Demo Request
Take a personalized product tour with a member of our team to see how we can help make your existing security teams and tools more effective within minutes.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Home
Blog

Video: Salesforce Risks and How to Secure the Wild West of the Modern Enterprise

Andrea Bailiff-Gush
Updated
August 23, 2023
November 29, 2024
10 min read
Ready to Close the SaaS Security Gap?
Chat with us

SaaS is the most widely utilized technology, hosting critical data from hundreds of SaaS applications for the average organization. But enterprises face challenges with a lack of business context that could help them discern between potentially harmful activities and subtle indications within their SaaS applications.

Watch the Video

In this video, Reco Chief Product Officer, Gal Nakash and Head of Product Marketing, Andrea Bailiff-Gush discuss SaaS applications as the modern attack surface and share recommendations for how to fortify your security posture.

Key Points to Watch

  • 02:24 — The SaaS provider is responsible for securing SaaS data, but the user also has a level of responsibility. Many organizations consider this shared responsibility model for SaaS confusing, meaning organizations are not fully securing the SaaS assets they’re responsible for, putting their data at risk.
  • 05:17 — Like any other tool, SaaS applications like Salesforce have blind spots that can pose a risk of data leaking. Common risks associated with Salesforce include authorization vulnerabilities, insider threats, increased data exposure, and more.  
  • 07:03 — The way SaaS applications are utilized and secured within organizations can lead to a lack of control and visibility. Utilization among both internal and external users, limited access and distributed responsibilities can leave SaaS applications at risk of data exposure.
  • 08:50 — SaaS apps provide limited visibility into actual permissions. One of the most common ways for a data leak to happen is through overly permissioned users. This often occurs when admins and developers are unaware of which permissions do what, and why a user might need access in the first place.
  • 12:55 — To secure your SaaS application from this common misconfiguration, consider who has access and the purpose, what data is accessible, and the 3rd party applications connected to your SaaS application (and how the connection was established).

Learn how Reco provides visibility into every interaction between users and their data.

No items found.

Andrea Bailiff-Gush

ABOUT THE AUTHOR

Andrea is the Head of Marketing of Reco, responsible for driving demand and growth in SaaS security. Andrea is a cyber security veteran, having supported various security companies across various growth milestones, from Seed round to acquisition. She is passionate about growing businesses and teams to drive profitable outcomes and better well being for CISOs and security practitioners.

Technical Review by:
Gal Nakash
Technical Review by:
Andrea Bailiff-Gush

Andrea is the Head of Marketing of Reco, responsible for driving demand and growth in SaaS security. Andrea is a cyber security veteran, having supported various security companies across various growth milestones, from Seed round to acquisition. She is passionate about growing businesses and teams to drive profitable outcomes and better well being for CISOs and security practitioners.

Ready to Close the SaaS Security Gap?
Chat with us
Table of Contents
Get the Latest SaaS Security Insights
Subscribe to receive updates on the latest cyber security attacks and trends in SaaS Security.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Explore Related Posts

OpenClaw: The AI Agent Security Crisis Unfolding Right Now
Alon Klayman
OpenClaw, the viral open-source AI agent with over 135,000 GitHub stars, has triggered the first major AI agent security crisis of 2026 with multiple critical vulnerabilities, malicious marketplace exploits, and over 21,000 exposed instances. When employees connect these autonomous agents to corporate systems like Slack and Google Workspace, they create shadow AI with elevated privileges that traditional security tools can't detect. Reco's platform provides the visibility security teams need to identify OpenClaw integrations, audit permissions, and assess risk before incidents occur.
SaaS and AI Security Is Here: Reco Raises Series B to Dominate the Future of AI Usage in SaaS
Ofer Klein
After 400% growth, Reco raises $30M Series B to address the AI SaaS security gap, where traditional tools can't see the thousands of AI apps, agents, and integrations that now power modern enterprises. This round was led by Zeev Ventures, with participation from all our existing investors—Insight Partners, boldstart ventures, and Angular Ventures—and new corporate investors including Workday Ventures, TIAA Ventures, S Ventures, and Quadrille Capital.
When AI Becomes the Insider Threat: Understanding Risks in Modern SaaS Environments
Tal Shapira
As AI becomes deeply embedded across SaaS platforms, it is increasingly operating with trusted internal access once reserved for employees and service accounts. This article examines how AI can function as an insider threat, why these risks are harder to detect than traditional insider activity, and what signals security teams should watch for. It also explores common governance gaps, real-world scenarios, and practical approaches organizations can take to reduce AI-driven insider risk without limiting legitimate AI use.
See more featured resources

Ready for SaaS Security that can keep up?

Request a demo