123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Saas Security Final Piece Before Adoption Spreads

Profile Picture
By Author: Skyhighnetworks
Total Articles: 54
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

According to industry research from IDG, the companies want to adopt new cloud technology but are waiting until SaaS Security is more developed. That’s the situation US auto parts supplier Artes Electric is in. Their CIO Eric Atkins said at a panel at RSA Conference, “We see a lot of value in SaaS applications but are taking a wait-and-see approach before uploading our sensitive data.”

Experts agree, there is still some ways to go before SaaS applications meet the security and compliance requirements of corporate customers. The context of the information being uploaded is also important. According to Justin Somaini of Box, “a [movie] script is just a file for all intents and purposes. But movies are there to get an emotional reaction.”

That makes the actual footage of the movie much more valuable. Leaking a blockbuster movie online before it debuts in theaters can impact the bottom line of content owners. In the case of the largest movies, these breaches can dampen theater ticket sales by tens or even hundreds of millions of dollars over the ...
... initial release of the movie in theaters.

That makes uploading such data to the cloud look risky for production companies.

Still, there are significant benefits to leveraging on demand services despite SaaS Security. Being able to collaborate on a film in real time anywhere in the world is much easier with the new generation of collaboration tools than just using email and other traditional applications.

What’s needed before more widespread adoption of SaaS in enterprises is greater visibility into what apps employees are using and their risk.

From there, security teams can determine which ones pose a risk and which ones are safe enough to host sensitive information. “It’s all about the context of the information and the security controls of the SaaS application.”

Author :
Skyhigh Networks, the Cloud Security Services company, enables companies to embrace Cloud Security Services with appropriate levels of security, compliance, and governance while lowering overall risk and cost. With customers in financial services, healthcare, high technology, media, manufacturing, and legal verticals, the company was a finalist for the RSA Conference 2013 Most Innovative Company award and was recently named a "Cool Vendor" by Gartner, Inc. Headquartered in Cupertino, Calif., Skyhigh Networks is led by an experienced team and is venture-backed by Greylock Partners and Sequoia Capital. For more information, visit us at http://www.skyhighnetworks.com/saas-security/ or follow us on Twitter@skyhighnetworks.

Total Views: 522Word Count: 401See All articles From Author

Add Comment

Computers Articles

1. Modern Software At Scale: A Practical Guide To Microservice Development
Author: Tech Gazebos

2. The Financial Cost Of Ignoring Computer Repairs: A Westlake Case Study
Author: Arun Singh

3. Cloud Computing Companies In India | Cloud Hosting Service Providers In India | Sathya Technosoft
Author: Sathya Technosoft

4. Embedded Systems Advantages And Disadvantages
Author: Embeddedhash

5. Why Essae Pos Machines Are Ideal For Retail Growth
Author: pbs

6. Best Wordpress Development Companies In India For Business Growth
Author: Web Panel Solutions

7. How Enterprises Leverage It Consulting Companies In The Usa For Cybersecurity
Author: Abiel

8. Cash Drawer Security Tips For Retailers | Prime Poskart
Author: prime poskart

9. Successful Vb6 Migration And Upgrade
Author: Tech Gazebos

10. Soluzioni Complete Per La Stampa In Ufficio: Assistenza, Noleggio E Manutenzione Professionale
Author: Mihai Filip

11. Cheap Vps Hosting & Dedicated Server Solutions – Fast, Secure & Affordable | Rackoona
Author: Rackoona

12. Reliable Temperature Monitoring Solutions Enhancing Drug Safety And Freezer Storage Compliance By Tempgenius
Author: Chris Miller

13. Spark Matrix™: Evaluating Security Information And Event Management (siem) Solutions For Scalable And Intelligent Security Operations
Author: Umangp

14. How To Get In Touch With Bellsouth Customer Service By phone?
Author: frank rayan

15. Bca In Cyber Security Online: Curriculum, Labs, And 2025 Modules
Author: UniversityGuru

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: