{"id":24111,"date":"2024-03-07T16:00:44","date_gmt":"2024-03-08T00:00:44","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2024\/03\/07\/news-17841\/"},"modified":"2024-03-07T16:00:44","modified_gmt":"2024-03-08T00:00:44","slug":"news-17841","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2024\/03\/07\/news-17841\/","title":{"rendered":"\u200b\u200bSecure SaaS applications with Valence Security and Microsoft Security\u200b\u200b"},"content":{"rendered":"<p><strong>Credit to Author: Yoni Shohet| Date: Tue, 05 Mar 2024 17:00:00 +0000<\/strong><\/p>\n<p><em>This blog post is part of the Microsoft Intelligent Security Association <\/em><a href=\"https:\/\/aka.ms\/MISAguestblog\" target=\"_blank\" rel=\"noreferrer noopener\"><em>guest blog series<\/em><\/a><em>. <\/em><a href=\"https:\/\/aka.ms\/MISA\" target=\"_blank\" rel=\"noreferrer noopener\"><em>Learn more about MISA<\/em><\/a><em>.<\/em>\u202f&nbsp;<\/p>\n<p>Software as a service (SaaS) adoption has accelerated at a lightning speed, enabling collaboration, automation, and innovation for businesses large and small across every industry vertical\u2014from government, education, financial service to tech companies. Every SaaS application is now expanding its offering to allow better integration with the enterprise ecosystem and advanced collaboration features, becoming more of a &#8220;platform&#8221; than an &#8220;application.&#8221; To further complicate the security landscape, business users are managing these SaaS applications with little to no security oversight, creating a decentralized administration model. All this is leading to a growing risk surface with complex misconfigurations that can expose organization\u2019s identities, sensitive data, and business processes to malicious actors.&nbsp;<\/p>\n<p>To combat this challenge, Valence and <a href=\"https:\/\/www.microsoft.com\/security\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Security<\/a> work together to ensure that SaaS applications are configured according to the best security practices and improve the security posture of identities configured in each individual SaaS application. Together, Valence and Microsoft:&nbsp;&nbsp;<\/p>\n<ul>\n<li>Centrally manage SaaS identities permissions and access.<\/li>\n<li>Enforce strong authentication by ensuring proper MFA (multi-factor authentication) and SSO (single sign-on) enrollment and managing local SaaS users.<\/li>\n<li>Detect and revoke unauthorized non-human SaaS identities such as APIs, service accounts, and tokens.<\/li>\n<li>Incorporate SaaS threat detection capabilities to improve SaaS incident response.<\/li>\n<\/ul>\n<p>As most of the sensitive corporate data shifted from on-prem devices to the cloud, security teams need to ensure they manage the risks of how this data is being accessed and managed. Integrating Valence\u2019s SaaS Security with the Microsoft Security ecosystem now provides a winning solution.&nbsp;<\/p>\n<h2 class=\"wp-block-heading\" id=\"saas-applications-are-prime-targets\">SaaS applications are prime targets&nbsp;&nbsp;<\/h2>\n<p><a href=\"https:\/\/www.valencesecurity.com\/threat-labs\/saas-breach-guide\" target=\"_blank\" rel=\"noreferrer noopener\">Recent high profile breaches<\/a> have shown that attackers are targeting SaaS applications and are leveraging misconfigurations and human errors to gain high privilege access to sensitive applications and data. While many organizations have implemented SSO and MFA as their main line of defense when it comes to SaaS, recent <a href=\"https:\/\/www.valencesecurity.com\/resources\/blogs\/five-lessons-learned-from-oktas-support-site-breach\" target=\"_blank\" rel=\"noreferrer noopener\">major breaches have proven otherwise<\/a>. Attackers have identified that MFA fatigue, social engineering and targeting the SaaS providers themselves can bypass many of the existing mechanisms that security teams have put in place. These add to high-profile breaches where attackers leveraged legitimate third-party open authorization (<a href=\"https:\/\/www.valencesecurity.com\/resources\/blogs\/five-lessons-learned-from-oktas-support-site-breach\" target=\"_blank\" rel=\"noreferrer noopener\">OAuth<\/a>) tokens to gain unauthorized access to SaaS applications, and many more attack examples.