Demo Request
Take a personalized product tour with a member of our team to see how we can help make your existing security teams and tools more effective within minutes.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Home
Blog

Exela Pharma Sciences Leverages Reco to Reduce its Attack Surface Area and Manage Risk

Reco Security Experts
Updated
December 4, 2024
May 20, 2025
2 minutes
Ready to Close the SaaS Security Gap?
Chat with us

Exela Pharma Sciences, an award-winning US-based integrated specialty pharmaceutical company, leveraging Reco to protect its confidential pharmaceutical data, such as patented medication recipes and dosage information. Exela utilizes core SaaS applications such as Veeva CRM and Veeva Vault, Microsoft 365 (M365), and SAP on a daily basis to support its business operations.

During a time of rapid growth, the Exela security team was struggling to keep up with all the identities and applications that were being added to the corporate infrastructure. Initially relying on ingesting logs from Microsoft into its SIEM solution to gain visibility into its M365 environment proved to be an exhaustive effort, and was quickly abandoned.

To keep the company safe from damaging breaches, Exela needed a solution that would provide insight into what was being deployed, who was accessing what, and what permissions existed. Exela signed up with Reco to help.

Utilizing the Reco platform, Exela Pharma Sciences was able to:

  • Reduce risk. They identified and managed risk around 218 shadow applications. They also remediated misconfigurations, for example they removed stale accounts that were several years old, added MFA to accounts that did not have it, and changed passwords for users who shared their corporate credentials in SaaS apps.
  • Decrease configuration drift. They worked with Customer Success to build automations that enforce security policies and reduce drifts from baseline.
  • Enable visibility and observability. The team now has visibility into the complex web of identities, apps, and permissions across its SaaS ecosystem. By sending high and critical alerts through the SIEM to the Security team, SaaS risks can be addressed immediately, reducing corporate exposure.
  • Protect unique apps: Reco offers coverage for the Veeva suite, and quickly rolled out support for FreshService, Exela's niche ITSM app, in under a week.
  • Validate SSO and MFA: Reco identified dozens of apps that were not configured with SSO or MFA enforcement. Exela used Reco to remediate this and validate progress within the platform.

“Now that we use Reco we’ve reduced our attack surface area and we have the tools we need to deprovision SaaS and also change passwords for users who share their corporate credentials in SaaS applications.We have reduced both the stress and the risk that comes with our business growth because we have a handle on what’s happening across our SaaS deployments and our technology users,” says Ansari. 

Read the full customer story of Reco and Exela Pharma Sciences to learn more.

No items found.

Reco Security Experts

ABOUT THE AUTHOR

Technical Review by:
Gal Nakash
Technical Review by:
Reco Security Experts

Ready to Close the SaaS Security Gap?
Chat with us
Table of Contents
Get the Latest SaaS Security Insights
Subscribe to receive updates on the latest cyber security attacks and trends in SaaS Security.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Explore Related Posts

Closing the Context Gap: How Reco and Torq Automate the "Risky Employee" Investigation
Yaniv Blum
When an employee is flagged as a potential insider threat, traditional investigations can take analysts hours of manual cross-referencing across dozens of fragmented tools — but Reco and Torq's new Agent-to-Agent workflow changes that entirely. By combining Reco's deep SaaS identity intelligence with Torq's HyperSOC orchestration, the workflow autonomously pulls context from across the security stack — EDR, DLP, SASE, and cloud security — to deliver a confident, natural-language verdict in seconds. The result is fewer false positives, dramatically reduced MTTR, and analysts who can focus on remediation instead of chasing data.
Introducing Full AI Agent Visibility for SaaS
Andrea Bailiff-Gush
Organizations have thousands of AI agents operating across their SaaS environments, yet security teams have no visibility into what's running or what permissions these agents hold. AI agents create toxic combinations by connecting systems in ways that produce permission breakdowns traditional tools can't detect. Reco's AI agent security discovers every agent, maps the connections between systems, and gives teams control to manage risk.
Inside the ShinyHunters Experience Cloud Campaign: IOCs, Detection Logic, and What's at Risk
Nitay Bachrach
Reco is actively investigating a ShinyHunters campaign targeting organizations running Salesforce Experience Cloud sites with misconfigured guest user profiles. By exploiting publicly accessible Aura API endpoints, the threat actor claims to have compromised between 300 and 400 organizations — with cybersecurity companies deliberately targeted to enable downstream supply chain attacks. This post covers the campaign's IOCs, the detection logic needed to hunt for it in Salesforce Event Monitoring, and the underlying misconfiguration that makes it possible.
See more featured resources

Ready for SaaS Security that can keep up?

Request a demo