-fidelity data\u003C/h2>","\u003Cp>Reconstructing an incident shouldn’t feel like guesswork. Push records detailed telemetry from inside the browser: page loads, credential inputs, DOM changes, session activity, user behavior. It’s structured, exportable, and ready to plug into your investigation workflows, so you can move fast without digging through proxy logs or relying on user reports.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fa6adda040e684e67a8d68a55c5ce5f6d",{"large":1636},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":1035,"paddingTop":419,"marginTop":419},{"@type":106,"@version":107,"id":1638,"meta":1639,"component":1640,"responsiveStyles":1645},"builder-a7f3767a8d184bd08fb24520bf210e95",{"previousId":1398},{"name":1026,"options":1641,"isRSC":118},{"darkMode":6,"maxWidth":1016,"imageMaxWidth":1028,"textPaddingTop":1041,"title":1642,"description":1643,"reverse":6,"image":1644},"\u003Ch2>Contain and respond in real time\u003C/h2>","\u003Cp>When something looks off, Push doesn’t just alert you, it gives you options. Guide users with in-browser prompts. Terminate sessions. Trigger SOAR workflows. Enrich SIEM alerts. Push gives you the context and control to stop spread before it starts.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb3dedeed5aba4847a2c2d22e10d0ec12",{"large":1646},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":1047},{"@type":106,"@version":107,"layerName":1026,"id":1648,"meta":1649,"component":1650,"responsiveStyles":1655},"builder-b92036ee0ece4b32acdbdcc7c377366b",{"previousId":1408},{"name":1026,"options":1651,"isRSC":118},{"darkMode":6,"maxWidth":1016,"imageMaxWidth":1028,"textPaddingTop":1052,"title":1652,"description":1653,"reverse":41,"image":1654},"\u003Ch2>Prevent the next one\u003C/h2>","\u003Cp>Push helps you respond fast, but it also helps you fix what went wrong. It surfaces misconfigurations and risky behaviors that made the attack possible in the first place, then guides users in-browser to remediate. One tool. Full loop. No loose ends.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fc1ecc2d5d3814b62b072fac01827ff96",{"large":1656},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":1058},{"@type":106,"@version":107,"id":1658,"meta":1659,"component":1660,"responsiveStyles":1662},"builder-5e8ae39655274de89da32ab573a2525a",{"previousId":1418},{"name":1007,"options":1661,"isRSC":118},{"darkMode":6},{"large":1663},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1665,"component":1666,"responsiveStyles":1668},"builder-dfd6850cfb4741d2b8a0c16c2780f00a",{"name":1068,"tag":1068,"options":1667,"isRSC":118},{"sectionHeading":37,"customClass":1070},{"large":1669},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":1671,"@type":106,"tagName":131,"properties":1672,"responsiveStyles":1673},"builder-pixel-t20dmmgkd7",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":1674},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":1676},{"path":37,"query":1677},{},{},1770892908052,1745427419274,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb07017bfd318431690a5bb35bda35b99",[],{"kind":339,"breakpoints":1684,"originalContentId":1330,"winningTest":118,"lastPreviewUrl":1685,"hasLinks":6,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},"https://pushsecurity.com/uc/incident-response?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=a9d5556e77f84a37b5bd52310a7110c1&builder.overrides.a9d5556e77f84a37b5bd52310a7110c1=a9d5556e77f84a37b5bd52310a7110c1&builder.overrides.use-case-page:/uc/incident-response=a9d5556e77f84a37b5bd52310a7110c1&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"createdDate":1687,"id":1688,"name":1689,"modelId":917,"published":13,"query":1690,"data":1693,"variations":1797,"lastUpdated":1798,"firstPublished":1799,"testRatio":33,"screenshot":1800,"createdBy":34,"lastUpdatedBy":333,"folders":1801,"meta":1802,"rev":1090},1746122471259,"5f118e24433d46ceb79f5099987156d7","Shadow