Too much work auditing your SaaS apps?

In modern workplaces, SaaS is procured and managed by business people. 

While IT has visibility into core applications such as Office 365, G Suite, Slack and Zoom, they won’t know how other sensitive data bearing SaaS apps like Salesforce, JIRA, GitHub, Xero and Slack workspaces are managed by the various other business teams.

Continue Reading
Too much work auditing your SaaS apps?

Meeting MAS’s new technology risk management guidelines for SaaS-powered businesses

The key component of the revised Guidelines is reinforcing the “importance of incorporating security controls” in technology development and delivery lifecycle, as well as in the deployment of emerging technologies. It spells out that third-party services are to be assessed and managed ongoingly.

Continue Reading

Get the latest
information on SaaS security

Solidifying customer confidence in security due diligence

If you’re a B2B business looking to or already supplying to large organisations, you will probably have noticed an uptick in the number of questions and the “proof” of information security controls asked of you for systems that host business critical and customer sensitive data.

Continue Reading

Security evidence you need to win deals from financial institutions

As new information security regulations are coming into effect around the world, the way we do business with regulated industries is also changing. The financial services industry is leading the way in firming up vendor security assurance requirements, from self-attesting to providing evidence of accountability, processes, systems and controls in place.

Continue Reading

Is auditing SaaS permissions a time sink?

For most, SaaS privileged access audit is a manual and resource-intensive process. Painful to do, it doesn’t get done frequently enough.

Continue Reading

Eliminate SaaS risk blind spots

info@detexian.com
710 Collins Street
Melbourne VIC 3008
Australia
 
9848 Mercy Rd #2
San Diego 92129
USA

Get the latest information about SaaS security misconfigurations

Copyright Detexian 2021 All Rights ReservedTerms & ConditionsPrivacy Policy