
Obsidian Security
Cloud security monitoring and analytics software
SaaS security posture management (SSPM) solutions
Identity threat detection and response (ITDR) software
Insider threat management (ITM) software
Cloud security software
User threat prevention software
AI security posture management (AI-SPM) tools software
AI security solutions software
- Features
- Ease of use
- Ease of management
- Quality of support
- Affordability
- Market presence
Take the quiz to check if Obsidian Security and its alternatives fit your requirements.
Contact the product provider
Small
Medium
Large
- Arts, entertainment, and recreation
- Professional services (engineering, legal, consulting, etc.)
- Media and communications
What is Obsidian Security
Obsidian Security is a SaaS security platform that monitors and analyzes activity, configurations, and identities across business SaaS applications to reduce account compromise and data exposure risk. It is used by security operations and identity/security teams to detect suspicious behavior, investigate incidents, and enforce posture controls across common SaaS services. The product emphasizes SaaS-specific telemetry and identity context (users, OAuth apps, tokens, and admin actions) to support detection and response workflows. It also includes capabilities that map to ITDR and insider-risk use cases for SaaS environments.
Deep SaaS activity visibility
The platform focuses on SaaS-native signals such as admin actions, mailbox/file access patterns, OAuth grants, and third-party app connections. This helps teams investigate incidents that are difficult to reconstruct from network or endpoint telemetry alone. It is particularly relevant for organizations with heavy reliance on collaboration, CRM, and identity SaaS where the control plane is outside their infrastructure.
Identity-centric detection and response
Obsidian Security centers detections around identities, sessions, and authorization paths (including risky OAuth applications and token misuse). This supports ITDR-style workflows for SaaS, such as identifying anomalous privilege changes, impossible travel, and suspicious consent grants. The approach aligns well with security operations teams that need to triage account takeover and privilege abuse in SaaS.
SaaS posture and governance controls
The product includes posture management for SaaS configurations and access settings, helping teams find misconfigurations and risky sharing/permission states. It can support continuous monitoring across multiple SaaS tenants rather than point-in-time audits. This complements log-centric monitoring tools by adding configuration and entitlement context specific to SaaS platforms.
Coverage varies by SaaS app
Depth of telemetry and available controls depend on each SaaS provider’s APIs, audit logs, and permission model. Some applications provide limited event detail or delayed logs, which can reduce detection fidelity and investigation speed. Organizations should validate supported apps and the specific events/configurations available for their key SaaS services.
Not a full cloud workload tool
The product is primarily oriented to SaaS applications and identity/activity within those services rather than infrastructure and cloud workloads. Teams still typically require separate capabilities for IaaS/PaaS configuration, runtime workload protection, and broader cloud-native threat detection. This can increase the number of tools needed for end-to-end cloud security coverage.
Operational tuning and integration effort
Alert quality and usefulness often depend on baselining, policy tuning, and aligning detections to internal processes. Integrations with SIEM/SOAR, ticketing, and identity systems may require engineering time to normalize workflows and automate response actions. Without this operational work, teams may experience noisy alerts or slower time-to-value.
Plan & Pricing
| Plan | Price | Key features & notes |
|---|---|---|
| Free | $0/m (for up to 1K users) | Discover SaaS sprawl (including unsanctioned AI and shadow SaaS); detect spear phishing with no manual tuning. Source: Obsidian Security pricing page. |
| Advanced | Get a Quote (custom pricing) | Full SaaS security across organization: visibility, control, blocking high-risk access, automate compliance, accelerate investigations, reduce SIEM costs, prevent account takeover. Pricing is not listed publicly; contact sales. Source: Obsidian Security pricing page. |
Seller details
Obsidian Security, Inc.
Newport Beach, CA, USA
2017
Private
https://www.obsidiansecurity.com/
https://x.com/obsidiansec
https://www.linkedin.com/company/obsidian-security/