SaaS",[1691],{"@type":162,"property":163,"operator":164,"value":1692},"/uc/shadow-saas",{"seoTitle":1694,"seoDescription":1695,"customFonts":1696,"fontAwesomeIcon":385,"title":1701,"jsCode":37,"tsCode":37,"blocks":1702,"url":1692,"state":1794},"Find and secure shadow SaaS","See and control shadow SaaS in the browser.",[1697],{"kind":926,"variants":1698,"files":1699,"family":925,"version":927,"subsets":1700,"lastModified":928,"category":948,"menu":949},[954,955,956,957,958,959,128,960,961,962,963,964,965,966,967,968,969,970],{"100":930,"200":931,"300":932,"500":933,"600":934,"700":935,"800":936,"900":937,"300italic":946,"500italic":945,"regular":943,"900italic":939,"italic":942,"100italic":941,"200italic":944,"600italic":947,"700italic":940,"800italic":938},[951,952],"Secure shadow SaaS",[1703,1789],{"@type":106,"@version":107,"tagName":976,"id":1704,"meta":1705,"children":1706},"builder-04da805c4cd34652a2db452fcda52e1d",{"previousId":1584},[1707,1723,1730,1737,1746,1756,1766,1776,1783],{"@type":106,"@version":107,"id":1708,"meta":1709,"component":1710,"responsiveStyles":1721},"builder-830d414faeaf41439142f9157e8288c8",{"previousId":1588},{"name":980,"options":1711,"isRSC":118},{"title":1694,"description":1712,"points":1713,"video":1720},"\u003Cp>SaaS sprawl is one of today’s fastest-growing security blind spots because most tools monitor around the edges. Push sees it at the source, in the browser, revealing every app users access, flagging risky tools, and helping you shut down exposure before it leads to a breach. No guesswork. No nasty surprises. Just real-time visibility and control.\u003C/p>",[1714,1716,1718],{"item":1715},"Discover every SaaS app users access, managed or not",{"item":1717},"Spot accounts with weak security postures like missing MFA, unmanaged access, and no SSO",{"item":1719},"Control usage with in-browser prompts, blocks, and security guardrails","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F3e4eece318d04d6586e691d59d0741cf%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=3e4eece318d04d6586e691d59d0741cf&alt=media&optimized=true",{"large":1722},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":995},{"@type":106,"@version":107,"id":1724,"meta":1725,"component":1726,"responsiveStyles":1728},"builder-cd7833f966cb4c7e8adf0d6c979414a6",{"previousId":1605},{"name":999,"options":1727,"isRSC":118},{"AllPartners":41,"backgroundTransparent":6},{"large":1729},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":1003},{"@type":106,"@version":107,"id":1731,"meta":1732,"component":1733,"responsiveStyles":1735},"builder-49d720b45430454e8b08c526f267c19f",{"previousId":1612},{"name":1007,"options":1734,"isRSC":118},{"darkMode":41},{"large":1736},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1738,"component":1739,"responsiveStyles":1744},"builder-3dde0bf6c8544e5e9ab41b18a9d68034",{"name":1012,"tag":1012,"options":1740,"isRSC":118},{"darkMode":6,"maxWidth":1016,"maxTextWidth":1017,"title":1741,"description":1742,"image":1743,"reverse":6},"\u003Ch2>Use your browser to curb Saas Sprawl\u003C/h2>","\u003Cp>Shadow SaaS isn’t hiding in your network, it’s in your browser. From AI tools to unsanctioned file-sharing sites, security risks live in the apps your users sign into every day. Push maps your organization's true SaaS footprint in real time, exposing apps and accounts with unmanaged access, poor authentication, or no security oversight.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb6811a214c7949b6bbe0b9a3bca62efd",{"large":1745},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1747,"meta":1748,"component":1749,"responsiveStyles":1754},"builder-e2420451ccdc4f088d0a4904cff45935",{"previousId":1628},{"name":1026,"options":1750,"isRSC":118},{"darkMode":6,"maxWidth":1016,"imageMaxWidth":1028,"textPaddingTop":1029,"title":1751,"description":1752,"reverse":41,"image":1753},"\u003Ch2>Discover hidden SaaS usage\u003C/h2>","\u003Cp>Push captures live browser telemetry across every tab and session. Whether a user signs into a sanctioned app with a personal account or tries a new AI plugin, you’ll see it in real time, with no integrations or manual tagging.