The rapid adoption of SaaS‐based applications in organizations today continues at a breakneck pace. These applications provide critical functionality and enable greater productivity, but at the same time introduce potential new security and data theft risks if not properly controlled.

Individual users, cross‐functional teams, and even entire departments, frequently use unsanctioned Software‐as‐a‐Service (SaaS) applications, thus creating a “shadow IT” environment within the organization and perpetuating a “cat‐and‐mouse” relationship that often exists between IT security and end‐users.