&nbsp;<\/p>\n<h2 class=\"wp-block-heading\" id=\"state-of-saas-security-risks\">State of SaaS security risks&nbsp;<\/h2>\n<p>According to our <a href=\"https:\/\/www.valencesecurity.com\/lp\/2023-state-of-saas-security\" target=\"_blank\" rel=\"noreferrer noopener\">2023 SaaS Security Report<\/a> which analyzed real SaaS environments to measure their security posture before they implemented an effective SaaS security program. The results showed that every organization didn\u2019t enforce MFA on 100% of their identities\u2014there are some exceptions, such as service accounts, contractors, and shared accounts, or simply lack of effective monitoring of drift. In addition, one out of eight SaaS accounts are dormant and not actively used. Offboarding users is not only important to save costs, but attackers also like to target these accounts for account takeover attacks since they are typically less monitored. Other key stats were that 90% of externally shared files haven\u2019t been used by external collaborators for at least 90 days and that every organization has granted multiple third-party vendors organization-wide access to their emails, files, and calendars.&nbsp;<\/p>\n<figure data-wp-context=\"{ &quot;core&quot;: \t\t\t\t{ &quot;image&quot;: \t\t\t\t\t{   &quot;imageLoaded&quot;: false, \t\t\t\t\t\t&quot;initialized&quot;: false, \t\t\t\t\t\t&quot;lightboxEnabled&quot;: false, \t\t\t\t\t\t&quot;hideAnimationEnabled&quot;: false, \t\t\t\t\t\t&quot;preloadInitialized&quot;: false, \t\t\t\t\t\t&quot;lightboxAnimation&quot;: &quot;zoom&quot;, \t\t\t\t\t\t&quot;imageUploadedSrc&quot;: &quot;https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/02\/Picture1-2.png&quot;, \t\t\t\t\t\t&quot;imageCurrentSrc&quot;: &quot;&quot;, \t\t\t\t\t\t&quot;targetWidth&quot;: &quot;624&quot;, \t\t\t\t\t\t&quot;targetHeight&quot;: &quot;448&quot;, \t\t\t\t\t\t&quot;scaleAttr&quot;: &quot;&quot;, \t\t\t\t\t\t&quot;dialogLabel&quot;: &quot;Enlarged image&quot; \t\t\t\t\t} \t\t\t\t} \t\t\t}\" data-wp-interactive class=\"wp-block-image size-full wp-lightbox-container\"><img decoding=\"async\" data-wp-effect--setStylesOnResize=\"effects.core.image.setStylesOnResize\" data-wp-effect=\"effects.core.image.setButtonStyles\" data-wp-init=\"effects.core.image.initOriginImage\" data-wp-on--click=\"actions.core.image.showLightbox\" data-wp-on--load=\"actions.core.image.handleLoad\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/02\/Picture1-2.webp\" alt=\"Valence Security 2023 SaaS Security Report Top Gaps\" class=\"wp-image-133492 webp-format\" srcset=\"\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/02\/Picture1-2.webp\"><button \t\t\tclass=\"lightbox-trigger\" \t\t\ttype=\"button\" \t\t\taria-haspopup=\"dialog\" \t\t\taria-label=\"Enlarge image: Valence Security 2023 SaaS Security Report Top Gaps\" \t\t\tdata-wp-on--click=\"actions.core.image.showLightbox\" \t\t\tdata-wp-style--right=\"context.core.image.imageButtonRight\" \t\t\tdata-wp-style--top=\"context.core.image.imageButtonTop\" \t\t> \t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\"> \t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/> \t\t\t<\/svg> \t\t<\/button>        <\/p>\n<div data-wp-body=\"\" class=\"wp-lightbox-overlay zoom\"             data-wp-bind--role=\"selectors.core.image.roleAttribute\"             data-wp-bind--aria-label=\"selectors.core.image.dialogLabel\"             data-wp-class--initialized=\"context.core.image.initialized\"             