Reco Reviews & Product Details

Reco Overview

What is Reco?

Reco is the leader in Dynamic SaaS Security — the only approach that eliminates the SaaS Security Gap (the growing gap between what you can protect and what’s outpacing your security). This gap is driven by SaaS Sprawl — the proliferation of apps, AI, and identities; the challenge of keeping their configurations secure amidst constant updates, and the challenge of finding threats hidden within an ever-growing number of events. Dynamic SaaS Security keeps pace with this sprawl, no matter how fast it evolves, by covering the entire SaaS lifecycle — cradle to grave. It tracks all apps, SaaS-to-SaaS connections, Shadow SaaS, AI Agents, and Shadow AI tools, including their users and data, and adds support for new apps in days, not quarters. It maintains airtight posture and compliance — even as apps and AI Agents are added or updated. And it also ensures accounts remain secure, access privileges are minimized, and alerts are provided for critical threats. Some of the questions we help Security teams answer, include: - What SaaS, GenAI, Shadow applications are our employees using? - Are there applications employees have installed that have access to our company's data? - Are there any risky users in my company who may leak financial or personal company data? - Do employees have the appropriate level of permissions or are they over-permissioned? - Are our application configurations in compliance with industry standards? - What unsanctioned SaaS apps are being used? - Are any employees using GenAI tools incorrectly with company data? Reco uses advanced analytics around persona, actions, interactions and relationships to other users, and then alerts on exposure from misconfigurations, over-permission users, compromised accounts, and risky user behavior. This comprehensive picture is generated continuously using the Reco Knowledge Graph and empowers security teams to take swift action to effectively prioritize their most critical points of risk. The company’s leadership team brings expertise and innovation from leading technology, cybersecurity and counterintelligence organizations. Reco is backed by top-tier investors including Insight Partners, Zeev Ventures, BoldStart Ventures, and Angular Ventures and has established partnerships with leading technology companies including AWS, Wiz, Palo Alto Networks, Tines and Torq. You can learn more or book a demo at www.reco.ai.

Reco Details
Product Website
Discussions
Reco Community
Languages Supported
English
Show LessShow More
Product Description

Reco is an identity-first SaaS security solution. It empowers organizations with full visibility into every app, identity, and their actions to seamlessly prioritize and control risks in the SaaS ecosystem. Their AI-based graph technology connects in minutes and provides immediate value to security teams to continuously discover all SaaS applications including sanctioned and unsanctioned apps, associated identities from both humans and machines, their permission level, and actions. Reco uses advanced analytics around persona, actions, interactions and relationships to other users, and then alerts on exposure from misconfigurations, over-permission users, compromised accounts, and risky user behavior. This comprehensive picture is generated continuously using the Reco Identities Interaction Graph and empowers security teams to take swift action to effectively prioritize their most critical points of risk.

How do you position yourself against your competitors?

Reco’s Dynamic SaaS Security platform eliminates the SaaS Security Gap (the growing gap between what you can protect and what’s outpacing your security. Our continuous and comprehensive discovery gives enterprises visibility into every app that's connected to their SaaS applications (including 3rd party apps from humans and machines, GenAI apps, and even shadow apps), as well as identities with access to these apps, their level of apps and their level of access. Reco uses AI to add context that informs of situations such as Salesforce Admins without MFA installed, and alert on what to prioritize. With Reco, you'll improve your security coverage and lower your risk, while saving time and reducing costs.


Seller

Reco

Description

Reco is an identity-first SaaS security solution that empowers organizations with full visibility into every app, identity, and their actions to seamlessly prioritize and control risks in the SaaS ecosystem.

Overview Provided by:

Recent Reco Reviews

Verified User
A
Verified UserMid-Market (51-1000 emp.)
5.0 out of 5
"Reco.ai review"
Robust functionality , easy to use , onboarding is very simple and straightforward , fantastic customer support , very easy to integrate with vari...
Piotr M.
PM
Piotr M.Enterprise (> 1000 emp.)
5.0 out of 5
"Reco as sspm"
Reco SSPM excels at providing deep visibility into SaaS application usage and configurations, and it automates the detection and remediation of sec...
DH
Dror H.Mid-Market (51-1000 emp.)
5.0 out of 5
"Great cyber security solution to help reduce SaaS cyber risks"
- Easy deployment - Intuitive dashboard - Great support - Exact mapping of risks and mitigation recommendations

