Nudge Security tells you
what vendors have access to.
BLACKOUT tells you what they
do with it.
Nudge Security discovers SaaS applications through OAuth grants and SSO patterns. It answers “what apps are connected to our systems?” That’s SaaS discovery.
BLACKOUT answers “what are those apps actually doing?” That’s GTM Security.
Knowing what’s connected is step one. Watching what it does is step two.
Nudge Security — What Has Access
Discovers the keys. Doesn’t watch the doors.
BLACKOUT — What They Do With It
Watches the doors. Shows you what went through them.
Same vendor. Two views.
- OAuth grant: HubSpot → 6sense
- Scopes: contacts.read, companies.read, deals.read
- Connected by: marketing@company.com
- Connected on: Jan 15, 2026
- Status: Active
- 6sense beacon fires pre-consent (12ms after page load)
- Transmits visitor UUID, session ID, IPv6 address to b.6sc.co
- Sets 12-month persistent cookie (6suuid)
- Loads 4 undisclosed third-party scripts via initiator chain
- Session replay active before consent interaction
- DPA claims 3 subprocessors — scanner observes 7 data recipients
- Visitor intent data resold to competing accounts
Nudge correctly identified the OAuth grant and its scope. That’s valuable. But the scope doesn’t tell you what’s happening at runtime. The grant says “contacts.read” — the behavior says “pre-consent beacon with session replay to undisclosed third parties.”
Discovery + Observation = Complete vendor accountability.
Nudge Security tells you what’s connected. BLACKOUT tells you what it’s doing. Together they close the loop: know what has access, then verify it’s behaving as agreed.
Separately, each solves half the problem. Nudge without BLACKOUT is an inventory with no behavioral verification. BLACKOUT without Nudge is behavioral observation that may miss apps connected through OAuth grants that don’t inject client-side scripts. The complete picture requires both surfaces.