Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    The “Renewal Trap”: Mitigating the Hidden Data Liabilities of AI-Enabled SaaS Ecosystems

    April 2, 2026

    Why are ID Security Vendors Expanding into SaaS Security?

    April 1, 2026

    SaaSpocalypse and new security challenges

    March 31, 2026
    LinkedIn
    Infosec TechBuzz Thursday, April 2
    LinkedIn
    Get In Touch
    • About Us
    • Blog
    • Domains
      • Monitoring, Response & Threat Intelligence
      • Application, Data & Identity Protection
      • Infrastructure & Endpoint Security
      • Governance, Risk & Human-Centric Security
    Infosec TechBuzz
    Home » Why are ID Security Vendors Expanding into SaaS Security?
    Application, Data & Identity Protection

    Why are ID Security Vendors Expanding into SaaS Security?

    NikhilBy NikhilApril 1, 2026
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    This post explores why top identity vendors like Okta, CrowdStrike, and Microsoft are expanding into the SaaS stack to solve the “blind spots” created by autonomous AI agents, over-privileged non-human identities, and the 2026 certificate crunch

    Knock Knock, who is there?

    User

    User who?

    Malicious User!

    No, it is not an AI-written joke. Rather, it points out a key anomaly with identity security that has become a main reason for identity security vendors to expand into SaaS security: once you log in, unless you have risk systems, what you are doing remains no one’s concern until it is way too late. But this is not the only reason why ID security vendors are expanding into SaaS security.

    The second reason is also to do with visibility into user activity. Organizations no longer want one tool to manage the “who” (IAM) and another to manage the “what” (SSPM). The basic reason is that who and what in different buckets make no sense. The introduction of AI has queered the pitch further. Autonomous AI agents move between apps, call APIs, and make decisions on their own. They don’t “log in” in a way that IAM tools can easily track, and they don’t just “sit” in a SaaS app where SSPM tools can watch them. If your IAM tool sees a “successful login” and your SSPM tool sees “normal app settings,” both report green lights. But neither tool can see that an autonomous agent is currently “chaining” those two things together to move data from a secure database to a public Slack channel. The fragmentation itself creates a blind spot where the AI agent operates.

    The third is the most obvious continuation of the second: AI in everything everywhere all at once. Vendors are accordingly updating their products. The latest example is Salesforce, which has recently launched a new platform that brings together AI with CRM and voice, which is essentially a convergence of Contact Center as a Service (CCaaS) and CRM.  These AI agents can perform tasks, call APIs, and move data on their own, which has turned identity as the control plane. This has more to do with AI agents built to be “helpful.” To achieve this objective, they are often configured to inherit the full permissions of the user who launched them. If that user has “excess privilege” in a SaaS tool, the AI agent becomes a high-speed vector for data exfiltration. This is how dangerous this situation can get. This problem is also (un)fondly called the “confused deputy” problem.

    The fourth point is one we have already talked about: the absolute proliferation of Non-Human IDs. Most SaaS security leaks do not happen via a login page; they happen through over-privileged OAuth tokens that connect one app to another, such as a “notetaking” AI app having full read/write access to your corporate Slack. There is one more factor that increases the fun factor. SSL/TLS certificate validity has now been massively reduced. It is 200 days now and 47 days by 2029. Frankly, the manual management of these thousands of service accounts and bots is, to put it mildly, not an enviable job.

    The response

    We have already explained the primary reason for identity vendors moving into SaaS security. The vendors are moving into SSPM to gain “in-app” visibility by monitoring what a user actually does after they log in to ensure it matches their identity risk profile.

    Regarding “AI everywhere” and IAS-SSPM, identity vendors are already offering the SaaS-aware Identity Threat Detection and Response (ITDR) software. ITDR provides the “in-app” visibility required to monitor user behavior against an established risk profile. By treating identity as the core control plane, vendors can enforce Least Privilege across both humans and the AI integrations they spawn. This integration solves the confused deputy problem and enables real-time issue remediation.  For example, if an SSPM check identifies a misconfigured folder in Salesforce, the identity tool can immediately revoke the user’s session or force a re-authentication. This is especially important as newer laws, like the EU AI Act, make transparent audit trails and manual “kill switches” mandatory for autonomous agents classified as high-risk.  

    The visibility into active sessions allows organizations to identify and reclaim “zombie” accounts that are no longer being used. Enabling users to reclaim, downgrade, or reassign them so they are not paying for shelfware. This process is known as license harvesting.

    Regarding NHIs, Identity vendors are best positioned to govern these “identities,” by treating a Slack bot or an API key with the same lifecycle and governance rigor as an employee.

    In the following part, we will understand what players are entering the space, and how they are helping solve these issues.