Reco Media

Reco Demo - Reco - Identity-Centric SaaS Security
Discover your SaaS applications and identities, control access, and protect from exposure.
Reco Demo - Reco - Posture Management
Fortify your SaaS defense with posture management from Reco.
Reco Demo - Reco - Zero Trust & SaaS Security
Achieve zero trust with total context from Reco SaaS security.
Reco Demo - Reco - Continuous Compliance
Ensure continuous compliance of your SaaS applications with Reco compliance mapping.
Reco Demo - Reco - NIST Compliance
Empower your defense with Reco continuous compliance with the NIST cybersecurity framework.
Reco CPO Gal Nakash, and Head of Marketing Andrea Bailiff-Gush discuss SaaS applications as the modern attack surface and share recommendations for how to fortify your security posture.
Play Reco Video
Reco CPO Gal Nakash, and Head of Marketing Andrea Bailiff-Gush discuss SaaS applications as the modern attack surface and share recommendations for how to fortify your security posture.
Learn about Reco's posture management and continuous compliance for SaaS security. With Reco, you can improve your security coverage and lower your risk, while saving time and money.
Play Reco Video
Learn about Reco's posture management and continuous compliance for SaaS security. With Reco, you can improve your security coverage and lower your risk, while saving time and money.
Inadequate access and privilege management can lead to unauthorized users and security risks. Understand critical exposure gaps from user permission level and behavior in your SaaS ecosystem that can lead to a breach through this Reco demo.
Play Reco Video
Inadequate access and privilege management can lead to unauthorized users and security risks. Understand critical exposure gaps from user permission level and behavior in your SaaS ecosystem that can lead to a breach through this Reco demo.
Because you can't protect what you don’t know, how do you prioritize and focus on the most critical SaaS apps? This demo shows how to use the Reco platform to get full visibility into SaaS environment, reduce attack surface, and monitor.
Play Reco Video
Because you can't protect what you don’t know, how do you prioritize and focus on the most critical SaaS apps? This demo shows how to use the Reco platform to get full visibility into SaaS environment, reduce attack surface, and monitor.

Official Downloads

Answer a few questions to help the Reco community
Have you used Reco before?
Yes

4 Reco Reviews

4.9 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
4 Reco Reviews
4.9 out of 5
4 Reco Reviews
4.9 out of 5

Reco Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons
G2 reviews are authentic and verified.
Piotr M.
PM
Security Engineer
Enterprise(> 1000 emp.)
Validated Reviewer
Review source: Organic
What do you like best about Reco?

Reco SSPM excels at providing deep visibility into SaaS application usage and configurations, and it automates the detection and remediation of security risks like misconfigurations and data exposure. This helps organizations maintain a strong security posture and meet compliance requirements across their SaaS ecosystem. Review collected by and hosted on G2.com.

What do you dislike about Reco?

While Reco excels in visibility and automation, its potential limitations might include handling highly customized or niche SaaS applications with non-standard APIs, and like all automated systems, it requires careful tuning to avoid excessive or inaccurate alerts. Review collected by and hosted on G2.com.

What problems is Reco solving and how is that benefiting you?

Reco is primarily solving the problem of shadow IT and SaaS misconfigurations, which lead to data leaks and security risks. By providing comprehensive visibility into SaaS usage and automating security posture management, Reco is benefiting organizations by reducing their attack surface, improving compliance, and saving security teams time on manual investigations. Review collected by and hosted on G2.com.

DH
CISO
Mid-Market(51-1000 emp.)
Validated Reviewer
Verified Current User
Review source: Organic
What do you like best about Reco?

- Easy deployment

- Intuitive dashboard

- Great support

- Exact mapping of risks and mitigation recommendations Review collected by and hosted on G2.com.

What do you dislike about Reco?

Once you see the SaaS risks , you can't unsee it and a mitigation plan needs to be formulated

some minor features are yet to fully mature Review collected by and hosted on G2.com.

What problems is Reco solving and how is that benefiting you?

all of the above .

helped me with prioritizing risks

provided me with compliance requirements Review collected by and hosted on G2.com.

Verified User in Information Technology and Services
AI
Mid-Market(51-1000 emp.)
Validated Reviewer
Verified Current User
Review source: Organic
What do you like best about Reco?

Robust functionality , easy to use , onboarding is very simple and straightforward , fantastic customer support , very easy to integrate with various SaaS applications . Review collected by and hosted on G2.com.

