123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Saas Security Final Piece Before Adoption Spreads

Profile Picture
By Author: Skyhighnetworks
Total Articles: 54
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

According to industry research from IDG, the companies want to adopt new cloud technology but are waiting until SaaS Security is more developed. That’s the situation US auto parts supplier Artes Electric is in. Their CIO Eric Atkins said at a panel at RSA Conference, “We see a lot of value in SaaS applications but are taking a wait-and-see approach before uploading our sensitive data.”

Experts agree, there is still some ways to go before SaaS applications meet the security and compliance requirements of corporate customers. The context of the information being uploaded is also important. According to Justin Somaini of Box, “a [movie] script is just a file for all intents and purposes. But movies are there to get an emotional reaction.”

That makes the actual footage of the movie much more valuable. Leaking a blockbuster movie online before it debuts in theaters can impact the bottom line of content owners. In the case of the largest movies, these breaches can dampen theater ticket sales by tens or even hundreds of millions of dollars over the ...
... initial release of the movie in theaters.

That makes uploading such data to the cloud look risky for production companies.

Still, there are significant benefits to leveraging on demand services despite SaaS Security. Being able to collaborate on a film in real time anywhere in the world is much easier with the new generation of collaboration tools than just using email and other traditional applications.

What’s needed before more widespread adoption of SaaS in enterprises is greater visibility into what apps employees are using and their risk.

From there, security teams can determine which ones pose a risk and which ones are safe enough to host sensitive information. “It’s all about the context of the information and the security controls of the SaaS application.”

Author :
Skyhigh Networks, the Cloud Security Services company, enables companies to embrace Cloud Security Services with appropriate levels of security, compliance, and governance while lowering overall risk and cost. With customers in financial services, healthcare, high technology, media, manufacturing, and legal verticals, the company was a finalist for the RSA Conference 2013 Most Innovative Company award and was recently named a "Cool Vendor" by Gartner, Inc. Headquartered in Cupertino, Calif., Skyhigh Networks is led by an experienced team and is venture-backed by Greylock Partners and Sequoia Capital. For more information, visit us at http://www.skyhighnetworks.com/saas-security/ or follow us on Twitter@skyhighnetworks.

Total Views: 406Word Count: 401See All articles From Author

Add Comment

Computers Articles

1. Few Good Insights To Follow With Pc Gaming In Australia!
Author: Jack Williams

2. Transform Your Online Store With Australia's Leading Ecommerce Developers
Author: themerchantbuddy

3. How To Choose The Right Technology For Your mobile App?
Author: goodcoders

4. The Rise Of User Centered Web Design
Author: goodcoders

5. Reasons Why Laravel Perfect For Web Development?
Author: goodcoders

6. Ssd Vs Sas Vs Sata Drives: Which Is Better For Your Dedicated Server Hardware?
Author: The CyberTech

7. Raid Servers And Data Protection: Common Myths About Raid Servers
Author: The CyberTech

8. Top 8 Do's And Don’ts When Dealing With A Corrupted Sd Card
Author: The CyberTech

9. Nvme Vs Ssd: What To Choose For Your Storage Solutions?
Author: The CyberTech

10. 8 Common Data Recovery Myths Exposed!
Author: The CyberTech

11. Understanding Ssd Lifespan: Signs, Durability, Data Recovery, And Factors Affecting The Life Of An Ssd
Author: The CyberTech

12. Server Data Recovery Solutions: When Your Raid Server Is Crashed!
Author: The CyberTech

13. Data Recovery Solutions For Undetected Ssd On Bios
Author: The CyberTech

14. Problems Faced By Mobile Phone Users: Green Line Issue, Motherboard Failure, Phone Stuck On Logo And Mobile Data Recovery Possibilities
Author: The CyberTech

15. Ssd Vs Hdd: Weaknesses, Data Recovery Factors And Failure Rates
Author: The CyberTech

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: