Blogs

Use SSO Connection with Fletch to secure your organization

Product

Use SSO Connection with Fletch to secure your organization

Use SSO Connection with Fletch to secure your organization

Kenisha Liu

Jul 6, 2023

Imagine that you are an SMB and you’ve recently been notified of a cyber threat targeting your organization. Ordinarily, you would have to employ your IT team to spend weeks going through data and logs to find the source. But rest assured, there’s a new way of doing things. What if you had a feed of threats that were mapped to your data. And you could track the most pressing threats down to the granular level within a few clicks? In minutes, you’ve discovered that one of your employees worked a week in Cancun, becoming a target of this specific threat targeting your whole organization. That is the power of connecting your SSO data with Fletch.
Fletch’s early warning system is the first to notify you about threats you could be susceptible to. And by seamlessly integrating your SSO data with our cutting-edge threat intelligence platform, you take the first step to gaining unparalleled visibility and a comprehensive understanding of the threat landscape. 
In this article, we will explore what it means to connect your SSO data to Fletch and the myriad of benefits.

Why Single Sign-On data?

Why do we encourage our users to connect Single Sign-On (SSO) data to Fletch to start experiencing the benefits?
For starters, Single Sign-On is the stronger, more modern way of authenticating and logging in to services. We want users who are serious about their security posture and who we can set up for as much success as possible.
Additionally, we want to provide value to as many people as we can. These days most companies are utilizing SSO to protect their organizations, meaning that almost every company can experience accessible cybersecurity without spending millions of dollars or thousands of hours.
Learn more about what SSO is and how it works. 

Why should I connect my SSO to Fletch?

Fletch’s technology scans the entire threat landscape and correlates the threats it detects to your company’s data. With this information Fletch informs you of the threats that matter to you and provides personalized advice to prevent, fix, and communicate threats.
The more data you connect, the more value Fletch can provide. SSO happens to be a rich yet messy log data source that Fletch can make rapid sense of for you. Get a better understanding of your correlation to cyberthreats ahead of time. Let’s get into some of the benefits.

SSO data can be a goldmine with Fletch

You might expect that Single Sign-On data wouldn’t have much to do with cybersecurity. But according to IBM, 95% of data breaches are caused by human error. From the access and authentication information, you can pull out a lot of insights into user behavior which can provide value into where you could be susceptible to threats.
You wouldn’t get this information from vulnerability scanners or EDR products. The Fletch engine is unique. It takes your complex log data coming out of your SSO provider and makes sense of it for you. We provide you with comprehensive information on your data. This includes:
  • Your tech data. We use SSO metadata to see your company tech stack. Use this to see the different apps people log into and what threats correlate to those apps.
  • Your geographical data. Get a low-down of the regions you do business in and where your people are working from. Then see what threats are relevant to those locations.
Learn more about how Fletch creates a data profile for you.
From this information alone you can narrow down your threats with a click of a button. 
You can also use this information in other ways to help your company. This includes saving money on applications that you didn’t realize you were spending money on. Or staying organized on user behavior. You will be the first to see any changes or possible suspicious behavior within what applications people are using, or where people are working from.
Turns out, connecting your Single Sign-On data to Fletch is an easy-to-connect data source that yields surprising visibility (who would’ve guessed?)

Connecting your SSO data is easy

Historically, complete cybersecurity was not possible without tons and tons of resources. The biggest companies spend millions to employ full IT teams to manually track threats and correlate them to the company’s potential risks.
That process is out-dated, inefficient, and impossible for small and medium businesses. We seek to make cybersecurity easier and accessible. 
Creating a Fletch workspace takes seconds. And to start getting proactive information on threats that matter to you, you only need to take 10 minutes to connect your SSO data. That means you don’t need an experienced security or IT team to use Fletch or connect Single-Sign on information.
The process is user-friendly and easy to follow. Here are our quick guides for connecting your SSO provider to Fletch, whether it be Google, Microsoft, or Okta.
This means that without taking too much time or resources, anyone can get cybersecurity insights that are updated in real time.
Pro Tip: In the case that you do find yourself running into any issues, the Fletch team is here to support you. Contact the Fletch team to help you with the process at customersuccess@fletch.ai.

It's safe to connect to Fletch

In order to provide top of the line security and comprehensively cover your threat landscape, we need to access some user data, however you can sleep tight knowing your data is secure with Fletch.
Fletch follows security best practices to ensure the privacy of your information. Your SSO data is encrypted in transit and at rest to prevent unauthorized access or intervention. Additionally you can be sure that your information is segregated from others within its own individual workspace for extra security.
Fletch only stores your information for up to 7 months unless directed otherwise. Additionally the information we keep is not any sensitive data in itself. We only keep track of patterns and trends within your Single Sign-On data to understand how it correlates with threats.
Lastly, Fletch only works with companies that have a proven track record of security. That is why we chose to function within major cloud scalers like Google and Amazon and work as approved partners of Microsoft.
Learn more about security at Fletch.

What SSO data is Fletch using

Single Sign-On data is not your crown jewels. It does not provide us with any personal information. Fletch exclusively uses metadata contained within your authentication and usage logs, safeguarding your sensitive information stored in files and ensuring its complete confidentiality and privacy. This information is used to provide you with your tech or geo correlation and accurately track your risk correlations. That way, you can track your threats down to individual users so you have the power to mitigate threats quickly and at a granular level.
The benefits outweigh the risk. When you provide Fletch with your Single Sign-On data, you are taking the first step in creating a more secure environment for you and your customers. 

Do I need to connect my SSO data to use Fletch

No, you don’t need to connect your SSO data to Fletch to get value.

The bottom line is that connecting your SSO data provides you with multiple points of correlation and broad coverage on the threats that matter to you and how you could be susceptible. However, if you don’t connect your data we can still give you an analysis on how threats correlate to the info we do have. 
Without SSO data connected to Fletch you will still have access to:
  • The Daily Threat Report. Sent to your inbox daily, stay up-to-date on the top threats in your workspace and trending global threats.
  • Your Correlated Threats. In the Fletch Feed, see what threats are relevant to you based on the data you’ve connected.
  • Your Data Profile. Get a dynamic report of your and your organization’s potential and actual correlation to threats based on the data you’ve connected.
  • Major Threats Globally. See the most impactful threats happening globally.
  • Fletch’s Top Threats today. Check out the biggest threats we think you should be aware of based on our cybersecurity experts' analysis.
  • Threat Boards. Click into the threats you're interested in to find out more information from the latest updates to your correlations to expert advice on how to mitigate potential damage.
We know that not everyone is able to connect their SSO data, that’s why we’ve still made it possible for all users to get value out of Fletch so cybersecurity can become more accessible for everyone. 

Takeaway

Connecting your Single Sign-On (SSO) data to Fletch offers numerous benefits that enhance your cybersecurity and protect your organization from threats. 
By integrating your SSO data with Fletch's advanced threat intelligence platform, you gain unparalleled visibility into the threats specific to your company. Fletch's early warning system correlates threats to your data, providing proactive detection and personalized advice to prevent and mitigate risks. 
Start living ahead of threats by connecting your SSO data with Fletch today.

See how much time you can save

Fletch surfaces the 5% of threats that matter to you right now. You’ll have every detail about the threat, what to do about it and what to say. 

Get API access

See how much time you can save

Fletch surfaces the 5% of threats that matter to you right now. You’ll have every detail about the threat, what to do about it and what to say. 

Get API access

See how much time you can save

Fletch surfaces the 5% of threats that matter to you right now. You’ll have every detail about the threat, what to do about it and what to say. 

Get API access

See how much time you can save

Fletch surfaces the 5% of threats that matter to you right now. You’ll have every detail about the threat, what to do about it and what to say. 

Get API access

See how much time you can save

Fletch surfaces the 5% of threats that matter to you right now. You’ll have every detail about the threat, what to do about it and what to say. 

Get API access