New Features Introduced in January 2026
Focus
Focus
SaaS Security

New Features Introduced in January 2026

Table of Contents

New Features Introduced in January 2026

Learn about the new features that became available in SaaS Security in January 2026.

Integrate Behavior Threats Incidents into Cortex XSIAM

SaaS Security supports integrating Behavior Threats incidents directly into Cortex XSIAM, enabling security teams to centralize behavioral alerts alongside all other security telemetry. This integration allows for a unified and more efficient response to sophisticated threats.
Key Features:
  • Unified Security Posture: BT incidents are forwarded to a dedicated HTTP Log Collector in XSIAM for centralized monitoring.
  • Standardized Data: Incident data is sent automatically in JSON format, including details like severity, description, and user email, using the ba_incident_event log type.
  • Push-Based Model: The integration uses a reliable push model to ensure timely delivery of new incidents.
Setup Notes:
The configuration is a two-step process: first, preparing the JSON-configured HTTP Log Collector in XSIAM to obtain the URL and API Key; and second, registering the XSIAM tenant within the BT environment via the SRE/Engineering support service.
This integration is not retroactive. Cortex XSIAM will only receive BT incidents generated after the integration is successfully completed.

Enhanced Filtering Support in Behavior Threats

To streamline threat investigation and incident management, SaaS Security has introduced a new Filter by Policy capability within the Behavior Threats dashboard. This enhancement allows security administrators to quickly isolate specific types of risks by filtering the incident view based on the underlying detection policy.
With this update, you can now target high-priority behavioral anomalies such as abnormal location access, bulk data downloads, or suspicious uploads with a single click. By narrowing the focus to specific policy violations, security teams can significantly reduce noise, prioritize critical alerts, and accelerate response times for potential insider threats or account compromises.
This feature provides more granular control over how you view and assess threats, ensuring that your security operations center (SOC) can efficiently manage the complex landscape of SaaS application behavior. This capability is now available in the Behavior Threats monitoring view under the incident filters.

Support for Onboarding Office 365 Apps in Read-Only Mode in Data Security

When you need to assess your application security without allowing automated remediation actions, read-only connectors provide a secure solution that limits access permissions while delivering critical visibility. This feature addresses a key customer requirement for security assessment without modification capabilities, particularly in sensitive environments or during initial deployment phases. Data Security enables you to onboard the Office 365 app in read-only mode during the onboarding process, which establishes connections with appropriate limited permissions that prevent any changes to your cloud resources. This approach enables security monitoring, compliance verification, and risk assessment while maintaining strict change control procedures within your organization.
Read-only mode is especially valuable when you want to evaluate security monitoring capabilities before granting remediation permissions, when working with highly regulated environments where change processes require manual approval workflows, or when you need to provide security visibility to teams who should not have modification rights. The connector still provides comprehensive visibility while respecting your organization's operational boundaries. You can later upgrade read-only connectors to full read-write access when your organization is ready to implement automated remediation capabilities.

Support for Onboarding Microsoft Teams App in Read-Only Mode in Data Security

When you need to assess your application security without allowing automated remediation actions, read-only connectors provide a secure solution that limits access permissions while delivering critical visibility. This feature addresses a key customer requirement for security assessment without modification capabilities, particularly in sensitive environments or during initial deployment phases. Data Security enables you to onboard the Microsoft Teams app in read-only mode during the onboarding process, which establishes connections with appropriate limited permissions that prevent any changes to your cloud resources. This approach enables security monitoring, compliance verification, and risk assessment while maintaining strict change control procedures within your organization.
Read-only mode is especially valuable when you want to evaluate security monitoring capabilities before granting remediation permissions, when working with highly regulated environments where change processes require manual approval workflows, or when you need to provide security visibility to teams who should not have modification rights. The connector still provides comprehensive visibility while respecting your organization's operational boundaries. You can later upgrade read-only connectors to full read-write access when your organization is ready to implement automated remediation capabilities.