Identity & Access | SaaS & AI Security

You can't talk security without visibility

We help growing European companies see who has access to what, which tools their teams actually use, and where their data is going.

Then we fix what needs fixing

Partnered with:

We audit environments built on

50%

former employees can still access your systems after offboarding

3x

more SaaS apps than IT tracks in the average 100-person company

78%

of employees are already using AI tools their company hasn't approved

The tools are everywhere.
The visibility isn't

Growing companies have a pattern. A new tool gets adopted by one team. Then another. Then someone leaves and nobody removes their access. Then a developer starts using an AI assistant that's quietly processing customer data. Then an auditor asks for a list of every system with access to personal information.

That list doesn't exist.

We've seen this across dozens of European companies, from 30-person software houses to large manufacturing companies.

Three areas, one problem

The access chaos, the SaaS sprawl, and the AI tool risk are mostly symptoms of the same thing: the company grew faster than the infrastructure that governs it.

We work across all three because fixing one without the others doesn't hold.

Identity and Access Management

You probably have more active accounts than active employees

Former contractors still in Slack. Developers with admin rights from a role they left two years ago. Offboarding that happens in HR only.

The result is that you can't answer the question any auditor or enterprise client will eventually ask: who has access to your systems right now, and why?

We map what you have, close the gaps, and put a process in place so it stays closed and fully manageable. Part of that is finding the right tools for where you actually are, not the vendors we prefer.

Typical scope:

Access audit across your full tool stack

SSO, directory and MFA setup

Joiner, mover, leaver process design

Offboarding automation

Quarterly access review cadence

Tool selection sized to your company

SaaS Governance

Your team is already using tools you don't know about

At 100 people, the average company runs 200+ SaaS tools.
IT knows about 60 of them.

The rest sit on personal cards, free tier accounts, and that recurring charge nobody can explain. Each one processing personal data is a gap in your GDPR register. Each one is a door you don't control.

We find what's there, cut what shouldn't be, and set up a process so the stack stays visible going forward. We also help you pick the right tools for the job.

Typical scope:

Full SaaS discovery and inventory

Shadow app identification and risk assessment

Tool selection matched to your size and needs

App request and approval workflow

AI Security

78% of your employees are already using AI tools at work

Developers using coding assistants that pull from internal repos. Marketing pasting client briefs into ChatGPT. Support staff using tools with no data processing agreement in place.

About 27% of what goes into AI tools is sensitive information and that number doesn't drop with wider and wider AI adoption.

Banning everything doesn't work either. We've watched that play out. People use the tools anyway, just less visibly.

We map what's in use, assess where the real risk is, and build workflows that help your employees use AI correctly while you stay in control of the situation and can prevent incidents easily

Typical scope:

AI tool discovery across the organisation

Risk assessment by tool and use case

Acceptable use policy

Approved tools framework

GDPR and further compliance review

Tool selection for monitoring and governance

The Shadow Risks Map 2026
214 days

average time a former employee retains access to corporate apps

7 minutes

this long it takes to run our free SaaS X-Ray audit and see every app connected to your environment

The Shadow Risks Map 2026

How many of the 17 boxes can you check?

The full map with detailed risk breakdowns across Identity, SaaS, and AI, how they connect at the intersections, and an 17-point self-assessment checklist to see where your company actually stands today.

Share it with your team. Use the checklist in your upcoming security review. Pin the map where your IT team can see it.

We know what works

We work across Identity, SaaS management and AI security tooling. We recommend what's right for each situation, but after enough implementations you develop opinions...

identity infrastructure for the AI era

Most IAM platforms were built for enterprises with dedicated IT teams and six months to implement. YeshID covers what a growing company actually needs without significant overhead to run.

secure remote access to all technologies

Rublon is able to securely connect your users with almost any technology that they want to use.

It offers dedicated modules and software that integrates Rublon with cloud and on-premise applications using SAML, RADIUS and more.

Guides & Frameworks

Practical guides for IT teams at European companies

zero-trust-framework
Zero Trust

Zero Trust: A Modern Framework for Digital-First Companies

Enhance security with zero trust security models & architecture. Strict access controls for all access.
local-admin-rights
Admin Access

Remove Local Admin Rights: Balancing Security and Productivity

Boost security and productivity by limiting admin privileges. Explore the idea of removing local rights while applying least privilege principles.

Identity-oriented. Practitioner-led. European.

We're Julian and Dawid. We worked in enterprise identity and access management — deploying PAM solutions, running security reviews, and explaining to boards why IAM budgets need to go up.

We kept meeting IT managers and CTOs at European companies, smart people with limited budgets, who were drowning in shadow SaaS, unmanaged AI tools, and compliance pressure.

That's why we decided to address this with unshadow, where we help keep the full spectrum of your infrastructure visible and governable.

Talk to Julian & Dawid

Most first conversations start with not quite knowing what you have or where to begin. That's normal.

Tell us what's going on and what prompted the conversation:
an upcoming audit, something that happened, a client requirement, or just a sense that things have gotten messy.

We can take it from here!

julian@unshadowit.com
dawid@unshadowit.com
Schedule a Discovery Call →
Message received. We'll be in touch soon.
Something failed. Try again or call us directly.