Video: SaaS Sprawl: The Reality (World) | Duration: 2704s | Summary: SaaS Sprawl: The Reality (World) | Chapters: Webinar Introduction (28.03s), Understanding Shadow IT (133.4s), SaaS Usage Explosion (183.055s), Shadow IT Risks (383.97s), SaaS Security Breaches (701.45s), SaaS Monitoring Solutions (943.34s), Scalable SMB Solution (1194.0901s), SaaS Monitoring Explained (1232.0249s), Key Takeaways Recap (1945.89s), Upcoming SaaS Features (2016.065s), SaaS Monitoring Explained (2134.095s), SaaS Monitoring Enhancements (2202.74s), Enabling SaaS Monitoring (2324.125s), Conclusion and Thanks (2478.6501s)
Transcript for "SaaS Sprawl: The Reality (World)":
Hello, everyone, and thank you for joining us today. Good morning, good afternoon, and good evening from everyone joining all across the world. We have a special treat for you today with a very fun webinar. Today, we are talking SaaS sprawl, the reality world. And, I think it's gonna be a fun one. So hang tight as we get a few couple of housekeeping items under our way. So with that, we do have the session is being recorded today, so it will be sent over after the fact. So just know that that link will come to you probably within about twenty four hours. You can also download the deck. So if you are interested in pulling some of the details that we are presenting today, please note that you can do so, over in the doc section. There's also a number of other resources, so feel free to grab any links or assets that you feel like would be important. And lastly, there is a q and a box, so we will get to q and a at the end. So as much questions that come up along the way, please please do submit those in the q and a. We are monitoring that in the back end, and we will make sure to address as many as we can excuse me, as many as we can after the session. One other note, we do have a number of opportunities to win prizes today. So we are giving some fun prizes away. There are gonna be three chances to win. So as the polls pop up, please do make sure to hit the yes button if you are interested in being entered to win those. And we will run them throughout the session. So please do make sure that you are responding to those if you are interested to win. Lastly, I'm going to introduce our speakers. So Liz Tippitt is joining us. She's the director of product marketing here at LastPass, and she will be joined by five very fun friends, including captain Glenn, Neve Schulman, Cynthia Bailey, Boston Rob, and King George. So each of them will be jumping in throughout the session. And so we're very excited to have all of them joining us today. With that, I'm gonna hand it over to captain Glenn who's going to get us started. Hey, crew. Captain Glenn from Below Deck here. Now whether you're navigating open waters or open networks, one thing's true. If you don't know who's on board or what they're doing, it gets messy fast. On my boat, positives can't just roam around unmonitored, but in today's workplaces, employees are using dozens, sometimes hundreds of SaaS tools, many without IT's knowledge. This includes tools you're probably familiar with like Slack, Dropbox, Zoom and Salesforce. That's what we call shadow IT. It's like having guests sneaking into the engine room, one bad move and you're in trouble. So let's take a look at the current state of SaaS and what it means when no one's watching the deck. Hi. I'm Matt, captain Glenn. Most IT teams don't even know who's on the boat. And with SaaS adoption skyrocketing, it's less like a sailboat of a problem and more like a cruise ship full of unsanctioned apps and surprise AI tools. Now thanks for kicking us off, but I'm gonna take control of this vessel for now. So as Courtney mentioned, my name is Liz Tippitt, and I'm the director of product marketing here at LastPass. Thank you all so much for taking the time to be here today and spend some time with myself and my celebrity friends to hear a little bit about SaaSpro and how it's affecting businesses just like yours today and what LastPass is cooking up to help our customers combat it. So with that, let's dive into the seas of SaaS and just how big the swell is growing. It's probably no surprise to you all that SaaS usage is absolutely exploding. Companies are leveraging SaaS tools because they're cost effective, super easy to deploy. And for those smaller companies who might not have as robust of an IT or security team, SaaS tools are really easy to maintain without a lot of IT intervention. Now employees are using fast tools because they're constantly looking for tools to help them enhance their productivity, help them collaborate with their teams better, and they can integrate them with the other tools they're already using to make their lives even easier. But the challenge is, as employees rapidly adopt these tools, they're bypassing IT to do so, which leads to a problem known as SaaS sprawl or the rapid proliferation of technology across businesses without IT oversight. Now let's take a look at the numbers and how this is playing out across multiple industries and geographies today. On average, large organizations deploy around 660 SaaS apps, while smaller to midsize businesses deploy around 58 to keep their operations running smoothly. And since 2019, the average number of apps individual employees use to get their daily work done has actually doubled. Today, they're averaging about 11 different apps in their daily roles. Now I can certainly attest to this because as a part of the product marketing team, I use a lot of apps from project management tools to CRMs to design