SaaS Security
SaaS Security Support Tables
Table of Contents
                    
          Expand All
          |
          Collapse All
        
        SaaS Security Docs
SaaS Security Support Tables
The following tables describe where and what you need to use SaaS
        Security.
    All SaaS Security
| Where Can I Use This? | What Do I Need? | 
|---|---|
| Data Security, SaaS Security Posture Management, and Behavior
                                    Threats: 
 SaaS Security Inline: 
 | One of the following SaaS Security licenses: 
 Or any of the following licenses that include one of the SaaS Security licenses: 
 | 
Data Security Support Table
| Where Can I Use This? | What Do I Need? | 
|---|---|
| 
 | 
 Or any of the following licenses that include the Data Security license: 
 | 
SaaS Security Inline Support Tables
| Where Can I Use This? | What Do I Need? | 
|---|---|
| 
 | 
 Or any of the following licenses that include the SaaS Security Inline license: 
 | 
| Where Can I Use This? | What Do I Need? | 
|---|---|
| 
 | 
 Or any of the following licenses that include the SaaS Security Inline license: 
 | 
| Where Can I Use This? | What Do I Need? | 
|---|---|
| 
 | 
 Or any of the following licenses that include the SaaS Security Inline license: 
 | 
| Where Can I Use This? | What Do I Need? | 
|---|---|
| 
 | 
 Or any of the following licenses that include the SaaS Security Inline license: 
 | 
| Where Can I Use This? | What Do I Need? | 
|---|---|
| 
 | 
 Or any of the following licenses that include the SaaS Security Inline license: 
 | 
SSPM Support Table
| Where Can I Use This? | What Do I Need? | 
|---|---|
| 
 | 
 Or any of the following licenses that include the Data Security license: 
 | 
Behavior Threats Support Table
| Where Can I Use This? | What Do I Need? | 
|---|---|
| 
 | Or any of the following licenses that include the Data Security license: 
 | 
