Checklist: Make Sure Your SaaS Vendor Is Secure

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
Previous Checklist: Make Sure Your SaaS Vendor Is Secure-1 Next

Click through for nine key tactics for ensuring that security is built into your SaaS solution.

SaaS brings with it a unique set of challenges for those responsible for security. Barmak Meftah, senior vice president at Fortify Software, says the most important shift is looking at your software vendor not as a product company, but rather as a service provider in a guest commentary over at our CTO Edge site. Sound vendor management practices dictate that any third-party software is at least as secure as in-house packages, Meftah advises.

We've taken his checklist of steps to ensure that a SaaS vendor's solution is secure and listed them in this handy slideshow, but do be sure to check out Meftah's full column.
His final piece of advice? Remember that software is secure only when it’s built that way.
 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.