Prioritize Your
SaaS Security.
Start With
What’s Critical.

Uncover SaaS usage, perform vendor risk assessments, control user access.

Prioritize Your
SaaS Security.
Start With
What’s Critical.

Uncover SaaS usage, perform vendor risk assessments, control user access. Everything for only $1500 per year.

It’s as simple as 1-2-3

  • Discover your SaaS applications and supply chain

  • Get automated risk assessments for your SaaS

  • Manage your employees’ access levels and roles

We now have actionable visibility into our organization’s SaaS usage, eliminating rogue IT and ensuring a controlled SaaS environment. The coverage provided by Wing is great”.

Noam Vander, Fiverr

All we ask for are some basic permissions to work our magic!

Google

Allows Wing Security to discover all SaaS applications connected to your Google environment, their permissions, and usage. It also identifies all Google users and their actions. Wing will monitor your Google environment and raise any issues found to help protect it. You’ll be able to remediate these issues easily within Wing’s interface.

How to Connect

1. Should be connected by the super admin of the entire organization.
2. Follow the steps for OAuth authentication using Google (grant all the requested permissions).

Permissions
View delegated admin roles for your domain

View delegated admin roles that are currently defined for your domain.

View audit reports for your G Suite domain

View audit reports of admin and user activity in your G Suite domain (e.g. password change events and document view events).

View organization units on your domain

View metadata (e.g. name and description) of organization units.

See info about users on your domain

This app wants permissions to see profile info about your domain users, such as their: Names, Email, Addresses, Phone numbers, Metadata, including users’ role, manager info, and last login time.

Manage data access permissions for users on your domain

View and manage data access permissions for users on your domain. *We require this permission in order to find tokens users granted to 3rd party applications.

Office 365

Allows Wing Security to discover all SaaS applications connected to your Microsoft environment, their permissions, and usage. It also identifies all Microsoft users and their actions. Wing will monitor your Microsoft environment and raise any issues found to help protect it.

How to Connect

1. Should be connected by the admin of the entire organization.
2. Follow the steps for OAuth authentication using Office, while making sure to check the “Consent on behalf of your organization”.

Permissions
Sign you in and read your profile

Allows you to sign in to the app with your organizational account and let the app read your profile. It also allows the app to read basic company information.

Maintain access to data you have given access to

Allows the app to see and update the data you gave it access to, even when you are not currently using the app. This does not give the app any additional permissions.

Read activity data for your organization

Allows the app to read activity data for your organization.

Read all users’ full profiles

Allows the app to read user profiles without a signed-in user.

Read all audit log data

Allows the app to read and query your audit log activities, without a signed-in user.

Read directory data

Allows the app to read data in your organization’s directory, such as users, groups and apps, without a sign-in user.

Sign in and read user profile

Allows users to sign in to the app, and allows the app to read the profile of signed-in users. It also allows the app to read basic company information of signed-in users.

Click here for our Permissions Guide

Still have a few questions?

Which SSPM is Right For You?

Which SSPM is Right For You?

Need advanced SaaS Security?

With Wing Security’s full Enterprise Solution, you’ll be able to:

Eliminate Shadow IT and enhance security and compliance by eliminating unauthorized SaaS applications and users
Mitigate insider threats to avoid potential data breaches that could compromise your overall security posture
Leverage near real-time threat intelligence alerts while receiving actionable recommendations on how to handle them
Rapidly respond to SaaS-related threats by employing automated actions for effective remediation
Effectively manage your SaaS usage to ensure optimal resource utilization, bolster security, and streamline operations
Regain control of your SaaS layer by using SSPM to proactively manage your organization’s applications, users, and data

These features, and many others, are only available through our Enterprise Edition. Find out how Wing can help you by clicking HERE.

* Please read our privacy policy and terms of use. We are ISO and SOC2 compliant and use AWS infrastructure. Feel free to reach out with any questions, Contact us.
** Wing Security reserves the right to terminate this offer at any time without notice.

Need advanced SaaS Security?

With Wing Security’s full Enterprise Solution, you’ll be able to:

Eliminate Shadow IT and enhance security and compliance by eliminating unauthorized SaaS applications and users
Mitigate insider threats to avoid potential data breaches that could compromise your overall security posture
Leverage near real-time threat intelligence alerts while receiving actionable recommendations on how to handle them
Rapidly respond to SaaS-related threats by employing automated actions for effective remediation
Effectively manage your SaaS usage to ensure optimal resource utilization, bolster security, and streamline operations
Regain control of your SaaS layer by using SSPM to proactively manage your organization’s applications, users, and data

These features, and many others, are only available through our Enterprise Edition. Find out how Wing can help you by clicking HERE.

* Please read our privacy policy and terms of use. We are ISO and SOC2 compliant and use AWS infrastructure. Feel free to reach out with any questions, Contact us.
** Wing Security reserves the right to terminate this offer at any time without notice.

Trusted by

Trusted by