apps and and so many more just to get my daily work done and collaborate with my team who's all remote, by the way. So I truly rely on each of these to stay efficient and up to date on what's happening across my org. Now with these adoption rates continually climbing year after year, this rapid proliferation is not going to slow down anytime soon. Today, the SaaS market is estimated to be worth around $247,000,000,000. And by the end of this year, that number is expected to grow to $400,000,000,000. And what's even more shocking, projections estimate that the SaaS market could grow to anywhere between 800,000,000,000 and $1,000,000,000,000 by 2030. So for the time being, SaaS usage is here to stay. Hey, everyone. Neve Schulman here. And on Catfish, I've seen what happens when people jump into something too fast without asking any questions. Spoiler alert, it it never ends well. Well, the same goes for SaaS sprawl. That's what happens when teams start signing up for new software tools left and right, no IT approval, no vetting, no questions asked. It's basically the same as falling for a good looking profile with no background check. It looks useful, maybe even free, but the risks underneath are very real. Shadow IT and Shadow AI can sneak in through these apps. And before you know it, your company's data is floating around who knows where. So please slow your sass down and swipe left on unapproved tools. Like Nish said, just because an app looks helpful doesn't mean it belongs in your environment. Shadow IT isn't just sneaky. It's expensive, risky, and can lead to very real security problems. Shadow IT, very simply put, is when an individual or a department within an organization uses tools without the knowledge or explicit approval of the IT department. But an important caveat to this that I want you all to keep in mind is that employees aren't doing this with malicious content. Like I mentioned before, they're just looking for tools to do their jobs better like we all do, and they're looking to bypass the lengthy process of going through IT to request access. Because if the process to get access is too cumbersome to get what you need, you're probably gonna look for shortcuts. But without IT oversight of these tools, employees are inadvertently exposing themselves, their orgs, and their customers to risks. Now you may already be familiar with shadow IT, but let's talk about an emerging challenge under the umbrella of shadow IT that you might not be as familiar with, which is shadow AI. Shadow AI, much like Shadow IT, happens when employees use AI powered tools without IT's approval. But here's a very important difference. AI comes in two different forms. There are the pure play AI tools like ChatGPT, Copilot, Bard, and the other big names that you've probably heard of. But what about the other tools that employees might not even know have AI baked in, like Canva, Grammarly, or HubSpot that they use regularly without understanding the information that they're uploading is being used for learning models, meaning that other people who use those tools potentially have access to that same data. That means that data could fall into the wrong hands and be used for malicious intent, ultimately leading to a security breach or unauthorized access. So while SaaS applications do make employees' lives easier, it makes IT's life harder because they don't have oversight of how these tools are being accessed or what information is being stored or shared across them. They also can't ensure that security best practices are being followed by employees because many SaaS tools don't support SSO or MFA. And all of this added added up exposes the entire organization to security risks like unauthorized access, data breaches, and even compliance violations. Now on the financial side, the cost of these unsanctioned SaaS apps can absolutely run amok because there's no oversight into who who's using what tools if there are multiple tools being used to do that same thing, or if employees are signing up for tools and simply forgetting about them. Just look at these stats here. Companies with less than 399 employees waste on average about $500,000 annually, while organizations with 400 to 799 employees waste an average of $1,300,000 annually. So the key takeaway here is that shadow SaaS is not only a threat to the security of your organization, but it also leaves your org exposed to financial waste that you don't even know that you're incurring. Now the really scary part is your employees are already using shadow IT and shadow AI, and you just don't know it. A study by IBM found that 41% of employees acquire, modify, or create technology without their IT team's knowledge. And according to a recent poll conducted by Software AG of about 7,000 employees across the globe, 50% of them admittedly use Shadow AI. And 46% of them said they're not giving it up even if it is banned because it helps them be so much more productive. And to top it all off, Gartner predicts that by 2027, the majority of employees are going to use tools that are not approved by IT. So this problem will not only will only continue to compound if nothing is done to curb it. Hey, you guys. It's me, your girl Cynthia Bailey here. Now on housewives. The The drama doesn't always happen on camera. Sometimes it's what you don't see. Side conversations, sneaky appliances that cause the biggest mess. That's exactly how SaaS sprawl works. Employees start using apps behind IT's back, connecting to tools with no oversight. You don't notice until there's a breach, a budget spike, or