Obsidian Security Description

Your SaaS applications are protected against data exposure, threats, and breaches. Secure Workday, Salesforce and Office 365 applications in minutes. SaaS is becoming a popular choice for companies that want to migrate their most critical business systems. Security teams lack the unified visibility they require to quickly detect and respond to threats. They cannot answer simple questions like: Who can access SaaS applications? Who are the privileged users Which accounts have been compromised? Who is sharing files with the public? Are applications following best practices? It is time for SaaS security to be improved. Obsidian is a simple but powerful security solution that protects SaaS applications. It is built around unified visibility and continuous monitoring as well as security analytics. Obsidian allows security teams to detect threats and protect their SaaS applications from breaches.

Integrations

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
Obsidian Security
Year Founded:
2017
Headquarters:
United States
Website:
www.obsidiansecurity.com

Media

Obsidian Security Screenshot 1
Recommended Products
CDPs: Build, Buy.. or Both? Icon
CDPs: Build, Buy.. or Both?

Collect, Unify & Connect Data Real-Time, Real Fast

Explore how a customer data platform can help to enhance your engineering team's efficiency and supercharge application performance.

Product Details

Platforms
SaaS

Obsidian Security Features and Options

Application Security Software

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

Endpoint Detection and Response (EDR) Software

Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis

Cloud Security Software

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Obsidian Security Lists