What do you dislike about Reco?

There isn't anything to dislike , if any feature you need is missing , company quickly adds it. Review collected by and hosted on G2.com.

What problems is Reco solving and how is that benefiting you?

Reco provides us a single point of security and compliance monitoring for SaaS applications encompassing all aspects we require from configuration to activity monitoring . Review collected by and hosted on G2.com.

AA
CISO
Mid-Market(51-1000 emp.)
Validated Reviewer
Verified Current User
Review source: Organic
What do you like best about Reco?

Visibility and observability into our SaaS usage across the enterprise- easy to deploy and have our security team use it. Review collected by and hosted on G2.com.

What do you dislike about Reco?

It's an alarm, but doesn't remediate - it'd be nice to have more remediations tied into the solution. Review collected by and hosted on G2.com.

What problems is Reco solving and how is that benefiting you?

visibility into our SaaS application usage, as well as the configuration of those applications. Review collected by and hosted on G2.com.

There are not enough reviews of Reco for G2 to provide buying insight. Below are some alternatives with more reviews:

1
JumpCloud Logo
JumpCloud
4.5
(3,330)
The JumpCloud Directory Platform reimagines the directory as a complete platform for identity, access, and device management.
2
Ubuntu Logo
Ubuntu
4.5
(2,084)
Super-fast, easy to use and free, the Ubuntu operating system powers millions of desktops, netbooks and servers around the world.
3
Vanta Logo
Vanta
4.6
(1,813)
It was clear that security and privacy had become mainstream issues, and that we all increasingly relied on cloud services to store everything from our personal photos to our communications at work. Vanta’s mission is to be the layer of trust on top of these services, and to secure the internet, increase trust in software companies, and keep consumer data safe. Today, we're a growing team in San Francisco passionate about making the internet more secure and elevating the standards for technology companies.
4
Sprinto Logo
Sprinto
4.8
(1,347)
Sprinto productizes and automates all compliance requirements that would otherwise require manual effort, documentation, and paperwork, end to end. It integrates with your business systems like GSuite, AWS, Github, Google Cloud, etc., and ensures that these systems are in the state required by SOC2/ISO27001. Sprinto also comes builtin with features like policies, security training, org charts, device monitoring, etc., to help you meet SOC 2/ISO27001 requirements without having to purchase new software for these. All in all, Sprinto takes care of all the compliance roadblocks and speaks the audit language on your behalf, while you focus on increasing revenue.
5
AuditBoard Logo
AuditBoard
4.6
(1,294)
AuditBoard’s modern connected risk platform is designed to elevate your teams, engage the front lines of your business, and help you leverage risk as a strategic driver. At the heart of our connected risk architecture is a unified data core that centralizes your organization's risks, controls, policies, frameworks, issues, and more. The core is surrounded by a set of powerful platform capabilities, including collaboration, automation, a robust workflow engine, business intelligence, and a highly extensible integration layer. Together, AuditBoard’s unified core and purposefully designed platform capabilities set a strong, dynamic foundation for our award-winning applications — RiskOversight, CrossComply, SOXHUB, OpsAudit, ESG, and TPRM.
6
Scrut Automation Logo
Scrut Automation
4.9
(1,146)
Automatically test your cloud configurations against 150+ CIS benchmarks across multiple cloud accounts on AWS, Azure, GCP and more, to maintain a strong infosec posture.
7
Drata Logo
Drata
4.8
(1,044)
Drata is the world's most advanced security and compliance automation platform with the mission to help businesses earn and keep the trust of their users, customers, partners, and prospects. With Drata, thousands of companies streamline risk management and over 12 compliance frameworks—such as SOC 2, ISO 27001, GDPR, CCPA, PCI DSS and more—through automation, resulting in a strong security posture, lower costs, and less time spent preparing for audits.
8
Thoropass Logo
Thoropass
4.7
(462)
9
Scytale Logo
Scytale
4.8
(437)
Compliance automation platform and dedicated expert services that fast-track and streamline 30+ compliance frameworks such as SOC 2, ISO 27001 and GDPR, as well as all your GRC processes.
10
Secureframe Logo
Secureframe
4.7
(389)
Secureframe helps companies get enterprise ready by streamlining SOC 2 and ISO 27001 compliance. Secureframe allows companies to get compliant within weeks, rather than months and monitors 40+ services, including AWS, GCP, and Azure.
Show More