websights
5 Important Shadow IT Risks To Know About

5 Important Shadow IT Risks To Know About

While the term “Shadow IT” can include everything from employee-owned mobile devices to the ubiquitous Internet of Things (IoT), it typically refers to browser-based cloud applications and similar services, often simply referred to as “SaaS”. As organizations...
CSPM vs SSPM

CSPM vs SSPM

We often get asked how our product (an SSPM) compares to Cloud Security products such as CSPMs. At its core, this question surrounds the topic of what are the differences between SaaS security and Cloud security. Since they’re protecting two different aspects of...

Wing’s Basic Permissions Guide

Wing Security non-intrusively discovers the SaaS apps being used by anyone throughout your organization by viewing the SaaS related metadata of the Google or Microsoft sign-in that was used for logging in to those SaaS apps.  For Wing Security to view this SaaS...