Skip to main content

Reco

Download With Dependencies

Reco is an identity-first SaaS security solution that empowers organizations with full visibility into every app, identity, and their actions to seamlessly prioritize and control risks in the SaaS ecosystem

Reco

Reco is an identity-first SaaS security solution.
It empowers organizations with full visibility into every app, identity, and their actions to seamlessly prioritize and control risks in the SaaS ecosystem. Their AI-based graph technology connects in minutes and provides immediate value to security teams to continuously discover all SaaS applications including sanctioned and unsanctioned apps, associated identities from both humans and machines, their permission level, and actions. Reco uses advanced analytics around persona, actions, interactions and relationships to other users, and then alerts on exposure from misconfigurations, over-permission users, compromised accounts, and risky user behavior. This comprehensive picture is generated continuously using the Reco Identities Interaction Graph and empowers security teams to take swift action to effectively prioritize their most critical points of risk.
Reco helps organizations secure the identities and data of core SaaS applications including Salesforce, Microsoft 365 (including SharePoint, Teams, and OneDrive), Google Workspace, Workday, ServiceNow, Slack, Zoom, Okta, Monday.com, NetApp, Wiz, GitLab, Confluence, and Box.
The Reco and Palo Alto Networks Cortex XSOAR integration empower organizations to automate SaaS threat detection and remediation workflows for enhanced protection. Reco integrates with over 985 Cortex XSOAR content packs, the market’s leading SOAR platform.

What does this pack do?

• Assess over 100 configuration rules unified across SaaS applications.
• Access Reco data risk alerts
• Trigger automatic remediation flows to discover SaaS misconfigurations
• Seamlessly integrate alerts into Cortex XSOAR's incident management system
• Leverage prebuilt playbooks within Cortex XSOAR to automate the entire process of identifying and remediating SaaS misconfigurations and data exposure risks

Benefits to organizations:

• Gain better visibility into potential SaaS misconfigurations and take proactive measures to mitigate them
• Streamline threat detection, automate remediation workflows, and fortify your organization's security posture.
• Investigate and respond to critical alerts promptly and effectively
• Reduce manual effort, accelerating incident response, and improving overall security posture
• Enforce user-data centric security policies and embrace new SaaS applications at a faster rate
• Adhere to compliance requirements

Integrations

  • Supported commands to query Reco platform:
  • update-reco-incident-timeline - Update Reco incident timeline
  • resolve-visibility-event - Resolve Reco visibility event
  • reco-get-risky-users - Get risky users
  • reco-add-risky-user-label - Add risky user
  • reco-get-assets-user-has-access-to - Get assets user has access to (optional to get only sensitive assets)
  • reco-add-leaving-org-user-label - Add leaving org user label in Reco
  • reco-get-sensitive-assets-by-name - Get sensitive assets by name (optional to search by regex)
  • reco-get-sensitive-assets-by-id - Get sensitive assets by file id
  • reco-get-files-shared-with-3rd-parties - Get 3rd parties list with access to files
  • reco-get-3rd-parties-accessible-to-data-list - Get files shared with 3rd parties
  • reco-get-sensitive-assets-with-public-link - Get sensitive assets publicly exposed
  • reco-get-user-context-by-email-address - Get user context by email address
  • reco-get-private-email-list-with-access - Get private email list with access

For more information on Reco, please visit www.reco.ai

Reco

Reco is an identity-first SaaS security solution.
It empowers organizations with full visibility into every app, identity, and their actions to seamlessly prioritize and control risks in the SaaS ecosystem. Their AI-based graph technology connects in minutes and provides immediate value to security teams to continuously discover all SaaS applications including sanctioned and unsanctioned apps, associated identities from both humans and machines, their permission level, and actions. Reco uses advanced analytics around persona, actions, interactions and relationships to other users, and then alerts on exposure from misconfigurations, over-permission users, compromised accounts, and risky user behavior. This comprehensive picture is generated continuously using the Reco Identities Interaction Graph and empowers security teams to take swift action to effectively prioritize their most critical points of risk.
Reco helps organizations secure the identities and data of core SaaS applications including Salesforce, Microsoft 365 (including SharePoint, Teams, and OneDrive), Google Workspace, Workday, ServiceNow, Slack, Zoom, Okta, Monday.com, NetApp, Wiz, GitLab, Confluence, and Box.
The Reco and Palo Alto Networks Cortex XSIAM integration empower organizations to automate SaaS threat detection and remediation workflows for enhanced protection. Reco integrates with over 985 Cortex XSIAM content packs, the market’s leading SOAR platform.

What does this pack do?

• Assess over 100 configuration rules unified across SaaS applications.
• Access Reco data risk alerts
• Trigger automatic remediation flows to discover SaaS misconfigurations
• Seamlessly integrate alerts into Cortex XSIAM's incident management system
• Leverage prebuilt playbooks within Cortex XSIAM to automate the entire process of identifying and remediating SaaS misconfigurations and data exposure risks

Benefits to organizations:

• Gain better visibility into potential SaaS misconfigurations and take proactive measures to mitigate them
• Streamline threat detection, automate remediation workflows, and fortify your organization's security posture.
• Investigate and respond to critical alerts promptly and effectively
• Reduce manual effort, accelerating incident response, and improving overall security posture
• Enforce user-data centric security policies and embrace new SaaS applications at a faster rate
• Adhere to compliance requirements

Integrations

  • Supported commands to query Reco platform:
  • update-reco-incident-timeline - Update Reco incident timeline
  • resolve-visibility-event - Resolve Reco visibility event
  • reco-get-risky-users - Get risky users
  • reco-add-risky-user-label - Add risky user
  • reco-get-assets-user-has-access-to - Get assets user has access to (optional to get only sensitive assets)
  • reco-add-leaving-org-user-label - Add leaving org user label in Reco
  • reco-get-sensitive-assets-by-name - Get sensitive assets by name (optional to search by regex)
  • reco-get-sensitive-assets-by-id - Get sensitive assets by file id
  • reco-get-files-shared-with-3rd-parties - Get 3rd parties list with access to files
  • reco-get-3rd-parties-accessible-to-data-list - Get files shared with 3rd parties
  • reco-get-sensitive-assets-with-public-link - Get sensitive assets publicly exposed
  • reco-get-user-context-by-email-address - Get user context by email address
  • reco-get-private-email-list-with-access - Get private email list with access

For more information on Reco, please visit www.reco.ai

PUBLISHER

PLATFORMS

Cortex XSOARCortex XSIAM

INFO

CertificationRead more
Supported ByPartner
CreatedFebruary 14, 2023
Last ReleaseAugust 26, 2024
Asset Management
Identity And Access Management
Breach Notification
WORKS WITH THE FOLLOWING INTEGRATIONS:

DISCLAIMER
Content packs are licensed by the Publisher identified above and subject to the Publisher’s own licensing terms. Palo Alto Networks is not liable for and does not warrant or support any content pack produced by a third-party Publisher, whether or not such packs are designated as “Palo Alto Networks-certified” or otherwise. For more information, see the Marketplace documentation.