Obsidian Security
COMPREHENSIVE SAAS SECURITY AT SCALE
Obsidian Security is the premier security solution designed to drastically reduce the attack surface area of SaaS applications by 85% on average. With contextual user activity data, configuration posture, and a rich understanding of 3rd party integrations in SaaS, the Obsidian platform reduces incident response times by 10x and streamlines compliance with internal policies and industry regulations. Notable Fortune 500 companies trust Obsidian Security to secure SaaS applications, such as Salesforce, GitHub, ServiceNow, Workday, and Atlassian. Headquartered in Southern California, Obsidian Security is a privately held company backed by Menlo Ventures, Norwest Venture Partners, Greylock Partners, IVP, GV, and Wing. For more information, visit www.obsidiansecurity.com
Behind the Breach: Scattered Spider SaaS Attack Analysis & MITRE ATT&CK Mapping
Behind the 2025 Salesloft Supply Chain Breach
The Hidden Supply Chain Risk: Third-Party App Compromise
Welcome to Obsidian
Obsidian x Snowflake: Staying Secure in a SaaS-First World
Obsidian x Snowflake: Stopping Attacks in the Browser
Obsidian x Snowflake: Defending Against Shadow SaaS and GenAI
Obsidian Security Product Demo: GenAI Discovery & Blocking
Obsidian Security Product Demo: SaaS Discovery & Blocking
Obsidian Security Product Demo: Identity Threat Prevention
Automate SaaS Compliance with Obsidian Security
Techniques of SaaS Compromise
Third Party SaaS Integration Risk
The Three Pillars of SaaS Security
Continuous SaaS Compliance
SaaS Incident Response
Scattered Spider eCrime Campaign
Account Compromise and SaaS Risks
SIM Swapping Attacks
Preparing for Battle: Detection and Response of SaaS applications
Tips for SaaS Incident Response
How Obsidian and CrowdStrike Work Together
SaaS Backdoors: The Risks of Oauth Integrations
Obsidian Security in less than 30 seconds
SSPM: The Obsidian Way
Breaking down SaaS Security Posture Management (SSPM)
The Elements of SaaS Security
Extending Zero Trust to SaaS
Prevent OAuth Abuse in the SaaS Environment
Identify and Mitigate SaaS Session Hijacking