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fe16e301f9af94665b95d98232a863d8a",{"large":1755},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":1035,"paddingTop":419,"marginTop":419},{"@type":106,"@version":107,"id":1757,"meta":1758,"component":1759,"responsiveStyles":1764},"builder-b36de7fce7994beea9e58d94662e7166",{"previousId":1638},{"name":1026,"options":1760,"isRSC":118},{"darkMode":6,"maxWidth":1016,"imageMaxWidth":1028,"textPaddingTop":1041,"title":1761,"description":1762,"reverse":6,"image":1763},"\u003Ch2>Spot risky access and unsafe usage\u003C/h2>","\u003Cp>Discovery is just the beginning. Push flags apps with risky traits, no MFA, no SSO, known vulnerabilities, or broad access scopes. You’ll know which tools introduce real risk, and which users are exposed so you can act with precision.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F6585f3c242da4d70ae3cb7d02f481bef",{"large":1765},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":1047},{"@type":106,"@version":107,"layerName":1026,"id":1767,"meta":1768,"component":1769,"responsiveStyles":1774},"builder-dc366b5134684fe7a508edf8913103ea",{"previousId":1648},{"name":1026,"options":1770,"isRSC":118},{"darkMode":6,"maxWidth":1016,"imageMaxWidth":1028,"textPaddingTop":1052,"title":1771,"description":1772,"reverse":41,"image":1773},"\u003Ch2>Close gaps before they grow\u003C/h2>","\u003Cp>Push turns insight into action. When risky SaaS use is detected, guide users to enable MFA, block high-risk apps, or apply in-browser guardrails automatically. All without deploying new infrastructure or managing dozens of integrations.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fe6d60b6d91414819bc6258a318f00557",{"large":1775},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":1058},{"@type":106,"@version":107,"id":1777,"meta":1778,"component":1779,"responsiveStyles":1781},"builder-8708f6f0d8da4b3f9e17bf16cda70219",{"previousId":1658},{"name":1007,"options":1780,"isRSC":118},{"darkMode":6},{"large":1782},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1784,"component":1785,"responsiveStyles":1787},"builder-8ff4b38d60534cf28cb523ab0f754875",{"name":1068,"tag":1068,"options":1786,"isRSC":118},{"sectionHeading":37,"customClass":1070},{"large":1788},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":1790,"@type":106,"tagName":131,"properties":1791,"responsiveStyles":1792},"builder-pixel-225hg4jfk9t",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":1793},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":1795},{"path":37,"query":1796},{},{},1770892936802,1746714967208,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F01bfb2304521412fbd2e1a1180904d40",[],{"originalContentId":1568,"winningTest":118,"lastPreviewUrl":1803,"breakpoints":1804,"kind":339,"hasLinks":6,"hasAutosaves":6},"https://pushsecurity.com/uc/shadow-saas?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=5f118e24433d46ceb79f5099987156d7&builder.overrides.5f118e24433d46ceb79f5099987156d7=5f118e24433d46ceb79f5099987156d7&builder.overrides.use-case-page:/uc/shadow-saas=5f118e24433d46ceb79f5099987156d7&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"xsmall":57,"small":39,"medium":40},{"createdDate":1806,"id":1807,"name":1808,"modelId":917,"published":13,"query":1809,"data":1812,"variations":1916,"lastUpdated":1917,"firstPublished":1918,"testRatio":33,"screenshot":1919,"createdBy":34,"lastUpdatedBy":333,"folders":1920,"meta":1921,"rev":1090},1764707470172,"b62629ce2f3741158d961cd10fe74b31","Shadow AI",[1810],{"@type":162,"property":163,"operator":164,"value":1811},"/uc/shadow-ai",{"fontAwesomeIcon":1813,"seoTitle":1814,"jsCode":37,"customFonts":1815,"title":1820,"tsCode":37,"seoDescription":1821,"blocks":1822,"url":1811,"state":1913},"faBrainCircuit","Secure AI native and AI enhanced