data-wp-class--active=\"context.core.image.lightboxEnabled\"             data-wp-class--hideAnimationEnabled=\"context.core.image.hideAnimationEnabled\"             data-wp-bind--aria-modal=\"selectors.core.image.ariaModal\"             data-wp-effect=\"effects.core.image.initLightbox\"             data-wp-on--keydown=\"actions.core.image.handleKeydown\"             data-wp-on--touchstart=\"actions.core.image.handleTouchStart\"             data-wp-on--touchmove=\"actions.core.image.handleTouchMove\"             data-wp-on--touchend=\"actions.core.image.handleTouchEnd\"             data-wp-on--click=\"actions.core.image.hideLightbox\"             tabindex=\"-1\"             >                 <button type=\"button\" aria-label=\"Close\" style=\"fill: #000\" class=\"close-button\" data-wp-on--click=\"actions.core.image.hideLightbox\">                     <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" width=\"20\" height=\"20\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M13 11.8l6.1-6.3-1-1-6.1 6.2-6.1-6.2-1 1 6.1 6.3-6.5 6.7 1 1 6.5-6.6 6.5 6.6 1-1z\"><\/path><\/svg>                 <\/button>                 <\/p>\n<div class=\"lightbox-image-container\">\n<figure class=\"wp-block-image size-full responsive-image\"><img decoding=\"async\" data-wp-bind--src=\"context.core.image.imageCurrentSrc\" data-wp-style--object-fit=\"selectors.core.image.lightboxObjectFit\" src=\"\" alt=\"Valence Security 2023 SaaS Security Report Top Gaps\" class=\"wp-image-133492 webp-format\" srcset=\"\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/02\/Picture1-2.webp\"><\/figure>\n<\/p><\/div>\n<div class=\"lightbox-image-container\">\n<figure class=\"wp-block-image size-full enlarged-image\"><img decoding=\"async\" data-wp-bind--src=\"selectors.core.image.enlargedImgSrc\" data-wp-style--object-fit=\"selectors.core.image.lightboxObjectFit\" src=\"\" alt=\"Valence Security 2023 SaaS Security Report Top Gaps\" class=\"wp-image-133492 webp-format\" srcset=\"\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/02\/Picture1-2.webp\"><\/figure>\n<\/p><\/div>\n<div class=\"scrim\" style=\"background-color: #fff\" aria-hidden=\"true\"><\/div>\n<\/p><\/div>\n<\/figure>\n<p><em>Figure 1. Top SaaS Security gaps identified in the 2023 State of SaaS Security Report<\/em>.<\/p>\n<h2 class=\"wp-block-heading\" id=\"holistic-saas-security-strategy\">Holistic SaaS security strategy&nbsp;<\/h2>\n<p>Establishing a holistic SaaS security strategy requires to bring together many elements\u2014from shadow SaaS discovery, through strong authentication, <a href=\"https:\/\/www.valencesecurity.com\/use-cases\/saas-identity-security\" target=\"_blank\" rel=\"noreferrer noopener\">identity management<\/a> of both humans and non-humans, managing and remediating SaaS misconfigurations, enforcing data leakage prevention policies, and finally, establishing scalable incident response. Valence and Microsoft take security teams one step further toward a more holistic approach.&nbsp;<\/p>\n<p>Valence joined the Microsoft Intelligence Security Association (MISA) and integrated with Microsoft security products\u2014<a href=\"https:\/\/www.microsoft.com\/security\/business\/identity-access\/microsoft-entra-id\">Microsoft Entr<\/a><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/siem-and-xdr\/microsoft-sentinel\">a ID<\/a> and \u200b\u200b\u200b\u200b<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/siem-and-xdr\/microsoft-sentinel\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Sentinel<\/a>\u2014to enhance&nbsp;customers\u2019 capabilities to <a href=\"https:\/\/www.valencesecurity.com\/resources\/blogs\/valence-integrates-with-azure-ad\" target=\"_blank\" rel=\"noreferrer noopener\">manage their SaaS risks<\/a>, effectively remediate them, and respond to SaaS breaches. The Valence SaaS Security Platform provides insight and context on SaaS risks such as misconfigurations, identities, data shares, and <a href=\"https:\/\/www.valencesecurity.com\/use-cases\/saas-integration-governance\" target=\"_blank\" rel=\"noreferrer noopener\">SaaS-to-SaaS integrations<\/a>. Extending existing controls with SaaS Security Posture Management (SSPM) capabilities and SaaS <a href=\"https:\/\/www.valencesecurity.com\/platform\/automated-remediation\" target=\"_blank\" rel=\"noreferrer noopener\">risk remediation<\/a> capabilities.