a compliance issue. And when the receipts come out, IT is left scrambling to clean it all up. Let's break it down, how these hidden tools can cause real business drama and how to get ahead of it before it ends in disaster. Yes, Cynthia. You are so right, and I couldn't have said it any better than myself. And I will say you look like you could throw a right book way better than me, so I don't think I would disagree with you even if I wanted to. Like you said, the real drama, the juicy drama, is what happens what is what you don't see, what happens behind closed doors. Now when we talk about the behind closed doors drama that companies experience, they don't even realize how many apps their teams are using until there's a budget blow up or a compliance mess. So let's talk about what happens when SaaS goes off script and how this plays out in the real world, the reality world of SaaS gone wild. Now I don't know how many of you have heard of the Medibank data breach, but let's recap what happened there. This data breach originated when an employee of a third party IT vendor saved their Medibank admin credentials into their personal browser profile, which was not authorized by Medibank, which then later synced to their personal device. Now this personal device was then compromised by a threat actor who deployed malware on that device and stole the employee's credentials sometime around 08/07/2022. By August 23, the threat actor used those credentials to access Medibank's VPN, which did not have MFA. Over the next two months, the threat actor stole around 520 gigabytes of data and published it on the dark web. This compromised around 9,000,000 active and formal former Medibank customers' data. The total financial cost in Medibank by the end of next month are expected to be around a hundred and 26,000,000 Australian dollars, which includes the security enhancements that Medibank has made, the legal fees they've had to pay, and the other costs that have compounded. But this does not include the potential compliance fines or the legal outcomes. So as unfortunate as this is for Medibank, it's a great example of how the use of unauthorized tools and application, also known as shadow IT, can be extremely detrimental to businesses. Now let's talk about another incident that happened with Samsung in 2023. Some of their engineers accidentally leaked highly confidential company data into ChatGPT while they were using it to troubleshoot and optimize their code. Now according to various reports, engineers actually put in proprietary source code, internal meeting notes, and bug reports without realizing that ChatGPT uses that information to train their model. Now what did it what did this lead to? Well, Samsung completely banned ChatGPT and other AI tools across its company. They had to rework their internal security policies to prevent a further leak, and the most significant impact is the fact that their proprietary source code is now outside of Samsung's control forever, potentially accessible to millions of people through AI training datasets. Hey, guys. What's going on? It's Boston Rob from Survivor and the Traders. I'm here today with a mission for you guys. I'm gonna teach you how to beat this game with a little bit of my survivor expertise. Today's tribal challenge, navigating the SaaS landscape. You can't outwit, outlast, and outplay if your apps are out of control. Okay? Some teams try to throw money at the problem with big clunky platforms. It's not gonna work. The real winners, they build a smart strategy. They know their environment, and they spot risky tools and act fast. Do you understand? You wanna survive in this game? You better start with visibility. You better know what tools are being used and who's using them and what's putting your tribe at risk. Understand these things, and you'll do okay. Good luck. You nailed it, Boston Rob. And can I just say Gulf Swaps? They're not doing so well this year, but, hey, they never lose a drinking game. So like Rob said, survival takes strategy, and he's not wrong. But most SaaS tools turn that strategy into a 12 step puzzle. Visibility should make your life easier, not harder. So why are so many platforms making SaaS security feel like a tribal council? You're probably wondering, why hasn't anyone come up with a solution to address SaaS brawl, Shadow IT, and Shadow AI? Well, the short answer is they have. There are several traditional solutions that offer some level of SaaS visibility and monitoring, such as identity providers that focus on verifying user identities and ensuring only authorized individuals can access specific resources or applications that support single sign on. There are also cloud access security brokers that ensure cloud traffic complies with the with an org security policy before users can access any cloud resources. And there's also SaaS security posture management tools that focus on identifying app vulnerabilities, misconfigurations, or compliance gaps. Now these tools are great for those orgs who have the time, resources, budget, and technical expertise to deploy and maintain them, But that's not the case for the majority of our customers, those smaller to midsize businesses who may get bogged down by complex features that these solutions offer that they might not even have the need for. So this results in them paying for features that they might not even use or know how to use. And next, these tools can be really complicated to maintain. More often than not, SMBs typically lack dedicated IT staff or software specialists, which makes the