apps. ",[1816],{"variants":1817,"category":948,"files":1818,"subsets":1819,"family":925,"kind":926,"menu":949,"lastModified":928,"version":927},[954,955,956,957,958,959,128,960,961,962,963,964,965,966,967,968,969,970],{"100":930,"200":931,"300":932,"500":933,"600":934,"700":935,"800":936,"900":937,"800italic":938,"regular":943,"700italic":940,"200italic":944,"italic":942,"500italic":945,"600italic":947,"300italic":946,"100italic":941,"900italic":939},[951,952],"Secure shadow AI","See and control shadow AI apps in the browser.",[1823,1908],{"@type":106,"@version":107,"tagName":976,"id":1824,"meta":1825,"children":1826},"builder-a6e5717a2c914d5695058e4ee201a05d",{"previousId":1704},[1827,1843,1850,1857,1867,1876,1885,1895,1902],{"@type":106,"@version":107,"id":1828,"meta":1829,"component":1830,"responsiveStyles":1841},"builder-3e0ed678683f4a0eb7aa00253cf263b2",{"previousId":1708},{"name":980,"options":1831,"isRSC":118},{"title":1820,"description":1832,"points":1833,"image":1840},"\u003Cp>Your employees are adopting AI faster than you can track it. From native features in corporate apps to unapproved shadow tools, it’s all happening in the browser. Push detects every AI interaction in real time, letting you categorize apps and enforce acceptable use policies in the browser.\u003C/p>",[1834,1836,1838],{"item":1835},"Map every AI tool used across your workforce",{"item":1837},"Review and classify apps by sensitivity, purpose, and policy status",{"item":1839},"Enforce AI usage rules directly in the browser","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F33cf153d920f4e389f3650253577cff7",{"large":1842},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":995},{"@type":106,"@version":107,"id":1844,"meta":1845,"component":1846,"responsiveStyles":1848},"builder-76968f8471d14893b8189d75b08fb426",{"previousId":1724},{"name":999,"options":1847,"isRSC":118},{"AllPartners":41,"backgroundTransparent":6},{"large":1849},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":1003},{"@type":106,"@version":107,"id":1851,"meta":1852,"component":1853,"responsiveStyles":1855},"builder-b55b9d4bc5a649d8839ce7f6c2043d95",{"previousId":1731},{"name":1007,"options":1854,"isRSC":118},{"darkMode":41},{"large":1856},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1858,"meta":1859,"component":1860,"responsiveStyles":1865},"builder-c3f38ef4d75d4989a29b5903175ed8a1",{"previousId":1738},{"name":1012,"tag":1012,"options":1861,"isRSC":118},{"darkMode":6,"maxWidth":1016,"maxTextWidth":1017,"title":1862,"description":1863,"image":1864,"reverse":6},"\u003Ch2>Use your browser to govern AI \u003C/h2>","\u003Cp>The AI footprint inside your company is bigger than you think. From text generators to meeting assistants and design copilots, employees test, adopt, and connect new tools constantly. Push shows you those tools and which users are accessing them, without relying on network scans or API integrations.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F30b43bda6f1644c19478fb1efa20050c",{"large":1866},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1868,"meta":1869,"component":1870,"responsiveStyles":1874},"builder-90ee9cb9afc44e7f885523715bf51a53",{"previousId":1747},{"name":1026,"options":1871,"isRSC":118},{"darkMode":6,"maxWidth":1016,"imageMaxWidth":1028,"textPaddingTop":1029,"title":1872,"description":1873,"reverse":41,"image":1763},"\u003Ch2>Discover every AI tool users touch\u003C/h2>","\u003Cp>Push captures live telemetry from the browser, identifying every AI-native and AI-enhanced application users access. You’ll know which corporate identities are connected, how data flows, and what new AI apps appear across your environment. \u003C/p>",{"large":1875},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":1035,"paddingTop":419,"marginTop":419},{"@type":106,"@version":107,"id":1877,"meta":1878,"component":1879,"responsiveStyles":1883},"builder-9e44539fa53c4d8e87406036c921fc46",{"previousId":1757},{"name":1026,"options":1880,"isRSC":118},{"darkMode":6,"maxWidth":1016,"imageMaxWidth":1028,"textPaddingTop":1041,"title":1881,"description":1882,"reverse":6,"image":1773},"\u003Ch2>Classify and manage AI risk\u003C/h2>","\u003Cp>For apps you choose to allow, Push lets you apply custom in-browser banners. You can bulk-select categories of AI tools and require users to read and acknowledge your acceptable use policy before they proceed. This creates an auditable trail and moves policy from an easy to forget document to an active, in-workflow control.