by Dana T | Feb 23, 2023 | SaaS Security
Shadow IT has long been recognized as a major concern for organizations regardless of their size or industry. The loss of IT and security teams’ control over the technologies their employees use results in various and significant security risks. This is even more true...
by Dana T | Feb 15, 2023 | Cloud
In the fields of app security and cloud security, there is a relatively new term called ‘Shift Left.’ The concept is that if you examine the development cycle from left to right (planning and design, implementation, testing and fixes, deployment, and...
by Dana T | Jan 11, 2023 | Cloud
While the term “Shadow IT” can include everything from employee-owned mobile devices to the ubiquitous Internet of Things (IoT), it typically refers to browser-based cloud applications and similar services, often simply referred to as “SaaS”. As organizations...
by Dana T | Dec 18, 2022 | SaaS Security
We often get asked how our product (an SSPM) compares to Cloud Security products such as CSPMs. At its core, this question surrounds the topic of what are the differences between SaaS security and Cloud security. Since they’re protecting two different aspects of...
by Dana T | Dec 11, 2022 | SaaS Security
With SaaS apps playing a central role in your business’ daily workflow, it’s crucial that you’re able to create and implement an effective SaaS security strategy and protocol to keep your company safe. Why Visibility Into Your SaaS Environment Is Mission Critical As...