What is Shadow IT? The underbelly of IT management
When managing your business' cybersecurity, the majority of your risk reduction will come from unanimous security measures. Whether it's password policies, security awareness training or SaaS app hardening, the best way to reduce your risk is to ensure that appropriate risk-reduction processes are implemented throughout the entire organization.
Cross-SaaS contamination: How to prevent unauthorized access to your organization
Over the past five years, the average SaaS usage in global organizations has grown exponentially. Whereas it's estimated that an average 16 SaaS applications were used per organization in 2017, research dictates a whopping increase of this average to 110 SaaS applications in 2021.
While this number is subject to change according to a myriad of factors, such as industry, size-of-operations, and the number of staff in an organization, it's apparent that SaaS security is a rampantly growing concern for any modern business.
SaaS to SaaS authorized apps, your ticking bombs for data breaches?
Do you want to know
What unauthorized apps staff use with their corporate email accounts?
If those apps have access to your business and customer data?
When new apps are granted and permissions change?
Security with benefits
Need to justify the budget to monitor SaaS applications? Look no further. Introducing security with benefits. With Detexian you can save money on SaaS licencing while reducing risks to your organization.
If your team is responsible for user onboarding / offboarding and keeping track of who’s got what access to which SaaS apps in your organisation, you know it’s a pain in the ass and things get missed.
Automating Cyber Risk Assessments for SaaS apps
If clients ask you to do cyber risk assessments of their corporate apps (Office 365, G Suite, Salesforce, etc) and you plan to do that manually, you’re wasting time and money.
Too much work auditing your SaaS apps?
In modern workplaces, SaaS is procured and managed by business people.
While IT has visibility into core applications such as Office 365, G Suite, Slack and Zoom, they won’t know how other sensitive data bearing SaaS apps like Salesforce, JIRA, GitHub, Xero and Slack workspaces are managed by the various other business teams.
Guide for the Board and management to get on top of organisational SaaS risks
Getting on top of risks with Office 365, G Suite, and many other SaaS apps across your business begins with data insights. Do you have the data to begin?
Cyber Risk Management - Trust but verify
A key activity in setting up any new relationship with a third party is to assess any cyber risks to decide whether it is safe to proceed. A cyber risk assessment also ensures that both parties can agree on terms and conditions in any agreements related to managing cybersecurity risks.
In the world of cyber risk management, this means getting some proof that sound security management practices are in place.
Why SSPM is becoming an integral part of risk management for every business
SaaS Security Posture Management (“SSPM”) is a new Gartner category defined as “tools that continuously assess the security risk and manage the security posture of SaaS applications.”
Core capabilities include reporting the configuration of native SaaS security settings and offering suggestions for improved configuration to reduce risk. Optional capabilities include comparison against industry frameworks and automatic adjustment and reconfiguration.
Meeting MAS’s new technology risk management guidelines for SaaS-powered businesses
The key component of the revised Guidelines is reinforcing the “importance of incorporating security controls” in technology development and delivery lifecycle, as well as in the deployment of emerging technologies. It spells out that third-party services are to be assessed and managed ongoingly.
Founder Introduction: Andy Budiman
Detexian is not my first rodeo in a start-up. Back in 1999 after only 1 year from Design college graduation, I started my own business in web design and development in Perth, Australia. It was during the dot com boom, I was way too confident back then, thinking that it would be a walk in a park and in a way, for the first few years or so, it did feel like that. Armed with a design award that I won and multiple job offers from interstate and overseas, my ego was at an all-time high, I thought I knew it all.
Solidifying customer confidence in security due diligence
If you’re a B2B business looking to or already supplying to large organisations, you will probably have noticed an uptick in the number of questions and the “proof” of information security controls asked of you for systems that host business critical and customer sensitive data.
These are not difficult questions to answer but can be very time consuming. However, your reputation may be on the line over time if you fail to provide proof to your customers that internal information security management systems (ISMS) you said you have are actually enforced.
Founder Introduction: Adrian Kitto
Before I co-founded Detexian as the CTO, I had a long career in Information Technology which started onboard HMNZS Te Kaha as an Electronics Technician. Working on classified equipment at sea was my first exposure to both security and doing things right the first time, a mantra I still live by today.
Detexian on Startup Daily TV
Watch our Co-Founder/ CEO Tan Huynh on Startup Daily TV talking about SaaS risk blind spots.