Applications | Axonius SaaS Management
  • 15 Mar 2022
  • 3 Minutes to read
  • Dark
    Light
  • PDF

Applications | Axonius SaaS Management

  • Dark
    Light
  • PDF

The Axonius SaaS Management Applications module provides detailed insights into all the applications used in your organization. It will allow you to identify risky applications and prioritize risk analysis tasks. Insights include how each application is managed, information about the vendor, the level of risk posed by each application, and user profiles.
apps 1.png

Getting Started With Applications

From the left side navigation bar, click Applications:
apps 2.png

Vendor Security Practices Overview

The Compliances overview provides GRC professionals with an aggregate view of how vendors used in the organization fare in terms of the overall risk posed, stature, data security and integrity practices, and compliance with key data security standards.
apps 3.png

Click the Category drop-down to select the vendor type (e.g. Finance), or leave unchecked to view all.
apps 4.png

The compliance overview widgets include:

  • Risk division - The different levels of risk posed by vendors.
  • Compliance coverage - Per standard and showing compliance for different categories of vendors.
  • Data center location & HQ location - The locations of tracked vendors.
  • Company size to funding ratio - Data is shown for Small, Medium, or Large vendors.
  • Data retention - Across all applications, shown by duration and a percentage.
  • Data encryption - The percentage of vendors that encrypt data at rest, or both (at rest and in transit).
  • Bug bounty program - The percentage of vendors that have such programs.

SaaS Application Inventory

In this view you can see the applications that are in use in your organization.
apps 6.png

You can filter the list of applications by risk level and category, using the drop-downs at the top of the page.
apps 7.png

For each application in the view you can see the following information:

  • Application name.
  • Risk level - Low, Medium, High. The risk level is calculated by taking a wide range of parameters into consideration including product security, data security, compliance with relevant industry industry standards, publicly available reports and policies, the vendor’s geographic location, and more.
  • Managed by - An application can be managed either by an Axonius adapter or the organization’s SSO solution.
  • Managed Users - Users of managed applications, which are applications either connected to an Axonius adapter or managed by the organization using an SSO solution. Mouse over the label to see a breakdown by types of managed users.
  • Shadow users - Users of shadow (or unmanaged) applications. These applications are not connected to an Axonius adapter and not managed by the organization using a SSO solution. Mouse over the label to see a breakdown by type of shadow users.
  • Discovered - An application user that is discovered by means other than an adapter or an SSO solution.

Vendor Security Profile

Click any application to view security and compliance insights about the vendor.
By default, the Overview tab is displayed:
apps 8.png

Information shown on the left side of the page:

  • Managed by - How the application is managed, plus managed and shadow user counts.

Information shown on the main part of the page:

  • Compliance labels display the standards that the application complies with.
  • Under Policies and Reports are links to the relevant vendor web pages.
  • In the Product Security and Data Security lists, a green checkmark indicates that the security measure is in place. A question mark indicates that it has not been identified.
  • Under Events, we provide links to pages or articles that list or describe significant security events associated with the application.

Users

The Users view provides a detailed description of users of the application you selected.
apps 9.png

Use the following drop-down to filter the list of users:

  • Status - Active, Suspended, Deleted
  • Tags - Select Managed, Shadow, or Discovered users.
  • Account - Select the specific application user account that you wish to view.
  • Discovery method - The options are Adapter and SSO.
  • Date range - Enter the desired date range that you want to view.

First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.