DoControl Unveils No-code Security Workflows Triggered by SaaS to Enforce Data Access Control

DoControl, an automated software as a service (SaaS) security company, announced what it calls “the first no-code security workflows” to extend zero trust beyond the identity, device and network into the SaaS data layer.

Triggered by hundreds of SaaS event types, DoControl’s security workflows address shortcomings of inflexible hard-coded and out-of-the-box policies by enabling consistent, granular and customizable data access controls. This allows IT and security teams to enforce SaaS security policies throughout disparate applications being used by organizations, all from a single platform.

By overcoming the fundamental problem associated with applying effective data access security controls to critical SaaS applications, IT and security teams can address a range of use cases driven by more than 500 SaaS event types, and select the exact actions, triggers, remediation steps and paths taken in a visual “drag-and-drop” canvas.

Workflows are customizable to specific applications or use cases via a catalog of playbooks and pre-established templates to help meet organizational security program requirements. Over time, DoControl will recommend specific policies based on environmental factors and behavioral patterns that present high levels of risk.

“Security teams are becoming increasingly frustrated with the lack of visibility and control over all the identities and entities connecting to critical business applications. Addressing this problem via a manual process or through building a custom solution from the ground up is not feasible for modern businesses” said Guy Rosenthal, vice president of product. “By creating the first and only workflow engine that truly enforces consistent and secure data access control policies, our customers can extend Zero Trust to the SaaS application data layer and establish a strong security posture throughout their SaaS estate.”

DoControl’s Security Workflows deliver:

  • Complete Threat Modeling Coverage – Close the gap on existing SaaS application vulnerabilities and risks through automated, self-service remediation.
  • Limitless Customizations and Use Cases – Trigger workflows based on any SaaS event, which are customizable and can be defined from more than 100 pre-established templates.
  • Centralized Enforcement – Enforce consistent data access controls across diverse SaaS application environments from a single location.
  • Optimized End-user Experience – Enable citizen developers to streamline secure automated workflows via a no-code, “drag-and-drop” platform.

For more information, visit