\u003C/p>",{"large":1884},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":1047},{"@type":106,"@version":107,"layerName":1026,"id":1886,"meta":1887,"component":1888,"responsiveStyles":1893},"builder-44c1a891926f4bdeaaa37e90721fe6ac",{"previousId":1767},{"name":1026,"options":1889,"isRSC":118},{"darkMode":6,"maxWidth":1016,"imageMaxWidth":1028,"textPaddingTop":1052,"title":1890,"description":1891,"reverse":41,"image":1892},"\u003Ch2>Enforce your AI policy in the browser\u003C/h2>","\u003Cp>When an AI tool is deemed non-compliant or too risky, Push blocks it at the source. The block happens directly in the browser, preventing the user from accessing the site or submitting data. This gives you an immediate, powerful lever to stop data exfiltration and enforce a hard line on unacceptable risk.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fa359ac1805af4e15a8a7f84632b9bb55",{"large":1894},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":1058},{"@type":106,"@version":107,"id":1896,"meta":1897,"component":1898,"responsiveStyles":1900},"builder-dcc906f9cbe54dc68b3c672668e7a38f",{"previousId":1777},{"name":1007,"options":1899,"isRSC":118},{"darkMode":6},{"large":1901},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1903,"component":1904,"responsiveStyles":1906},"builder-d2d64780c31b4349bc75805b23a07e38",{"name":1068,"tag":1068,"options":1905,"isRSC":118},{"sectionHeading":37,"customClass":1070},{"large":1907},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":1909,"@type":106,"tagName":131,"properties":1910,"responsiveStyles":1911},"builder-pixel-gvb5hb3oa9q",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":1912},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":1914},{"path":37,"query":1915},{},{},1770892957225,1764950077593,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fe558b8b069884037a8e6904f7ecc029c",[],{"winningTest":118,"breakpoints":1922,"originalContentId":1688,"kind":339,"lastPreviewUrl":1923,"hasLinks":6,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},"https://pushsecurity.com/uc/shadow-ai?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=b62629ce2f3741158d961cd10fe74b31&builder.overrides.b62629ce2f3741158d961cd10fe74b31=b62629ce2f3741158d961cd10fe74b31&builder.overrides.use-case-page:/uc/shadow-ai=b62629ce2f3741158d961cd10fe74b31&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",[1925,1943,1959,1975,1991,2007],{"createdDate":1926,"id":1927,"name":1928,"modelId":1929,"published":13,"meta":1930,"query":1932,"data":1933,"variations":1938,"lastUpdated":1939,"firstPublished":1940,"testRatio":33,"createdBy":53,"lastUpdatedBy":72,"folders":1941,"rev":1942},1753178645778,"5449fa4538394c349e095425c5d11836","Phil Beyer","d7293847ee82498daac1405b43442f51",{"lastPreviewUrl":37,"kind":36,"breakpoints":1931},{"xsmall":57,"small":39,"medium":40},[],{"title":1928,"thumbnail":1934,"description":1935,"subTitle":1936,"vimeoId":1937},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F59c53c6fef43465aaba78eb58a3453dc","I really like how Push approaches things. With Push, I get a platform that let's me know about the stuff I should really worry about.","Head of Security, Flex","1102046942",{},1753971645046,1753178667228,[],"ho54zeb3pbn",{"createdDate":1944,"id":1945,"name":1946,"modelId":1929,"published":13,"query":1947,"data":1948,"variations":1953,"lastUpdated":1954,"firstPublished":1955,"testRatio":33,"createdBy":53,"lastUpdatedBy":72,"folders":1956,"meta":1957,"rev":1942},1753178561135,"dc289e14fe9348248692186620322f2c","Josh