
Sign up to save your podcasts
Or


With hundreds or thousands of SaaS apps to secure with no traditional perimeter, Identity becomes the focal point for SaaS Security in the modern enterprise. Yet with Shadow IT, now recast as Business-Led IT, quickly becoming normal practice, it's more complicated than trying to centralize all identities with an Identity Provider (IdP) for Single Sign-On (SSO). So the question becomes, "How do you enable the business while still providing security oversight and governance?"
This segment is sponsored by Savvy. Visit https://securityweekly.com/savvy to learn more about them!
Show Notes: https://securityweekly.com/bsw-343
By Security Weekly Productions4.7
3535 ratings
With hundreds or thousands of SaaS apps to secure with no traditional perimeter, Identity becomes the focal point for SaaS Security in the modern enterprise. Yet with Shadow IT, now recast as Business-Led IT, quickly becoming normal practice, it's more complicated than trying to centralize all identities with an Identity Provider (IdP) for Single Sign-On (SSO). So the question becomes, "How do you enable the business while still providing security oversight and governance?"
This segment is sponsored by Savvy. Visit https://securityweekly.com/savvy to learn more about them!
Show Notes: https://securityweekly.com/bsw-343

2,009 Listeners

83 Listeners

651 Listeners

101 Listeners

1,020 Listeners

33 Listeners

28,411 Listeners

189 Listeners

139 Listeners

26,611 Listeners