&nbsp;Valence is also a proud participant of the Partner Private Preview of <a href=\"https:\/\/www.microsoft.com\/security\/business\/ai-machine-learning\/microsoft-security-copilot\">Microsoft Copilot for Security<\/a>. This involves working with Microsoft product teams to help shape Copilot for Security product development in several ways, including validation and refinement of new and upcoming scenarios, providing feedback on product development and operations to be incorporated into future product releases, and validation and feedback of APIs to assist with Copilot for Security\u2019s extensibility.&nbsp;<\/p>\n<figure data-wp-context=\"{ &quot;core&quot;: \t\t\t\t{ &quot;image&quot;: \t\t\t\t\t{   &quot;imageLoaded&quot;: false, \t\t\t\t\t\t&quot;initialized&quot;: false, \t\t\t\t\t\t&quot;lightboxEnabled&quot;: false, \t\t\t\t\t\t&quot;hideAnimationEnabled&quot;: false, \t\t\t\t\t\t&quot;preloadInitialized&quot;: false, \t\t\t\t\t\t&quot;lightboxAnimation&quot;: &quot;zoom&quot;, \t\t\t\t\t\t&quot;imageUploadedSrc&quot;: &quot;https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/02\/Valence-Security-Microsoft-Security-blog-image-2-1.png&quot;, \t\t\t\t\t\t&quot;imageCurrentSrc&quot;: &quot;&quot;, \t\t\t\t\t\t&quot;targetWidth&quot;: &quot;6720&quot;, \t\t\t\t\t\t&quot;targetHeight&quot;: &quot;3756&quot;, \t\t\t\t\t\t&quot;scaleAttr&quot;: &quot;&quot;, \t\t\t\t\t\t&quot;dialogLabel&quot;: &quot;Enlarged image&quot; \t\t\t\t\t} \t\t\t\t} \t\t\t}\" data-wp-interactive class=\"wp-block-image size-full wp-lightbox-container\"><img decoding=\"async\" data-wp-effect--setStylesOnResize=\"effects.core.image.setStylesOnResize\" data-wp-effect=\"effects.core.image.setButtonStyles\" data-wp-init=\"effects.core.image.initOriginImage\" data-wp-on--click=\"actions.core.image.showLightbox\" data-wp-on--load=\"actions.core.image.handleLoad\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/02\/Valence-Security-Microsoft-Security-blog-image-2-1.webp\" alt=\"Valence SaaS Security Platform\" class=\"wp-image-133565 webp-format\" srcset=\"\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/02\/Valence-Security-Microsoft-Security-blog-image-2-1.webp\"><button \t\t\tclass=\"lightbox-trigger\" \t\t\ttype=\"button\" \t\t\taria-haspopup=\"dialog\" \t\t\taria-label=\"Enlarge image: Valence SaaS Security Platform\" \t\t\tdata-wp-on--click=\"actions.core.image.showLightbox\" \t\t\tdata-wp-style--right=\"context.core.image.imageButtonRight\" \t\t\tdata-wp-style--top=\"context.core.image.imageButtonTop\" \t\t> \t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\"> \t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/> \t\t\t<\/svg> \t\t<\/button>        <\/p>\n<div data-wp-body=\"\" class=\"wp-lightbox-overlay zoom\"             data-wp-bind--role=\"selectors.core.image.roleAttribute\"             data-wp-bind--aria-label=\"selectors.core.image.dialogLabel\"             data-wp-class--initialized=\"context.core.image.initialized\"             data-wp-class--active=\"context.core.image.lightboxEnabled\"             data-wp-class--hideAnimationEnabled=\"context.core.image.hideAnimationEnabled\"             data-wp-bind--aria-modal=\"selectors.core.image.ariaModal\"             data-wp-effect=\"effects.core.image.initLightbox\"             data-wp-on--keydown=\"actions.core.image.handleKeydown\"             