Eblogtip.com
  • Categories
    • News
    • Technology
    • Domains
    • Hosting
    • Promotions

Archives

  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • December 2022

Categories

  • News
  • Technology
  • Uncategorized
eBlogTip
  • Categories
    • News
    • Technology
    • Domains
    • Hosting
    • Promotions
  • Technology

Strengthening security in a multi-SaaS cloud environment

  • July 31, 2023
Total
0
Shares
0
0
0

Steven Tamm is a technology adviser to Spin.AI and a former Salesforce CTO with extensive experience in cloud computing, e-commerce, virtualization, developer tools, cybersecurity, compliance and SaaS.

Managing security across multiple SaaS cloud deployments is becoming more challenging as the number of zero-day and ransomware attacks continues to rise. In fact, recent research reveals that a staggering 76% of organizations fell victim to a ransomware attack in the past year.

It’s no secret that protecting data is hard, and with the rise of cloud technologies, it’s becoming harder. But when it comes to cloud SaaS application risk, what does that look like? And what actionable steps can teams and IT pros take to help mitigate those risks at their organization? In this article, I’m going to explore those questions and provide some insights.

Navigating the maze of SaaS challenges

Modern organizations encounter a variety of SaaS challenges, including the absence of configuration standards, multiple APIs, and user interfaces (UIs) with varying access levels and potential data leaks across interconnected systems. Securing structured data in CRM applications, communication data in messaging platforms, and unstructured data from file providers is already difficult.

However, when these systems are sourced from different vendors, it becomes even more challenging to detect and prevent attacks in a timely manner. The interconnected nature of these systems makes tracking data provenance difficult and facilitates broad spread of malware and ransomware.

This challenge is further exacerbated when organizations extend their systems to include external users. With expanding footprints, the inadvertent leakage or destruction of sensitive data becomes a significant concern. Popular platforms like Salesforce Communities, Slack Connect, Microsoft Teams, Microsoft 365, and Google Drive create a complex web of identity, permissions, and integration controls.

Unfortunately, most endpoint management tools on the market were designed for a pre-cloud, pre-bring-your-own-device (BYOD) era, making them inadequate for managing the modern SaaS landscape. So how do you take control?

Taking control with new solutions

When managing risk in the cloud, it’s crucial to select IT and security solutions that truly address the intricacies of the deployed SaaS applications and were born 100% in the cloud without any legacy on-premises components. The good news is that vendors are developing innovative solutions to help IT and security teams do this. But it’s essential to explore the options and consider the following:

First, do they go beyond basic factors such as OAuth scopes, login IP addresses, and high-level scores, and instead delve deeper into data usage patterns and even examine the code of all integrations?

Second, many major SaaS vendors provide event monitoring, antivirus protection, and basic data leak prevention as check boxes. But these features often fall short when it comes to preventing and remediating data attacks because of miscalibrated thresholds in alert systems and logs that are not tuned for specific organizations. That results in alert overload and fatigue. It’s important to understand how a solution improves risk scoring and alert prioritization.


Source link

Total
0
Shares
Share 0
Tweet 0
Pin it 0
Previous Article
  • News

Colleges are now teaching courses on how to use ChatGPT effectively – and it may be the only way forward

  • July 31, 2023
View Post
Next Article
  • News

Elon Musk’s unpopular Twitter rebrand takes another turn for the worse as Edge warns X might be a scam

  • July 31, 2023
View Post
You May Also Like
View Post
  • Technology

7 global investors discuss African tech post-Kauffman Fellows’ first summit on the continent

  • September 21, 2023
View Post
  • Technology

Poland opens privacy probe of ChatGPT following GDPR complaint

  • September 21, 2023
View Post
  • Technology

Khosla-backed HealthifyMe introduces AI-powered image recognition for Indian food

  • September 21, 2023
View Post
  • Technology

Khosla-backed HealtifyMe introduces AI-powered image recognition for Indian food

  • September 21, 2023
View Post
  • Technology

Waabi and Uber Freight partner to accelerate autonomous trucking

  • September 21, 2023
View Post
  • Technology

Here are the 6 finalists of Startup Battlefield at Disrupt 2023

  • September 21, 2023
View Post
  • Technology

Libra’s co-creator had geopolitical motivations to build the digital currency

  • September 21, 2023
View Post
  • Technology

Auctoria uses generative AI to create video game models

  • September 20, 2023

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

eBlogTip.com
  • Categories

Input your search keywords and press Enter.