SlideShare a Scribd company logo
Kannan Subbiah
Knowledge Universe Technologies India Pvt Ltd
Own a house
                        Vs
                   Rent a house

  Own a Car
     Vs
Engage Call Taxi
•Chargeable unit
                         •Geographical boundary
                         •Business Domain
                         •Implementation Partners
                         •…



•Hosting infrastucture
•Support Multi-tenancy      •On-boarding / Exit
•Scalability                •Customer Support
•Internationalization       •Service Level
•…                          •Contract terms
                            •…
Subscribed
                                                                    Self subscribe
                                                     Hosted        to the software
                                                                      or parts of
                             Hosted                  (ASP)
Affordability




                                                                      software.
                               Software               Software      Customizable
                In-house     Owned and               rented, but   by tenants to an
                 H/W, S/W     Managed,              not designed        extent
                owned and   Infrastructure             to scale
                managed.        rented



                                             Time
   Multi Tenancy
   Subscription based service
   Scalability
   Manageability
   Self Service Sign-up
   Tenant specific customization
Attribute                 Traditional                   SaaS
Application Delivery      Installed                     Hosted
Updates / Release Cycle   Larger / Longer               Smaller / Shorter
Pricing                   One Time + Maintenance        Subscription
Accounting                CAP-EX                        OP-EX
Implementation            Engage Partners /             Simple, end user
                          consultants                   configurable
Operating Platform        Multiple                      Single
Value proposition         Once at the time of selling   Continuous
   Pay per use
   Any where Access
   Subscription to service not software
   Least or no investment on infrastructure
   Stronger protection for IPR
   Operational control of the environment
   Recurring revenue stream
   Shared Infrastructure – PaaS / IaaS
   Microsoft – 4 level
     Scalability, Multi- Tenancy and Configuration
   Forrester – 6 Level
   SEI – for assessing the organization and not the
    application
   Euro Cloud Star Audit
   None of them are popular
   Level 0 – Outsourcing
   Level 1 – Manual ASP
   Level 2 – Industrial ASP
   Level 3 – Single-app SaaS
   Level 4 – Business Domain SaaS
   Level 5 – Dynamic Business Apps
   Solution Design to address
       Internationalization
       Cloud Infrastructure
       Support business & operating model
       Multi-tenancy
       Extensibility
       Security and Audit
       Wider scope - cover industry needs
   Must Support
   Larger impact
   SLA driven
   Disclaimers
   Increased Focus on
       Reliability
       Availability
       Extensibility
       Scalability
       Quality, etc
   Migration from existing software
   Application Integration
   Data Integration
   Data Mining
   Authentication, Single Sign-on
   Network infrastructure
   Areas of support to include
       Hosting infrastructure
       Data center operations
       Systems and network monitoring
       Billing
       Customer education
   Longer customer retention for better RoI
   Agile approach
   Rapid releases and upgrades
   Primary focus on
       Rapid action on feedbacks
       Usage statistics
       Predict industry trends
       Platform and tools used
       Automated testing
       Service aggregation
   Driving Contracts online
   Termination and Migration
   Security, Privacy and related risks
   Country specific regulations
   SLAs
Data Security
        IdM & SSO                                          Data
                                                        Seggregation




Back up &                                                      Deployment
Recovery                                                         Model
                            SaaS Security



Availability                                                   Deployment
                                                               Environment
                    Regulatory               Network
                    Compliance               Security
Data Security




   Data Location
   Data Encryption
   Data Integration APIs
   Access Logs
   Return / destruction of data upon exit
Data
                                                Seggregation




   Understand the Data & Application Architecture
       Separate Physical / Virtual Server(s)
       Separate Instance on shared hardware
       Separate Database
       Shared Database
   Authentication and Authorization
Deployment
                                               Model




   Security aware developers
   Application Design
     Application / Data Partitioning
     Information Sensitivity
     Design for Performance & Scalability
   Configuration Management
   Security Testing
   Threat Remediation
   Build & Release Cycles
Deployment
                                      Environment




   Boundary Protection
   Resource Priority
   Configuration Management
   Cloud Infrastructure
     Certification / accreditation
     Continuous Monitoring
     Audit
Network
                                       Security




   Transmission Integrity
     Secure Data in transit (SSL)
   Intrusion Detection & Prevention
   Other standard security measures
       Man-in-the-middle
       IP Spoofing
       Port Scanning
       Packet Sniffing
Regulatory
                                     Compliance




   Global Legal compliance
       SAS 70
       SOX
       HIPAA
       …
   Contractual obligations
   Need for Logs and Audit Trails
   Data Retention needs
Availability




   Application Design and Architecture
     Design for performance
     Graceful exits
     Instance Isolation
     Custom Code Modules
   SLA
     Uptime Guarantees
     Maintenance / Outage Notifications
     Documented BC & DRP plans
   Code Escrow
Back up &
                                          Recovery




   Infrastructure
   Protection of back up location
     Encryption
     Access control to Backup location
   Recovery
     Documented process
     Drills
IdM & SSO




   Who manages it?
   Checks & Controls
     Id provisioning
     Secure storage
     Password Policies
   Federated IdM
     Trust relationships with tenants
     Secure federation of user identities
   Follow Me
       Email: kanna@vsnl.com
       Facebook: http://www.facebook.com/kannan.subbiah
       LinkedIn: http://in.linkedin.com/in/ksubbiah
       Blog: http://www.kannan-subbiah.com

More Related Content

What's hot

Cloud Security Governance
Cloud Security GovernanceCloud Security Governance
Cloud Security Governance
Shankar Subramaniyan
 
