Enhancing SaaS Security at Rightmove with Peritus

Discover how we empowered Rightmove to navigate evolving SaaS cyber threats, strengthen their SaaS security posture, and stay ahead of emerging risks—ensuring long-term resilience and success.

  • Limited Visibility: Rightmove lacked comprehensive insight into its SaaS environment, making it difficult to identify and address security vulnerabilities.

  • Misconfigurations: Undetected configuration errors increased the risk of unauthorised access and potential data breaches.

  • Excessive Permissions: Overprivileged user accounts created unnecessary exposure to internal and external threats.

  • Unmonitored Third-Party Integrations: Reliance on numerous third-party applications introduced additional risks, which were not actively managed.

  • Compliance Risks: Gaps in security posture posed challenges in maintaining compliance with industry standards and regulations.

Rightmove, the UK’s leading property platform, faced increasing challenges managing its expanding SaaS environment. With critical applications growing, the risk of data breaches and compliance violations loomed. Discover how Rightmove partnered with Peritus to overcome security blind spots and achieve comprehensive protection for their sensitive data.

Challenges

Solution

Peritus provided Rightmove with a comprehensive SaaS Security Posture assessment and an integrated solution to address these challenges. Key features of the solution included:

1. Provided Full Visibility into Rightmove’s SaaS Ecosystem

Rightmove relied on multiple SaaS applications for data management, customer engagement, and business operations. Our solution:
✔ Automatically discovered and inventoried all SaaS applications in use (e.g., Salesforce, Microsoft 365, Google Workspace).
✔ Provided a centralised view of user access, permissions, and configurations.
✔ Detected shadow IT and unauthorised SaaS use, preventing data exposure.

2. Enabled Continuous Monitoring & Risk Detection

Rightmove stored sensitive customer data, making security a top priority. Our solution:
✔ Identified misconfigurations that could have led to data leaks or insider threats.
✔ Flagged overprivileged user accounts and insecure third-party integrations.
✔ Detected unauthorised access attempts and unusual activity, reducing the risk of account takeover attacks.

3. Automated Security Policy Enforcement

Rightmove needed to ensure consistent security policies across all SaaS platforms. Our solution:
✔ Automated security checks and enforced best practices, reducing human error.
✔ Blocked risky third-party applications from accessing sensitive data.
✔ Ensured role-based access control (RBAC) was properly configured to limit excessive permissions.

7. Scaled SaaS Security as Rightmove Grew

As Rightmove expanded its services and technology stack, Our solution:
✔ Scaled alongside new SaaS applications and cloud environments.
✔ Ensured consistent security policies even as user roles and permissions evolved.
✔ Reduced manual security efforts, allowing the team to focus on innovation

5. Simplified Compliance & Audit Readiness

Rightmove needed to comply with GDPR and other industry regulations related to data privacy. Our solution:
✔ Ensured SaaS configurations aligned with regulatory requirements.
✔ Generated audit-ready reports, saving time and effort during compliance reviews.
✔ Continuously monitored data access and sharing policies, reducing legal and financial risks.

6. Secured Third-Party App Integrations

Rightmove integrated with many third-party applications to enhance its platform. Our solution:
✔ Identified risky, non-compliant third-party apps with access to customer data.
✔ Helped secure API connections to prevent unauthorised data sharing.
✔ Enforced strict app approval workflows, ensuring only trusted integrations were used.

4. Accelerated Incident Response & Threat Mitigation

✔ Provided real-time alerts on suspicious SaaS activities.
✔ Sped up investigations by offering context on affected users, apps, and data.
✔ Integrated with SIEM, SOAR, and IAM solutions for seamless remediation.

“Without this project, we would still be looking for a sustainable way to have an overall view of our security estate.”

Tom Hanley - Information Security Manager, Rightmove

Results

With Peritus’ support, Rightmove achieved the following outcomes:

  • Enhanced Security: Gained comprehensive visibility and control over its SaaS environment, effectively mitigating risks.

  • Operational Efficiency: Reduced manual effort and complexity, allowing the IT team to allocate resources more effectively.

  • Continuous Compliance: Ensured adherence to industry standards and regulations, reducing the risk of penalties or reputational damage.

  • Data Protection: Safeguarded sensitive customer and operational data, strengthening trust with stakeholders.

  • Uninterrupted Productivity: Implemented robust security measures without disrupting daily operations.

At Peritus, our goal is to empower clients to take control of their SaaS environments with confidence. Rightmove’s success demonstrates how the right tools and expertise can transform complexity into clarity.

Tim Barrow, Managing Director, Peritus

Conclusion

Through its partnership with Peritus, Rightmove transformed its approach to SaaS security. By addressing blind spots, reducing vulnerabilities, and simplifying compliance management, Rightmove was able to confidently secure its applications and protect its data. This case study underscores the importance of leveraging experts like Peritus to navigate the complexities of SaaS security in today’s continuously evolving digital landscape.

Facing similar to challenges in your business now?

Why Peritus

Our capabilities as a cyber security specialist focus on providing disruptive security technologies, services, and bespoke professional service engagements. We aim to help our customers stay ahead of the curve by evaluating fast-growing and innovative technologies that enhance and complement their security environments. At Peritus, we value our customers as more than just numbers; we consider them design partners. Once they onboard with us, we become an extension to their security teams.

We understand that each customer has unique needs, and therefore, we do not adopt a 'one-size-fits-all' approach. As specialists in the market, we excel in security and focus on delivering solutions tailored to our customers' specific requirements.