ongoing meet management of these tools really challenging. They can struggle to handle complex setups, custom integrations, or troubleshooting without that specialized expertise. So where does that meet them? Well, their options are either do nothing or spend money, time, and resources that they don't have, and those aren't real choices when it comes to protecting your business and your brand. And this is where LastPass comes in. Over the last year, we've been developing and testing a new solution to help businesses of all sizes mitigate the risks of SaaS sprawl, shadow IT, and shadow AI while controlling the hidden cost these applications can drive. And we're so excited to have recently launched LastPass SaaS monitoring, our latest innovation that arms our customers with the comprehensive visibility visibility of what business applications are being used across their organizations so they can quickly uncover shadow IT, shadow AI, as well as identify tools that may be underused or overprovisioned so they can control the cost of what they're spending on these technology platforms. All in all, this is going to enable our customers to make smarter, more strategic decisions to protect their businesses and their budgets. And the best part is this solution isn't just for big businesses. It was designed with SMBs in mind. So it scales alongside them, and it leverages the very same browser extension they already know and trust for password and and IT management. So there's no additional software, no additional agents, or any additional complexity in introduced that could slow down their operations or slow their employees' productivity. Good day, legends. It's King George from Australian Survive and the Amazing Race Australia. I didn't survive alliances, blindsides, and tribal chaos by flying blind. I had a strategy, constant awareness, and a read on every threat. That's the mindset IT needs when it comes to shadow IT, shadow AI, and SAS fraud. You can't defend what you can't see. But with SAS monitoring from LastPass, you finally get visibility into every app across the org, approved or not. But before I cast my vote, I've got a few questions. How does SaaS monetary actually work? Is it lightweight enough for lean teams? Can it help reduce both risk and wasted spend? Is it really more cost effective, and what's the starting price? And most importantly, is my information safe? Help me break it down, Liz. Thank you very much. Oh, I'm going down to you, King George. We're not worthy. Everything you said was spot on. You can't act on what you can't see. So the best strategy to survive the jungles of SaaS fraud and shadow SaaS is not only being able to spot a threat, but taking action before it becomes a full blown breach. And I'm beyond ready to show you how SaaS monitoring solved for this, how it works, and just how easy it is to get up and running for those businesses who don't have the budget or resources for a costly, time consuming solution. So how does SaaS monitoring work? Well, let's start let's start with the first step. It can be enabled in just a a few clicks of a button, and it doesn't require any extra steps or additional agents downloaded. Admins simply log in to their admin consoles, select enable SaaS monitoring when prompted, and the policies are automatically enabled across their organizations. Next, after SaaS monitoring is enabled, when a LastPass user who is signed into the LastPass browser extension with their business email and attempts to log in to an application that we're tracking in an internal database. Staff monitoring will track that login information and how users are accessing applications. So are they using SSO? Are they using passkeys or passwords metadata, like the website URL, the site login name, the authentication type, a time stamp of when they tried to access as well as the browser or device type they're using, and then it will aggregate that data into two dashboards that I'm gonna dig into here shortly. So admins can easily see what business applications are being used across their orgs, how they're being accessed, and what users are accessing them. So let's dive into those two dashboards that I mentioned. The first is the applications dashboard. At the top, you'll see an easy to digest breakdown of your org's SaaS usage data. That's going to include the total number of applications used across your organization, how many of them were actually used in the last thirty days, and any new applications that have been discovered in the last thirty days. You'll also see the total numbers of your users' passwords that are stored in their LastPass vault. Now this is a key piece of in indication data for admins because the overall goal is to incur encourage your users to leverage their vaults to help improve their password hygiene. Next under that, you'll see some key cost savings data here. You'll be able to spot apps that have gone unused for thirty days as well as apps that have less than 10 users total. So this is where you can understand what applications can be eliminated or what licenses can be canceled so you're not overpaying for tools that are not even being used. Lastly, in this chart here on the right, you'll be able to get a quick view of all the different types of authentication methods that are being leveraged to access applications across your org. Now this includes a breakdown of SSO, passkeys, and passwords, so you'll be able to quickly assess if your users are following those security best practices or if they're not. Now down at the bottom in this list of specific