data-wp-on--touchstart=\"actions.core.image.handleTouchStart\"             data-wp-on--touchmove=\"actions.core.image.handleTouchMove\"             data-wp-on--touchend=\"actions.core.image.handleTouchEnd\"             data-wp-on--click=\"actions.core.image.hideLightbox\"             tabindex=\"-1\"             >                 <button type=\"button\" aria-label=\"Close\" style=\"fill: #000\" class=\"close-button\" data-wp-on--click=\"actions.core.image.hideLightbox\">                     <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" width=\"20\" height=\"20\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M13 11.8l6.1-6.3-1-1-6.1 6.2-6.1-6.2-1 1 6.1 6.3-6.5 6.7 1 1 6.5-6.6 6.5 6.6 1-1z\"><\/path><\/svg>                 <\/button>                 <\/p>\n<div class=\"lightbox-image-container\">\n<figure class=\"wp-block-image size-full responsive-image\"><img decoding=\"async\" data-wp-bind--src=\"context.core.image.imageCurrentSrc\" data-wp-style--object-fit=\"selectors.core.image.lightboxObjectFit\" src=\"\" alt=\"Valence SaaS Security Platform\" class=\"wp-image-133565 webp-format\" srcset=\"\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/02\/Valence-Security-Microsoft-Security-blog-image-2-1.webp\"><\/figure>\n<\/p><\/div>\n<div class=\"lightbox-image-container\">\n<figure class=\"wp-block-image size-full enlarged-image\"><img decoding=\"async\" data-wp-bind--src=\"selectors.core.image.enlargedImgSrc\" data-wp-style--object-fit=\"selectors.core.image.lightboxObjectFit\" src=\"\" alt=\"Valence SaaS Security Platform\" class=\"wp-image-133565 webp-format\" srcset=\"\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/02\/Valence-Security-Microsoft-Security-blog-image-2-1.webp\"><\/figure>\n<\/p><\/div>\n<div class=\"scrim\" style=\"background-color: #fff\" aria-hidden=\"true\"><\/div>\n<\/p><\/div>\n<\/figure>\n<p><em>Figure 2. Illustrative data: The Valence Platform provides a single pane of glass to find and fix SaaS risk across four core use cases: data protection, SaaS to SaaS governance, identity security, and configuration management.<\/em>&nbsp;<\/p>\n<h2 class=\"wp-block-heading\" id=\"secure-saas-human-and-non-human-identities\">Secure SaaS human and non-human identities<\/h2>\n<p>In the modern identity-first environment, most attackers focus on targeting high privilege users, dormant accounts, and other risks. Enforcing zero trust access has become a core strategy for many security teams. Security teams need to identify all the identities they need to secure.&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/business\/identity-access\/microsoft-entra-single-sign-on\">Microsoft Entra SSO<\/a> management combined with Valence\u2019s SaaS application monitoring\u2014to detect accounts created\u2014provides a holistic view into human identities and non-human (Enterprise Applications, service accounts, APIs, OAuth and 3rd party apps).&nbsp;&nbsp;<\/p>\n<p>Microsoft Entra ID centrally enforces strong authentication such as MFA and Valence discovers enforcement gaps or users that are not managed by the central SSO. Valence also monitors the SaaS applications themselves to discover the privileges granted to each identity and provides recommendations on how to enforce least privilege with minimal administrative access. To continuously validate verification based on risks, the final piece of zero trust strategy, Valence <a href=\"https:\/\/www.valencesecurity.com\/resources\/blogs\/detecting-risky-behavior-with-microsoft-and-valence\" target=\"_blank\" rel=\"noreferrer noopener\">leverages the risky users and service principals signals<\/a> from Microsoft Entra ID and combines them with signals from other SaaS applications for a holistic view into identity risks.