Enterprises expected SaaS to simplify their IT infrastructure. In many ways, it did – but it also created an entirely new attack surface. Most departments now rely on a mix of sanctioned and unsanctioned SaaS applications – and even the sanctioned ones are often unmonitored for risk. This uncontrolled growth has evolved into a new form of Shadow IT: SaaS sprawl.
The rise of AI-powered SaaS tools has accelerated this trend even further. Users can now connect generative AI platforms to business applications like Google Drive, Slack, Microsoft OneDrive, CRM systems, and developer tools with just a few clicks – often without understanding the permissions being granted or the data being exposed.
While most organisations have adapted their identity and network controls for cloud usage, they are still unprepared for what has emerged behind the scenes: SaaS-to-SaaS integrations, AI-driven automations, OAuth permission chains, risky third-party plug-ins, and misconfigurations inside sanctioned apps.
The result is a scenario where security teams have minimal visibility and even less control.
Workers connect through:
Many of these tools integrate directly with core business systems like Office suites, CRM platforms, or cloud storage – often requesting broad access to files, messages, or user directories. These connections are established without network inspection, endpoint enforcement, or centralised security review.
When a SaaS application – or an AI-powered service – is compromised, attackers inherit the permissions it holds, which can expose:
AI tools amplify this risk because they are frequently granted read/write access to large datasets to function properly. Unlike traditional attacks, the movement happens entirely through API calls and OAuth tokens, not through the network. This means legacy tools – firewalls, SWGs, and endpoint security – simply cannot observe or interrupt the activity.
Security models built around “controlling what goes in and out of the network” break down when:
SaaS and AI-driven communications operate in a “blind zone” where network and endpoint tools have no telemetry.
The Cloud Security Alliance has estimated that misconfigurations account for the majority of SaaS incidents.
Examples include:
These errors are often hidden deep inside application settings, invisible to traditional security controls.
What enterprises need: A modern, technology-driven approach to SaaS security
SaaS security requires a shift from traditional perimeter or endpoint thinking toward application-layer visibility and control – especially as AI becomes embedded across the SaaS ecosystem. Securing modern SaaS environments requires:
Security teams need automated discovery that identifies:
This must happen continuously, not occasionally, because SaaS and AI ecosystems evolve daily.
Organisations need a way to:
Insight into each app’s configuration, permissions, and behaviour is foundational.
Enterprises need flexible control options such as:
This allows organisations to reduce risk without blocking legitimate productivity
If a SaaS application or AI integration becomes compromised, enterprises need the ability to:
This is critical as attackers often exploit OAuth chains and AI integrations rather than network paths.
Machine learning and behavioural analytics should identify:
Behavioural anomalies in SaaS and AI environments can be subtle and are not visible at the network level.
SaaS and AI-related incidents often require:
Automation helps security teams handle the scale and speed of SaaS environments
SaaS – now deeply intertwined with AI – has redefined the enterprise technology stack. Security must operate inside the application layer, where identity, permissions, data, APIs, and AI workflows converge.
A modern SaaS security approach includes:
Enterprises that adopt these architectural principles can finally regain control over SaaS sprawl and bring visibility and governance to the new frontier of Shadow IT.
Don't let it get to breaking point - get the experts in to keep things secure.
Get in touchAhmad Juliyanto via Vecteezy
"*" indicates required fields
Software Asset Management is a business practice that involves managing and optimising the life cycle of software within an organisation.
Software asset management is relevant to many facets of a business - take a look at some of the roles that it can form part of the focus of.
Software vendors come in all shape and sizes - all with their own set of licensing models and rules. We take a look at just a few of them.
As a constantly evolving subject, SAM is not without its challenges. We take a look at some of the most common ones.
Wondering what an investment in SAM could do for your business? Fill out a few details and find out what return you could get!
Answer a few questions about your SAM infrastructure & experience, and we'll put together a personalised recommendation for the future.
A simple health check of what's being used across your Office 365 estate in this FREE, Microsoft backed and easy to setup review.
Just like you would with your vehicle each year, get an annual check up of your software asset management programme.
Overwhelmed by the task of documenting the steps for a successful SAM programme? Get the experts in to help!
Concerned your SAM tools aren't covering your whole estate? Or on the look out for an entirely new tool? Get us in to assist.
Not content with covering all things SAM related, we've teamed up with Capital to provide a comprehensive hardware asset management review.
A simple, one-time reconciliation of the software you have deployed versus the licence entitlement you own.
A regularly scheduled analysis of your organisation's estate, specifically adapted to your needs and budget.
A full appraisal of your Microsoft 365 setup and how best to optimise it through automated recommendations.
An add-on to our SAMplicity One, MOT and Plus offerings, quickly diagnose your ability to migrate your resources to the cloud.
In collaboration with law firm Addleshaw Goddard, ensure the legality of your SAM programme and get assistance with any contract disputes.
Available as standard with SAMplicity Plus, ensure you're compliant if you're unexpectedly audited by a vendor.
We've teamed up with some of the forefront experts in licensing knowledge so you can teach yourself to be an expert too.
Stumped by the continually evolving complexities of SAM? Join us for one of our comprehensive courses, either in-person or online.
It’s chock full of useful advice, exclusive events and interesting articles. Don’t miss out!