apps, you'll be able to see the total number of all time users of that app, the category that app falls into. So for example, you will know if it's a productivity tool or an AI tool or a marketing tool, and you'll also be able to see the specific login method that that app supports. You'll also be able to see the total percentage of vaulted passwords that are used to log into that specific application and a time stamp of the last time that application was accessed. Now this information can give you insights into if you have redundant tools that may overlap and do the same thing so you can reduce the amount of tools you actually need and consolidate those costs. Alright. Next up, we have our users dashboard. At the top of this dashboard, you'll be able to quickly see the total number of users leveraging apps across your org. Just below that, you'll see the total number of users who have alerts that need to be resolved. So this includes, if they're using a weak or a reused password. Next, you'll be able to see the total percentage of users who have logged into apps in the last thirty days and the total percent or percentage of those users who haven't logged into an app in the last week. And if you look at the data in the list below, you'll see a breakdown of each user, their names and their LastPass email addresses, how many apps they have access to, how many of those apps have credentials stored in their LastPass vault, and if that specific user has any alerts that need to be resolved. Once you click on that user, you can see the browser or devices that that user is leveraging to access these applications. So if they're using a nonstandardized browser or device, you'll see that immediately. What this user data is going to help you do is determine if users have been overprovisioned or have access to more applications than what's necessary for their role. You can also see which users have poor password hygiene, and it will also help you identify those users who need to be prompted to change their credential behavior and close those, potential security gaps. So now that we've covered how SaaS monitoring works and the data it provides, let's talk about the use cases it's going to help you solve for. First and foremost, it's going to help you gain visibility of shadow IT and shadow AI. It'll discover what applications employees are using so you gain knowledge of what tools are actually approved versus which are not. Second, SaaS monitoring is going to help you reduce your SaaS cost. It'll give you usage insights that I mentioned into what types of applications are being used and if there are potentially redundant tools in that same category being used. So for example, if you discover that your employees are using five different project management tools, you'll be able to determine which tools can be eliminated and consolidate those costs. That way, you're only paying for one tool and not five that do the exact same thing. On the other hand, you'll be able to spot tools that are underused so you can cancel those subscriptions or licenses and save the cost you're paying for a tool that's not critical to your operations or not being used. Next, self monitoring is going to give you insights into how your employees are logging into these applications and the type of authentication method they're using so you can enforce those security policies and identify those users who have issues that need to be resolved. It will show you if users are logging in via vaulted or unvaulted passwords, if they're using passkeys, or if they're leveraging SSO or MFA. And if they're not, SaaS monitoring will flag those users like you saw on the dashboard, and you'll be able to prompt them to follow the correct security policies and close those security gaps. Now a big use case for those customers who may either operate in highly regulated environments or maybe they do businesses with clients who do is compliance. And if you don't know what applications your employees are using and where they're potentially storing or sharing sensitive data, customer data, or company data, then you're really gonna struggle to pass compliance audits or ensure that you can meet contractual agreements you've agreed to and ensure your data is being properly protected. And I think we all know the consequences of noncompliance can be really bad. It can result in really expensive violations, reputational damage, and ultimately, it can cause you to lose business with those customers or partners you've entered into agreements with. And lastly, SaaS monitoring is going to help you better prepare for and mitigate data loss. You'll know which apps are absolutely critical to your operations and your team's productivity to reinforce those security measures, spot that risky login behavior or apps that are known to be insecure, and you'll be able to ensure employees aren't using apps where sensitive data may be stored or improperly shared. And in terms of offboarding, you'll also be able to spot if employees leave your organization and still have access to the tools that they shouldn't so you can respond properly. So why should you consider LastPass for SaaS monitoring? Well, let's start off with the fact that it's incredibly easy to use. All you have to do is literally click one button to enable SaaS monitoring and the associated policies so you start getting that visibility instantly. Second, like I mentioned before, SaaS monitoring is baked right into the LastPass browser extension, so there's no additional agents or software that you have to download in order to take