Demo Request
Take a personalized product tour with a member of our team to see how we can help make your existing security teams and tools more effective within minutes.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Home
Blog

SolarEdge Leverages Reco to Improve their SaaS Security Posture

Reco Security Experts
Updated
March 25, 2024
May 20, 2025
3 min read
Ready to Close the SaaS Security Gap?
Chat with us

SolarEdge, a global leader in solar power solutions with a presence in 140 countries and a commitment to sustainability, leverages Reco to protect its proprietary IP and patents that need to be safeguarded. The company works with several SaaS applications such as Microsoft 365 on a daily basis, exchanging sensitive financial and customer information. This complex and sprawling environment’s security is critical for SolarEdge to not just secure, but continue securing for the future.

Reco had previously assisted SolarEdge in reducing the data exposure in their Google and Microsoft 365 environments by over 90%. However, SolarEdge’s security teams were often chasing alerts and wasting valuable hours bogged down by configuration drifts, manual processes, and other exposure risks in their SaaS environments. In order to move into a proactive posture for their SaaS configurations, SolarEdge needed to continuously address the root causes of their exposure risks with Reco.

Utilizing the posture management capabilities provided by the Reco SaaS security platform, SolarEdge was able to:

  • Easily satisfy compliance. Reco's access governance improvements and continuous monitoring in SaaS aligns with the highest security industry standards and regulations.
  • Reduce costs. The shift to continuous monitoring reduced SolarEdge’s need for manual proactive checks, saving the team tens of thousands of dollars annually.
  • Save time. Reco’s ‘How to Fix’ feature directly links to configuration access issues and has saved the team ~20 hours weekly in investigation and issue resolution. SolarEdge can now focus their time on other pressing needs. 

“Reco's SSPM has strengthened our security approach in SaaS,” said Tomer Stenzler, Director of Cyber Security at SolarEdge. “The Reco posture dashboard provided a seamless experience, enabling us to clearly understand where our posture gaps are. This intuitive platform not only highlighted misconfigurations but also offered straightforward steps for resolution, saving us invaluable time in the process.”

Read the full customer story of Reco and SolarEdge to learn more.

No items found.

Oz Wasserman

ABOUT THE AUTHOR

Technical Review by:
Gal Nakash
Technical Review by:
Oz Wasserman

Ready to Close the SaaS Security Gap?
Chat with us
Table of Contents
Get the Latest SaaS Security Insights
Subscribe to receive updates on the latest cyber security attacks and trends in SaaS Security.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Explore Related Posts

Closing the Context Gap: How Reco and Torq Automate the "Risky Employee" Investigation
Yaniv Blum
When an employee is flagged as a potential insider threat, traditional investigations can take analysts hours of manual cross-referencing across dozens of fragmented tools — but Reco and Torq's new Agent-to-Agent workflow changes that entirely. By combining Reco's deep SaaS identity intelligence with Torq's HyperSOC orchestration, the workflow autonomously pulls context from across the security stack — EDR, DLP, SASE, and cloud security — to deliver a confident, natural-language verdict in seconds. The result is fewer false positives, dramatically reduced MTTR, and analysts who can focus on remediation instead of chasing data.
Introducing Full AI Agent Visibility for SaaS
Andrea Bailiff-Gush
Organizations have thousands of AI agents operating across their SaaS environments, yet security teams have no visibility into what's running or what permissions these agents hold. AI agents create toxic combinations by connecting systems in ways that produce permission breakdowns traditional tools can't detect. Reco's AI agent security discovers every agent, maps the connections between systems, and gives teams control to manage risk.
Inside the ShinyHunters Experience Cloud Campaign: IOCs, Detection Logic, and What's at Risk
Nitay Bachrach
Reco is actively investigating a ShinyHunters campaign targeting organizations running Salesforce Experience Cloud sites with misconfigured guest user profiles. By exploiting publicly accessible Aura API endpoints, the threat actor claims to have compromised between 300 and 400 organizations — with cybersecurity companies deliberately targeted to enable downstream supply chain attacks. This post covers the campaign's IOCs, the detection logic needed to hunt for it in Salesforce Event Monitoring, and the underlying misconfiguration that makes it possible.
See more featured resources

Ready for SaaS Security that can keep up?

Request a demo