    Vendor Landscape

    CrowdStrike remains a dominant force here due to its acquisition of Adaptive Shield, which it has rebranded into Falcon Shield. Its primary focus is on merging Endpoint/XDR telemetry with SaaS configurations. This allows the platform to detect when a compromised laptop is being used to alter global settings in a SaaS tenant, like disabling MFA or creating new global admins in Microsoft 365. The core capability here is SaaS Security Posture Management (SSPM), which continuously audits over 10,000 security settings across hundreds of apps to find “drift” from a secure baseline.

    QKS Group Principal Analyst Sujit Dubal elaborates, “The identity market is expanding into SaaS security because authentication alone is no longer an effective boundary of trust. Once access is granted, risk shifts to what users, agents, and integrations do inside the application estate. That makes SaaS activity, entitlement governance, and non-human identity control central to the future of identity security. The vendors gaining momentum will be those that treat identity not as a login layer, but as the runtime control plane for SaaS, AI agents, and interconnected enterprise workflows.”

    Okta has taken a different route by focusing on the active session rather than just the configuration. Its Okta Identity Security Posture product specializes in Universal Logout, which is a high-speed “kill switch.” If the product detects a session hijacking attempt or an anomalous IP change, it can simultaneously terminate the user’s active tokens across Slack, Salesforce, and Box. This effectively solves the “zombie session” problem, where a user is blocked at the front door but remains logged into their desktop SaaS apps for days.

    Microsoft Entra offers App Governance owing to the capabilities of its Cloud Access Security Broker (CASB). This product is specifically designed to hunt for “Shadow AI” and risky OAuth grants. Microsoft’s strategy is built on the fact that most SaaS breaches in 2026 involve a user inadvertently granting a third-party AI tool full read/write access to their email or files. Entra now treats these app-to-app permissions as “identities” that require the same governance as a human employee.

    Saviynt and SailPoint have both expanded from traditional Identity Governance (IGA) into Identity Security Posture Management (ISPM). Saviynt’s Identity Cloud is particularly strong at managing “Complex ERP” security, such as SAP or Oracle, where permissions are deeply nested and often invisible to standard security tools. SailPoint, meanwhile, has doubled down on Non-Human Identity (NHI) management, providing a dedicated dashboard to track the thousands of service accounts and bots that typically exist without oversight in large SaaS environments.

    VendorCore ProductPrimary SaaS CapabilityKey Security Target
    CrowdStrikeFalcon ShieldConfiguration HardeningSaaS Misconfigurations & XDR Integration
    OktaIdentity Security PostureUniversal Logout & Session KillActive Session Hijacking & Token Theft
    MicrosoftEntra App GovernanceOAuth & Shadow AI DiscoveryRisky Third-Party App Permissions
    SaviyntSaviynt Identity CloudDeep Entitlement VisibilityPrivilege Escalation in Complex ERPs
    SailPointIdentity Security CloudNHI & Bot GovernanceService Account & Machine Identity Sprawl
    2026 Certificate Validity Reduction AI Confused Deputy Problem Non-Human Identity Governance (NHI) SaaS License Harvesting
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Avatar
    Nikhil

    Related Posts

    The “Renewal Trap”: Mitigating the Hidden Data Liabilities of AI-Enabled SaaS Ecosystems

    April 2, 2026

    SaaSpocalypse and new security challenges

    March 31, 2026

    Security misses during SaaS procurement

    March 16, 2026
    Leave A Reply Cancel Reply

    Demo
    Top Posts

    Agentless monitoring: Trend or a passing fad?

    November 10, 2025

    QKS SPARK Matrix YoY Analysis for the In-App Protection Market 2023-2024

    June 18, 2025

    QKS SPARK Matrix YoY Analysis for The User Authentication Market 2023-2024

    June 27, 2025

    QKS SPARK Matrix YoY Analysis for Zero Trust Network Security Market 2023 vs 2024

    June 19, 2025
    Don't Miss
    Application, Data & Identity Protection

    The “Renewal Trap”: Mitigating the Hidden Data Liabilities of AI-Enabled SaaS Ecosystems

    By NikhilApril 2, 20260

    The introduction of AI means that SaaS renewals are no longer just about pricing and…

    Why are ID Security Vendors Expanding into SaaS Security?

    April 1, 2026

    SaaSpocalypse and new security challenges

    March 31, 2026

    Security misses during SaaS procurement

    March 16, 2026
    Stay In Touch
    • LinkedIn

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    Demo
    About Us
    About Us

    The buzz stops here

    A no-frills resource for professionals who want facts, not fluff. We cut through the noise to bring you what matters in cybersecurity, risk management, and compliance — straight to the point.

    LinkedIn
    Quick Links
    • Home
    • About Us
    • Blog
    Most Popular

    QKS SPARK Matrix YoY analysis for the DDoS mitigation market 2023-2024

    QKS SPARK Matrix YoY analysis for the insider risk management market 2023-2024

    QKS SPARK Matrix YoY analysis for the insider risk management market 2024-2025

    • Home
    • About Us
    • Blog
    © 2026 Designed by TechBuzz.Media | All Right Reserved.

    Type above and press Enter to search. Press Esc to cancel.