Lemos",[],{"vimeoId":1949,"thumbnail":1950,"subTitle":1951,"description":1952,"title":1946},"1102047122","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F33ad464e24f34c82906a0a38468c971c","CISO","Push gives me the security context I need in the browser without requiring everyone to converge on a single enterprise browser platform.",{},1773656078003,1753178598901,[],{"lastPreviewUrl":37,"kind":36,"breakpoints":1958,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},{"createdDate":1960,"id":1961,"name":1962,"modelId":1929,"published":13,"meta":1963,"query":1965,"data":1966,"variations":1971,"lastUpdated":1972,"firstPublished":1973,"testRatio":33,"createdBy":53,"lastUpdatedBy":72,"folders":1974,"rev":1942},1753178508341,"502211493fb74b12b5e02179bac81918","Ash Devata",{"lastPreviewUrl":37,"breakpoints":1964,"kind":36},{"xsmall":57,"small":39,"medium":40},[],{"title":1962,"vimeoId":1967,"subTitle":1968,"description":1969,"thumbnail":1970},"1102047399","CEO, GreyNoise","We love the product and use it every day. When an employee clicks on a link and opens a browser session, that's where Push is.","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F6e3400d3b113480eb4309a7509d72ef2",{},1753978134235,1753178537654,[],{"createdDate":1976,"id":1977,"name":27,"modelId":1929,"published":13,"meta":1978,"query":1980,"data":1981,"variations":1987,"lastUpdated":1988,"firstPublished":1989,"testRatio":33,"createdBy":53,"lastUpdatedBy":72,"folders":1990,"rev":1942},1753178281400,"429b3b67348348b2ada89563e90359a0",{"kind":36,"breakpoints":1979,"lastPreviewUrl":37},{"xsmall":57,"small":39,"medium":40},[],{"title":1982,"vimeoId":1983,"thumbnail":1984,"subTitle":1985,"description":1986},"Jason Waits ","1102047623","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fca9487bd90e1496ba915b2356236d85a","CISO, Inductive Automation","Push has actually been one of our favorite vendors to work with. We're thrilled with the feature direction and are extremely excited for the future.",{},1753971706068,1753178396316,[],{"createdDate":1992,"id":1993,"name":1994,"modelId":1929,"published":13,"meta":1995,"query":1997,"data":1998,"variations":2003,"lastUpdated":2004,"firstPublished":2005,"testRatio":33,"createdBy":53,"lastUpdatedBy":72,"folders":2006,"rev":1942},1753095741593,"709549a39cfa4d7ea37af7a1df16a366","Myke Lyons",{"lastPreviewUrl":37,"breakpoints":1996,"kind":36},{"xsmall":57,"small":39,"medium":40},[],{"description":1999,"vimeoId":2000,"thumbnail":2001,"title":1994,"subTitle":2002},"Push is giving us the ability to play a better, more interactive role model for users in the browser, while allowing people to choose their own path.","1102047806","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F849139d92f174c78b647c7d3a9d45c4c","CISO, Cribl",{},1753971720977,1753095780459,[],{"createdDate":2008,"id":2009,"name":2010,"modelId":1929,"published":13,"meta":2011,"query":2013,"data":2014,"variations":2019,"lastUpdated":2020,"firstPublished":2021,"testRatio":33,"createdBy":53,"lastUpdatedBy":72,"folders":2022,"rev":1942},1753093796185,"3faab6414c4d49b8b35162589933c4c9","Ross McKerchar",{"breakpoints":2012,"kind":36,"lastPreviewUrl":37},{"xsmall":57,"small":39,"medium":40},[],{"vimeoId":2015,"title":2010,"subTitle":2016,"vimeoUrl":2015,"thumbnail":2017,"description":2018},"1102048247","Investor","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F29861ccc980b472da4a531c3ce31efe7","Being in the browser gives a unique view that enables security teams to observe attacks that you otherwise can't.",{},1753978147205,1753093910375,[],[2024,2040,2054,2068,2082,2096,2110],{"createdDate":2025,"id":2026,"name":2027,"modelId":2028,"published":13,"query":2029,"data":2030,"variations":2033,"lastUpdated":2034,"firstPublished":2035,"testRatio":33,"createdBy":333,"lastUpdatedBy":333,"folders":2036,"meta":2037,"rev":2039},1770121473555,"7b46ec38932042babc107295c1508721","Stop Phishing","1920c5ecc9964c5597d80ecefeaac570",[],{"subtext":2031,"heading":2027,"link":2032},"\u003Cp>Detect phishing and fake logins in real time to keep valuable credentials out of attacker hands.