advantage of those insights, nor is it going to disrupt your operations or employee workflows. Lastly, you likely already know how important it is to have secure passwords. And now with the additional visibility offered by SaaS monitoring, you'll have a more holistic protection across your entire organization. You will have the knowledge to ensure that your org is not only following, password best practices, but also credential best practices for any application that they're logging into. Now before I wrap up, I do wanna end with a little peace of mind, because King George last question was, is my data safe? The easy answer, yes. LastPass SaaS monitoring does not track personal app usage. It only tracks logins when a user opens a SaaS application in a browser where the LastPass extension is installed and the user is signed in. If that LastPass business email address is used to access SaaS applications available in our internal app catalog, which is a curated database of the top thousand applications associated with business use, then it will capture that event. When admins are prompted to enable SaaS monitoring via their admin consoles, two policies will automatically be implemented, log URLs for reporting, SIM, and app discovery, and log usernames for reporting SIM and app discovery. We are not tracking your personal user activity, and we would never sell it to any third parties at either. Okay. So now let's wrap it up with some key takeaways because I know I've thrown a lot of information at you. And if you remember nothing from this webinar, remember these three things. SaaS for all, shadow IT, and shadow AI is a problem faced by every modern organization. It isn't just a problem for large enterprises. But a lot of the traditional SaaS tools on the market today are really complex, really expensive, and really difficult to maintain for those smaller businesses who just don't have the time, budget, or resources to devote. So their choice is either do nothing or spend money and time they don't have. But the good news is LastPass SaaS monitoring is a solution for businesses of all sizes that helps customers easily mitigate the challenges of shadow IT and shadow AI while helping them identify areas to cut costs and optimize their SaaS usage. And it's not listed here, but I have a bonus key takeaway. We are currently offering a special pricing promotion for SaaS monitoring now through the end of the quarter. So be sure to use the connect with an expert link, and the resources, up top for more information on that. And with that, I'm gonna, have our surprise cameo take it away and close us out. What's going on, team? It's Richard Blaze here from assorted different food television shows that hopefully you've seen it. I'm here to tell you what LastPass is cooking up. Now listen, you've seen how SaaS monitoring gives you a full view of what Absa employees are using and the potential risks. Well, listen. What's next? Let's just say soon that you'll be able to not only see what tools are in use, but control which ones your team can access or not. So stay tuned and get ready to take control of the chaos. As they would say on a cooking show, bon appetit. Dinner is soon to be served. Enjoy. Oh, Richard. You are such chef's kiss, and you're right. LastPass is cooking up even more value for our customers with some exciting enhancements to our SaaS monitoring capability coming very soon that's going to give our customers even more control over approving apps that are sanctioned and blocking those that are not. So grab your nuts, grab your forts, tuck your napkins into your shirts, and get ready to feast your eyes on all the last pass innovation headed to your plates. Oh, Liz. That was pretty fun. Hopefully, everyone enjoyed that. Many, many thanks to all of you for a great presentation, and we are actually gonna open up to q and a. So as a reminder, I put it in the chat. Do please add any questions that you have. We will make sure to go through them. There have been a number that have come through. And so with that hold on. I actually need to go to the right Q and A slides. My apologies. Alright. So we are gonna pivot over to q and a. So, Liz, first question. Is SaaS monitoring available as an add on, or how do I purchase it? So SaaS monitoring is actually a part of a new package that we just launched. It's called BusinessMax, which also includes SSO and MFA. So you can definitely go to our pricing page and check that out. You'll see the new SKU. You'll see everything that's included, and how to either get that package or upgrade to Businessmax. Awesome. Okay. So similar question, though. We do need a Business Max subscription to use SaaS monitoring. Is that correct? Yes. Yes. That's correct. Okay. Great. We're sort of in rapid fire, so hopefully it's okay. There's lots of them coming through. Can you explain the app catalog you mentioned? Yeah. So the app catalog is an internal database, that we built based off, researching the most commonly used business apps across, various industries. Right now, we're tracking, over a thousand applications, but that number is going to expand as we scale, and as we discover new apps that our customers are using more and more so we could add it to that that database. Fantastic. Okay. I think where this is another one. Can logins to the browser extension be automated to ensure the most thorough collection of data? I'm not sure I understand the question. Like, auto like, autofill into the browser extension. Can you just clarify? I I was gonna say, Robert, if you wanna pop in that, question