New Features Introduced in October 2024
Focus
Focus
SaaS Security

New Features Introduced in October 2024

Table of Contents

New Features Introduced in October 2024

Learn about the new features that became available in SaaS Security starting October 2024.
The following new features were introduced for SaaS Security in October 2024. Refer to the Administrator’s Guide for more information on how to use Data Security, SaaS Security Inline, SaaS Security Posture Management (SSPM), and Behavior Threats.

View Salesforce Account Risks

Managing identity risks across human and non-human accounts in SaaS applications like Salesforce can be challenging. To help you maintain strong identity posture, the Identity Security component in SaaS Security Posture Management now gives you visibility into account risks in your Salesforce instance.
Previously, the Identity Security component introduced the ability to identify problems with your multi-factor authentication (MFA) implementation, including MFA enrollment and sign-in issues. Now, the Identity Security component also gives you visibility into Salesforce account risks for human and non-human accounts. Human accounts are associated with an individual who accesses Salesforce through a web interface with ID and password credentials. Nonhuman accounts are typically services that authenticate to a Salesforce API by using a token or an API key.
By connecting to your Salesforce instance, the Identity Security component helps you identify the following account risks so you can take action:
  • Human accounts that have not been accessed for a specified period.
  • Accounts that have not had their credentials rotated for a specified period.
  • Human accounts that have excessive permissions.
By connecting to your identity provider, the Identity Security component also helps you identify local Salesforce accounts, which are accounts that were not created through your identity provider.

Configure Google Drive Labeling

Security teams often struggle with the manual and fragmented nature of data classification, where inconsistent labeling practices in platforms like Google Drive hinder effective policy enforcement and result in data security gaps. Google Drive labels, integrated with SaaS Security, solves this by providing precise control over data classification at the source. This capability gives data security administrators the power to create rules that enforce specific values for badged fields directly within Google Drive, ensuring sensitive data receives accurate, app-native classification upon creation or modification.
You gain critical visibility by being able to efficiently filter all Google Drive assets based on these enforced badged field values. This granular filtering power is essential for rapid policy enforcement, comprehensive auditing, and streamlining compliance efforts. By integrating classification enforcement directly within the Data Security platform, you reduce the risk of manual misclassification and maintain a robust, consistent security posture across all your cloud collaboration assets.

Configure Phishing Analysis

The rapid exchange of messages in collaboration platforms like Microsoft Teams makes it easy for malicious and phishing URLs to spread undetected, posing a significant risk of internal compromise and data theft. Automated Phishing Analysis, powered by Data Security in SaaS Security, eliminates this threat by providing immediate and automated detection and neutralization of malicious and phishing URLs present within chat and channel messages. This feature is currently available exclusively for Microsoft Teams, ensuring maximum protection where quick link sharing poses the greatest danger.
As an administrator, you gain the ability to configure precise policies that automatically neutralize these threats in real time, preventing users from clicking on known or emerging risks. By integrating this powerful threat intelligence directly into your Data Security workflows, you reduce the organization's overall threat exposure, minimize manual incident response time, and maintain a robust, automated defense against internal phishing campaigns.