\u003C/p>\n",{"url":920},{},1770123727367,1770121632251,[],{"lastPreviewUrl":37,"breakpoints":2038,"kind":36,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},"k5d2slordho",{"createdDate":2041,"id":2042,"name":2043,"modelId":2028,"published":13,"query":2044,"data":2045,"variations":2048,"lastUpdated":2049,"firstPublished":2050,"testRatio":33,"createdBy":333,"lastUpdatedBy":333,"folders":2051,"meta":2052,"rev":2039},1770121644587,"30bd7080d64a4532b594fdfd20a255fa","Find hidden apps",[],{"subtext":2046,"heading":2043,"link":2047},"\u003Cp>Surface shadow SaaS, unmanaged accounts, and duplicate logins to control your SaaS footprint.\u003C/p>\n",{"url":1692},{},1770123740241,1770121680524,[],{"lastPreviewUrl":37,"breakpoints":2053,"kind":36,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},{"createdDate":2055,"id":2056,"name":2057,"modelId":2028,"published":13,"query":2058,"data":2059,"variations":2062,"lastUpdated":2063,"firstPublished":2064,"testRatio":33,"createdBy":333,"lastUpdatedBy":333,"folders":2065,"meta":2066,"rev":2039},1770121696534,"d00fd3238a6845fda35a50549fc7f62c","Accelerate response",[],{"heading":2057,"link":2060,"subtext":2061},{"url":1572},"\u003Cp>See in-browser activity instantly to understand what happened, limit blast radius, and contain breaches faster.\u003C/p>\n",{},1770123754401,1770121744739,[],{"kind":36,"lastPreviewUrl":37,"breakpoints":2067,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},{"createdDate":2069,"id":2070,"name":2071,"modelId":2028,"published":13,"query":2072,"data":2073,"variations":2076,"lastUpdated":2077,"firstPublished":2078,"testRatio":33,"createdBy":333,"lastUpdatedBy":333,"folders":2079,"meta":2080,"rev":2039},1770121753694,"2f2e1aa7e4e64f03b07532e3a0f16300","Block risky extensions",[],{"subtext":2074,"heading":2071,"link":2075},"\u003Cp>Gain visibility into risky or malicious add-ons across your workforce.\u003C/p>\n",{"url":1097},{},1770123765023,1770121810644,[],{"kind":36,"lastPreviewUrl":37,"breakpoints":2081,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},{"createdDate":2083,"id":2084,"name":2085,"modelId":2028,"published":13,"query":2086,"data":2087,"variations":2090,"lastUpdated":2091,"firstPublished":2092,"testRatio":33,"createdBy":333,"lastUpdatedBy":333,"folders":2093,"meta":2094,"rev":2039},1770121838291,"ce0507dc8c0b43f38937a16ab9727520","Prevent takeovers",[],{"heading":2085,"link":2088,"subtext":2089},{"url":1216},"\u003Cp>Stop ATO with stolen credential and compromised token detection.\u003C/p>\n",{},1770123775906,1770121877597,[],{"kind":36,"lastPreviewUrl":37,"breakpoints":2095,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},{"createdDate":2097,"id":2098,"name":2099,"modelId":2028,"published":13,"query":2100,"data":2101,"variations":2104,"lastUpdated":2105,"firstPublished":2106,"testRatio":33,"createdBy":333,"lastUpdatedBy":333,"folders":2107,"meta":2108,"rev":2039},1770121901807,"68b72bbe3c704e4aaa25bf8f274953f1","Harden attack paths",[],{"heading":2099,"link":2102,"subtext":2103},{"url":1334},"\u003Cp>Eliminate weak passwords, ghost logins, and missing MFA at scale.\u003C/p>\n",{},1770123788957,1770121921966,[],{"lastPreviewUrl":37,"kind":36,"breakpoints":2109,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},{"createdDate":2111,"id":2112,"name":1820,"modelId":2028,"published":13,"query":2113,"data":2114,"variations":2117,"lastUpdated":2118,"firstPublished":2119,"testRatio":33,"createdBy":333,"lastUpdatedBy":333,"folders":2120,"meta":2121,"rev":2039},1770121948403,"7ca42a8088c2408b8ce52c58970c4d3c",[],{"link":2115,"subtext":2116,"heading":1820},{"url":1811},"\u003Cp>Map, review, and classify AI applications across your environment to enforce AI usage policies.\u003C/p>\n",{},1770123799454,1770121968041,[],{"kind":36,"lastPreviewUrl":37,"breakpoints":2122,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},1776343280003]