with a little more detail there, we'll make sure to, get to that one. Yeah. One other question, just as an FYI, because a couple of these have come in about the recording. So, yes, we are recording. We will make sure that you will get the recording link. That will be sent out within about twenty four hours or so, give or take, from the end of this session. Also, if you're interested in the, PDF of the slide deck, that is available on the docs tab. So over, I believe, on the right side, you should be able to download it in there, but, shoot me a q and a if you have questions or issues down downloading that one. So I've got a couple of those come through. Liz, can you say anything else about the enhancements you and Richard mentioned? Sure. So very soon, we are going to be releasing, a new feature set, excuse me, within SaaS monitoring that's going to build off of that visibility foundation that we've already built with our first version. So with the next version of SaaS monitoring, LastPass admins will actually have the ability to not only see what apps their employees are using, but they'll be able to easily set usage policies to revoke access to those apps that are unsanctioned, grant access to those that are sanctioned, and send warning notifications if users are leveraging an app that maybe they want to check out a little bit more, maybe scrutinize a little bit more, maybe they want to review it, for, those security policies and make sure that they are aligned with their organizations, so they can determine the risk level. So more to come on that. Stay tuned. We will have much more information on that, to come. Amazing. Okay. Robert, he back. Auto log in to the extension without manual interaction to the end user maybe based on the currently logged in user on the operating system? Sure. So right now, users still have the option to leverage a browser extension. But this is really good a really good piece of indication data for, you know, those last pass admins to recognize that, hey. Maybe users aren't leveraging the browser, and we really want them to. Right? That's how we ensure that we have, adequate password hygiene. So, this is something we are evaluating for, our next phase of SaaS monitoring, to ensure that users who are not logged in to the browser extension can still leverage SaaS monitoring. But for now, the user does have to be logged in. They have to manually log in, and be leveraging their LastPass business email in order to, have those application logins tracked. I think that answers your question, but please let me know if I need to elaborate a little bit more. You did. You just gave a thumbs up, which is great. Okay. Thank you, Robert. If I already use the browser extension, can I just enable SaaS monitoring and use it how I always have? Yes. So if you are a Businessmax customer, you'll be able to enable SaaS monitoring right from your admin console. So when you log in, you will see a prompt, in your console that will ask you, do you wanna enable SaaS monitoring and those additional metadata collection policies that I mentioned, in the privacy overview? So once you click yes on that on that prompt, I want to enable SaaS monitoring, those two policies will automatically be implemented across your org, and it will start tracking those app logins immediately, if the user is leveraging extension and assigned in. So just remember that that we because we don't track personal app usage, they do have to be logged in, do have to be leveraging, their business email and, accessing those apps that are in that internal catalog that I mentioned. Okay. Fantastic. I think one you sort of answered it, but I don't know if we wanna dive in a little bit deeper. One person did ask about, it how they just use the one button to be able to enable it. So in their admin console, it will pop up. Is that correct? It will. Yep. As soon as you log in to the, admin console, you will see a prompt that will pop up. It'll be a couple of sentences. You'll see that button that says, yep. I wanna enable SaaS moderator and those policies. And literally, like I said, it's just a click of a button, and then the policies will be implemented automatically. So it's super, super easy. Okay. Fantastic. I think just looking through. I believe that at least there's some of the top of the, note ones. So I'm gonna go ahead and shift this over if that's okay. I just really I think Liz and I both wanna say thank you so much for joining us today. We are so incredibly excited to have you here. Hopefully, you enjoyed some of those fun cameos, and enjoyed the presentation. A reminder that there are some assets in the doc section, so including the presentation deck for today. So if you're interested in grabbing that, we will make sure to send out the recording after the fact. The other thing I want to note, we have opened three prize drawings throughout the day, so you will get an email. We actually will be notifying winners of those within the next twenty four hours. So please check you can watch your email to make sure in case those come through. I likely will personally be sending them, so you might get an email from me. But that being said, we will draw those, winners here within the next twenty four hours, notify everyone of those, and, that's sort of the wrap up on the prize giveaways. So with that, I just wanna thank you all again for today. Thank you for your time, Liz. Thank you for your great presentation. It was wonderful to be here with you. And, with that, many, many thanks everyone, and have a great day. Thank you all very much.