Demo Request
Take a personalized product tour with a member of our team to see how we can help make your existing security teams and tools more effective within minutes.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Home
Blog

How UiPath Leverages Reco for SaaS Data Exposure Management

Reco Security Experts
Updated
December 9, 2024
December 17, 2024
4 min read
Ready to Close the SaaS Security Gap?
Chat with us

UiPath, a global leader in robotic process automation, partnered with Reco to enhance its data exposure management across SaaS platforms like Microsoft OneDrive, SharePoint, and Google Drive. In the beginning, they were having difficulty understanding the level of data exposure resulting from numerous shared drives, and exposing critical data to unauthorized access in the process.

UiPath initially tried to manage the issue with native Microsoft security tools and their Microsoft Sentinel SIEM. However, gaining a full understanding of UiPath’s SaaS environment was proving impossible with this method, so the Security team decided to look for an alternative solution, which led them to Reco. 

Once Reco was deployed, UiPath was immediately able to gain visibility into over-privileged data access to exposed files across SharePoint, OneDrive, and Google Drive. Reco’s contextual alerts fed into UiPath’s SIEM, and then allowed their automations to appropriately triage and act to reduce their exposure.

Utilizing the posture management and threat detection capabilities provided by the Reco SaaS security platform, UiPath was able to:

  • Enhance security posture. They gained visibility into over-privileged access and risky configurations and strengthened identity and access management controls.
  • Save time. Automating data exposure remediation efforts saved the team thousands of hours of manual effort, allowing the security team to focus on strategic initiatives instead of tedious tasks.
  • Increase the value of existing tools. By integrating Reco with Microsoft Sentinel SIEM, UiPath was able to mitigate risks in real time.
  • Reduce data exposure. By implementing the principle of least privilege across multiple SaaS shared drives using automated workflows, UiPath reduced its data exposure.

“We knew the power and capabilities of our robots, and how they could make our Sentinel SIEM more powerful. By automating the access removal process by passing Reco’s contextual detections to our SIEM, we have saved thousands of hours of work, reduced the risk of data exposure across multiple SaaS shared drives, and now continue to reduce data exposure risks. By gaining the intelligence needed to secure our data, we continue toward our constant goal of making digital transformation a reality in this partnership,” said UiPath CIO, Mihai Faur. 

Read the full story here.

No items found.

Reco Security Experts

ABOUT THE AUTHOR

Technical Review by:
Gal Nakash
Technical Review by:
Reco Security Experts

Ready to Close the SaaS Security Gap?
Chat with us
Table of Contents
Get the Latest SaaS Security Insights
Subscribe to receive updates on the latest cyber security attacks and trends in SaaS Security.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Explore Related Posts

Malicious Extensions That Lock You Out While They Steal Your Session
Dr. Tal Shapira
Five malicious Chrome extensions disguised as enterprise productivity tools stole session tokens from Workday, NetSuite, and SuccessFactors while simultaneously blocking admins from revoking access or resetting credentials. The attack exposed a blind spot in SaaS security: the browser, where stolen session cookies render SSO and MFA irrelevant.
Why the Hidden Cost of AI Sprawl Is Rising in Modern Enterprises
Gal Nakash
AI adoption is accelerating across modern enterprises, but the rapid growth of AI tools and agents often introduces hidden operational and security risks. This article explores the hidden cost of AI sprawl, including duplicate tools, fragmented workflows, and expanding SaaS integrations. It also outlines practical frameworks and best practices that help organizations detect uncontrolled AI adoption and maintain visibility, governance, and security across enterprise environments.
Model Context Protocol (MCP) Is Rewiring SaaS Trust, One Agent Action at a Time
Gal Nakash
The Model Context Protocol (MCP) is an emerging standard that enables AI agents to seamlessly connect with SaaS tools and APIs, allowing them to perform actions like fetching files, updating records, and sending messages autonomously. However, this power introduces significant security risks, including identity drift, weak authentication, data leakage, and invisible access that bypasses traditional monitoring. Organizations can mitigate these risks by enforcing least-privilege OAuth scopes, using short-lived tokens, binding agents to human owners, and adopting platforms that provide continuous visibility into MCP-based trust paths.
See more featured resources

Ready for SaaS Security that can keep up?

Request a demo