FAQ

Frequently Asked Questions

Have questions? We’re here to help.

Product and benefits

What is SSPM?

SSPM, or SaaS Security Posture Management, helps organizations gain control over their SaaS usage and ensure it's secure and compliant. Perimeters provides continuous monitoring of your SaaS applications, identities, and user devices, uncovering:

  • Misconfigurations: We identify security gaps in your SaaS settings to prevent data breaches and unauthorized access.
  • Weak Identity Security: We ensure users have the right access levels and prioritize high-risk users for enhanced security.
  • Uncontrolled 3rd Party Apps: We discover and assess the risk of connected apps, protecting you from shadow IT threats.
What are the key benefits of Perimeters?

Perimeters helps you achieve a holistic SaaS security posture with features like:

  • Automated Discovery: Uncover all SaaS applications used in your organization, including shadow IT.
  • Risk-based Prioritization: Focus on the most critical issues first, like misconfigured settings or high-risk user access.
  • Automated Remediation: Streamline the process of fixing security gaps and misconfigurations.
  • Compliance Mapping: Ensure your SaaS environment aligns with industry standards like SOC2 and NIST.
  • User Access Reviews: Simplify evidence collection and user access reviews for streamlined compliance.

Onboarding and usage

How do I get started with Perimeters?

Unlike some solutions, Perimeters doesn't require a free trial.  Instead, we offer a free demo where you can experience the platform firsthand.  Schedule a demo with our security experts to discuss your specific needs and see how Perimeters can help.

Why do you need access to connect to my SaaS applications?

Perimeters uses a secure, read-only connection via industry-standard OAuth protocols (e.g., Google/Microsoft) to discover your SaaS applications and user data. This allows us to provide you with valuable insights and identify potential security risks.

What type of access permissions do you require and why?

We prioritize your security and privacy. We request minimal permissions to function effectively. You can find a detailed list of requested permissions on our website.

Where does Perimeters store my data?

Your data is secure with Perimeters. We leverage secure AWS services located in the USA and adhere to strict security standards like ISO 27001 and SOC2 compliance.  For more information, please refer to our privacy policy.

Can I add team members to collaborate on reviews?

Absolutely! Perimeters allows you to easily add team members as collaborators during access reviews. This facilitates efficient collaboration and streamlines the review process.

Can I change user roles within Perimeters?

Currently, Perimeters doesn't allow direct user role changes within the platform. However, you can make changes in the relevant SaaS application and then update your Perimeters view to reflect the modifications.

Payment and service

How much does Perimeters cost?

Perimeters offers various pricing plans to fit your specific needs. We recommend scheduling a demo to discuss your requirements and receive a personalized quote.

How do I pay?

Once you've chosen the right Perimeters plan, you can pay securely within the platform itself. Our team is also available to assist you via the in-app "Help" chat option.

Can I try the product before buying?

While we don't offer a traditional free trial, scheduling a demo allows you to experience Perimeters' features and its value firsthand. Our security experts will guide you through the platform and address any questions you may have.