&nbsp;<\/p>\n<h2 class=\"wp-block-heading\" id=\"protect-saas-applications\">Protect SaaS applications&nbsp;<\/h2>\n<p>Microsoft has a wide SaaS offering that is fueling enterprise innovation. These services are central to core business functions and employee collaboration, cover many use cases, and are spread across multiple business units, but are tied together in many cases such as identity and access management, and therefore their security posture is often related as well. Managing the security posture of SaaS services can be complex because of the multiple configurations and the potential cross service effects that require security teams to build their expertise across a wide range of SaaS.&nbsp;&nbsp;<\/p>\n<p>Many security teams view SaaS apps as part of their more holistic view into SaaS security posture management and would like to create cross-SaaS security policies and enforce them. Valence\u2019s platform integrates with Microsoft Entra ID and other SaaS services using Microsoft via Microsoft Graph to normalize the complex data sets and enable security teams to closely monitor the security posture of their SaaS applications in Microsoft alongside the rest of their SaaS environment.&nbsp;<\/p>\n<h2 class=\"wp-block-heading\" id=\"enhance-saas-threat-detection-and-incident-response\">Enhance SaaS threat detection and incident response&nbsp;<\/h2>\n<p>Improving SaaS security posture proactively reduces the chances of a breach, but unfortunately SaaS breaches can still occur, and organizations need to prepare their threat detection coverage and incident response plans. The built in human and non-human identity threat detection capabilities of Microsoft Entra ID, <a href=\"https:\/\/www.valencesecurity.com\/resources\/blogs\/empowering-saas-incident-response-with-valence-and-microsoft-sentinel\" target=\"_blank\" rel=\"noreferrer noopener\">combined with Microsoft Sentinel<\/a> log correlation and security automation, and Microsoft Copilot for Security\u2019s advanced AI capabilities, create a powerful combination to detect and respond to threats. Valence expands existing detections from compromised endpoint and identity with important SaaS context\u2014for example, did the compromise device belong to a SaaS admin user? Did the compromised identity perform suspicious activities in other SaaS applications? The expanded detections provide critical insights to prioritize and assess the blast radius of breaches. Additionally, Valence\u2019s SaaS threat detection can trigger threat detection workflows in Microsoft products based on its unique indicator of compromise monitoring.&nbsp;<\/p>\n<p>Together, Valence and Microsoft combine the best of all worlds when it comes to SaaS security. From SaaS discovery, through SaaS security posture management, remediating risks, and detecting threats\u2014Valence and Microsoft enable secure adoption of SaaS applications. Modern SaaS risks and security challenges require a holistic view into <a href=\"https:\/\/www.valencesecurity.com\/platform\/saas-risk-management\" target=\"_blank\" rel=\"noreferrer noopener\">SaaS risk management<\/a> and remediation. <a href=\"https:\/\/www.valencesecurity.com\/demo\" target=\"_blank\" rel=\"noreferrer noopener\">Get started today<\/a>.&nbsp;<\/p>\n<h2 class=\"wp-block-heading\" id=\"about-valence-security\">About Valence Security&nbsp;<\/h2>\n<p>Valence is a leading SaaS security company that combines SSPM and advanced remediation with business user collaboration to find and fix SaaS security risks. SaaS applications are becoming decentrally managed and more complex, which is introducing misconfiguration, identity, data, and SaaS-to-SaaS integration risks. The Valence SaaS Security Platform provides visibility and remediation capabilities for business-critical SaaS applications. With Valence, security teams can empower their business to securely adopt SaaS. Valence is backed by leading cybersecurity investors like Microsoft\u2019s M12 and YL Ventures, and is trusted by leading organizations. Valence is available for purchase through <a href=\"https:\/\/azuremarketplace.microsoft.com\/en-us\/marketplace\/apps\/valencesecurityinc1673598943514.valance_security_platform?tab=Overview\" target=\"_blank\" rel=\"noreferrer noopener\">Azure Marketplace<\/a>. For more information, visit their <a href=\"http:\/\/www.valencesecurity.