Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • DRAW

How Zscaler's Platform Manages Risks Associated with SaaS App Integrations

Truth in IT
01/27/2024
46
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Now, I talked about integrations in the SaaS platforms which many organizations aren't looking at, which is rather dangerous. If you think about these applications on the left, uh, any user can connect a third party application into that - giving example, something like Grammarly or Calendly, right? Let's say you want your sales guy and you want people to be able to look at your calendar and say, I want to book an appointment with you, right? That's a Calendly integration that needs to connect in to your SaaS platform on the left, either Office 365 or Google, and read stuff and then report out on it. So, that type of behavior can happen across any third party app. There's any number of third party open source applications that a user may try to allow to integrate into their Office 365 instance because they think it's going to make them more productive um so they might connect that. And then the question is, okay, what type of access does this third party have into your data? Can it read data? Is it sharing data? Is it vulnerable? Maybe it has been breached. So there's a lot of stuff going behind the scenes that organizations don't have visibility to, right? So um, being able to understand that is something that Zscaler allows you to do. We call it Zscaler AppTotal. Um, we allow you to find and understand these integrations that are happening kind of above your head if you think around the diagram, right? Uh, it's a, it's an app to app connection using API. We can scan your platform so we can scan Office, we can scan Google and tell you, here's all the risky integrations that users have connected into your environment. Um, and then what the risks are and then allow you to take actions to revoke that. It's very powerful to be able to understand the attack surface that may have been set up by users. We're just trying to be productive. Uh, but they actually have opened you your data up to tremendous risks.

Discover the power of Zscaler AppTotal in securing your SaaS applications with unparalleled visibility and control. Prevent risky third-party integrations like Grammarly and Calendly from compromising your data on platforms such as Office 365 and Google Workspace. Zscaler safeguards your information by identifying and assessing these connections, revealing potential vulnerabilities and data access points that could be exploited. Protect your organization's attack surface with Zscaler's cutting-edge API scanning technology, effectively managing the productive yet potentially hazardous apps added by employees. Trust Zscaler to mitigate hidden threats and ensure robust SaaS security through proactive monitoring and actionable insights. Secure your enterprise with Zscaler's advanced threat prevention and app-to-app connection oversight. Choose Zscaler for a defense-in-depth approach to SaaS protection.

Categories:
  • » Data Protection » Backup & Recovery
  • » Cybersecurity
  • » Webinar Library » Zscaler
Channels:
  • Zscaler Highlights: Reducing Risky User Behaviors
News:
Events:
Tags:
  • zscaler
  • security
  • dropbox
  • m365
  • shadowit
  • casb
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: How Zscaler's Platform Manages Risks Associated with SaaS App Integrations

              Upcoming Webinar Calendar

              • 05/12/2026
                01:00 PM
                05/12/2026
                Transforming Perceptions of AI Risks and Threats through Data Lineage Insights
                https://www.truthinit.com/index.php/channel/1895/transforming-perceptions-of-ai-risks-and-threats-through-data-lineage-insights/
              • 05/12/2026
                11:30 PM
                05/12/2026
                Implementing Effective Strategies for Active Directory Security and Data Protection
                https://www.truthinit.com/index.php/channel/1888/implementing-effective-strategies-for-active-directory-security-and-data-protection/
              • 05/13/2026
                01:00 AM
                05/13/2026
                Transforming the Black Box: Revealing AI Risks and Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1890/transforming-the-black-box-revealing-ai-risks-and-threats-through-data-lineage/
              • 05/13/2026
                05:00 AM
                05/13/2026
                Transforming Data Lineage: Revealing AI Risks and Hidden Threats
                https://www.truthinit.com/index.php/channel/1894/transforming-data-lineage-revealing-ai-risks-and-hidden-threats/
              • 05/19/2026
                01:00 PM
                05/19/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Deployment Phases
                https://www.truthinit.com/index.php/channel/1936/establishing-a-robust-ai-governance-framework-for-genai-throughout-deployment-phases/
              • 05/20/2026
                08:00 AM
                05/20/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle
                https://www.truthinit.com/index.php/channel/1937/establishing-a-robust-ai-governance-framework-for-genai-throughout-its-lifecycle/
              • 05/20/2026
                10:00 PM
                05/20/2026
                APAC: Establishing an AI Governance Framework for GenAI Throughout the Deployment Process
                https://www.truthinit.com/index.php/channel/1953/establishing-an-ai-governance-framework-for-genai-throughout-the-deployment-process/
              • 05/21/2026
                11:00 AM
                05/21/2026
                The Autonomous Era: Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/the-autonomous-era-orchestrating-a-resilient-enterprise/
              • 05/27/2026
                04:00 AM
                05/27/2026
                Rivoluziona i rischi dell'AI in opportunità con Netskope AI Security
                https://www.truthinit.com/index.php/channel/1925/rivoluziona-i-rischi-dellai-in-opportunità-con-netskope-ai-security/
              • 05/27/2026
                10:00 AM
                05/27/2026
                Harnessing AI: Transitioning from Illusion to Purposeful Mastery
                https://www.truthinit.com/index.php/channel/1924/harnessing-ai-transitioning-from-illusion-to-purposeful-mastery/
              • 05/28/2026
                01:00 PM
                05/28/2026
                AI in the Fast Lane: Effectively Managing AI Security for Small Teams
                https://www.truthinit.com/index.php/channel/1951/ai-in-the-fast-lane-effectively-managing-ai-security-for-small-teams/
              • 06/02/2026
                01:00 PM
                06/02/2026
                Spring of Satori: Delving into Recent Findings and the 2026 Threat Landscape
                https://www.truthinit.com/index.php/channel/1930/spring-of-satori-delving-into-recent-findings-and-the-2026-threat-landscape/
              • 06/04/2026
                02:00 AM
                06/04/2026
                Mastering the Unseen: Managing Shadow AI and Agentic MCP Traffic
                https://www.truthinit.com/index.php/channel/1948/mastering-the-unseen-managing-shadow-ai-and-agentic-mcp-traffic/
              • 06/16/2026
                07:00 AM
                06/16/2026
                Transforming Data Risk into Actionable Priorities: What to Address First
                https://www.truthinit.com/index.php/channel/1952/transforming-data-risk-into-actionable-priorities-what-to-address-first/

              Upcoming Events

              • May
                12

                Transforming Perceptions of AI Risks and Threats through Data Lineage Insights

                05/12/202601:00 PM ET
                • May
                  12

                  Implementing Effective Strategies for Active Directory Security and Data Protection

                  05/12/202611:30 PM ET
                  • May
                    13

                    Transforming the Black Box: Revealing AI Risks and Threats through Data Lineage

                    05/13/202601:00 AM ET
                    • May
                      13

                      Transforming Data Lineage: Revealing AI Risks and Hidden Threats

                      05/13/202605:00 AM ET
                      • May
                        19

                        Establishing a Robust AI Governance Framework for GenAI Throughout Deployment Phases

                        05/19/202601:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version