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">website<\/a>.\u00a0<\/p>\n<p>Be among the first to hear about new products, capabilities, and offerings at Microsoft Secure digital event on March 13, 2024.\u200b\u202fLearn from industry luminaries and influencers. <a href=\"https:\/\/mssecure.eventcore.com\/?ocid=cmmh353yyg6\" target=\"_blank\" rel=\"noreferrer noopener\">Register today<\/a>.<\/p>\n<h2 class=\"wp-block-heading\" id=\"learn-more\">Learn more<\/h2>\n<p>To learn more about the Microsoft Intelligent Security Association (MISA), visit\u202four <a href=\"https:\/\/aka.ms\/MISA\" target=\"_blank\" rel=\"noreferrer noopener\">website<\/a> where you can learn about the MISA program, product integrations, and find MISA members. Visit the <a href=\"https:\/\/www.youtube.com\/playlist?list=PL3ZTgFEc7LyuEBQ_f-hBZXpbKHItlAd5-\" target=\"_blank\" rel=\"noreferrer noopener\">video playlist<\/a> to learn about the strength of member\u202fintegrations\u202fwith Microsoft products.\u202f<\/p>\n<p>\u200b\u200bTo learn more about Microsoft Security solutions, visit our\u202f<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\" target=\"_blank\" rel=\"noreferrer noopener\">website.<\/a> Bookmark the\u202f<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security blog<\/a>\u202fto keep up with our expert coverage on security matters. Also, follow us on LinkedIn (<a href=\"https:\/\/www.linkedin.com\/showcase\/microsoft-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Security<\/a>) and X (<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>)\u202ffor the latest news and updates on cybersecurity.&nbsp;<\/p>\n<p>The post <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/03\/05\/secure-saas-applications-with-valence-security-and-microsoft-security\/\">\u200b\u200bSecure SaaS applications with Valence Security and Microsoft Security\u200b\u200b<\/a> appeared first on <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/03\/05\/secure-saas-applications-with-valence-security-and-microsoft-security\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Yoni Shohet| Date: Tue, 05 Mar 2024 17:00:00 +0000<\/strong><\/p>\n<p>\u200bThe rapid adoption of Software as a Service (SaaS) has revolutionized collaboration and innovation across industries. SaaS offerings now emphasize integration and advanced collaboration, blurring the line between application and platform. Decentralized administration models and minimal security oversight pose risks, leading to complex misconfigurations. Valence and Microsoft Security address these challenges, ensuring SaaS applications adhere to security best practices and improve the security postures of identities configured in each individual SaaS application. \u200b<\/p>\n<p>The post <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/03\/05\/secure-saas-applications-with-valence-security-and-microsoft-security\/\">\u200b\u200bSecure SaaS applications with Valence Security and Microsoft Security\u200b\u200b<\/a> appeared first on <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[],"class_list":["post-24111","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24111","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=24111"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24111\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=24111"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=24111"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=24111"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}