SaaS Security.pptx
SaaS Security.pptxSaaS Security.pptx
SaaS Security.pptx
chelsi33
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
AWS User Group Bengaluru
 
Intro to AWS: EC2 & Compute Services
Intro to AWS: EC2 & Compute ServicesIntro to AWS: EC2 & Compute Services
Intro to AWS: EC2 & Compute Services
Amazon Web Services
 
Cloud Computing and Microsoft Azure
Cloud Computing and Microsoft AzureCloud Computing and Microsoft Azure
Cloud Computing and Microsoft Azure
Suhail Jamaldeen
 
Microsoft Azure Fundamentals
Microsoft Azure FundamentalsMicrosoft Azure Fundamentals
Microsoft Azure Fundamentals
Adwait Ullal
 
Azure networking update 201908
Azure networking update 201908 Azure networking update 201908
Azure networking update 201908
Jay Kim
 
Let's Talk About: Azure Networking
Let's Talk About: Azure NetworkingLet's Talk About: Azure Networking
Let's Talk About: Azure Networking
Pedro Sousa
 
Forrester no more chewy centers- the zero trust model
Forrester   no more chewy centers- the zero trust modelForrester   no more chewy centers- the zero trust model
Forrester no more chewy centers- the zero trust model
Cristian Garcia G.
 
Taking conditional access to the next level
Taking conditional access to the next levelTaking conditional access to the next level
Taking conditional access to the next levelRonny de Jong
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
Yateesh Yadav
 
Building an Enterprise-Grade Azure Governance Model
Building an Enterprise-Grade Azure Governance ModelBuilding an Enterprise-Grade Azure Governance Model
Building an Enterprise-Grade Azure Governance Model
Karl Ots
 
Networking deep dive
Networking deep diveNetworking deep dive
Networking deep dive
Jeroen Niesen
 
VTU Open Elective 6th Sem CSE - Module 2 - Cloud Computing
VTU Open Elective 6th Sem CSE - Module 2 - Cloud ComputingVTU Open Elective 6th Sem CSE - Module 2 - Cloud Computing
VTU Open Elective 6th Sem CSE - Module 2 - Cloud Computing
Sachin Gowda
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
Falgun Rathod
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
Identacor
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
Ninh Nguyen
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
Animesh Chaturvedi
 
Cloud Security Mechanisms
Cloud Security MechanismsCloud Security Mechanisms
Cloud Security Mechanisms
Mohammed Sajjad Ali
 
cyber-security-reference-architecture
cyber-security-reference-architecturecyber-security-reference-architecture
cyber-security-reference-architecture
Birendra Negi ☁️
 

What's hot (20)

Cloud Security Governance
Cloud Security GovernanceCloud Security Governance
Cloud Security Governance
 
SaaS Security.pptx
SaaS Security.pptxSaaS Security.pptx
SaaS Security.pptx
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Intro to AWS: EC2 & Compute Services
Intro to AWS: EC2 & Compute ServicesIntro to AWS: EC2 & Compute Services
Intro to AWS: EC2 & Compute Services
 
Cloud Computing and Microsoft Azure
Cloud Computing and Microsoft AzureCloud Computing and Microsoft Azure
Cloud Computing and Microsoft Azure
 
Microsoft Azure Fundamentals
Microsoft Azure FundamentalsMicrosoft Azure Fundamentals
Microsoft Azure Fundamentals
 
Azure networking update 201908
Azure networking update 201908 Azure networking update 201908
Azure networking update 201908
 
Let's Talk About: Azure Networking
Let's Talk About: Azure NetworkingLet's Talk About: Azure Networking
Let's Talk About: Azure Networking
 
Forrester no more chewy centers- the zero trust model
Forrester   no more chewy centers- the zero trust modelForrester   no more chewy centers- the zero trust model
Forrester no more chewy centers- the zero trust model
 
Taking conditional access to the next level
Taking conditional access to the next levelTaking conditional access to the next level
Taking conditional access to the next level
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
 
Building an Enterprise-Grade Azure Governance Model
Building an Enterprise-Grade Azure Governance ModelBuilding an Enterprise-Grade Azure Governance Model
Building an Enterprise-Grade Azure Governance Model
 
Networking deep dive
Networking deep diveNetworking deep dive
Networking deep dive
 
VTU Open Elective 6th Sem CSE - Module 2 - Cloud Computing
VTU Open Elective 6th Sem CSE - Module 2 - Cloud ComputingVTU Open Elective 6th Sem CSE - Module 2 - Cloud Computing
VTU Open Elective 6th Sem CSE - Module 2 - Cloud Computing
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
 
Cloud Security Mechanisms
Cloud Security MechanismsCloud Security Mechanisms
Cloud Security Mechanisms
 
cyber-security-reference-architecture
cyber-security-reference-architecturecyber-security-reference-architecture
cyber-security-reference-architecture
 

Similar to SaaS Challenges & Security Concerns

(SEC311) Architecting for End-to-End Security in the Enterprise | AWS re:Inve...
(SEC311) Architecting for End-to-End Security in the Enterprise | AWS re:Inve...(SEC311) Architecting for End-to-End Security in the Enterprise | AWS re:Inve...
(SEC311) Architecting for End-to-End Security in the Enterprise | AWS re:Inve...
Amazon Web Services
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
Novell
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
Novell
 
How Cloud Providers' Business Needs Drive Enterprise Identity & Security
How Cloud Providers' Business Needs Drive Enterprise Identity & SecurityHow Cloud Providers' Business Needs Drive Enterprise Identity & Security
How Cloud Providers' Business Needs Drive Enterprise Identity & Security
Novell
 
Layer 7: The Importance of Standards for Enterprise SOA and Cloud Security
Layer 7: The Importance of Standards for Enterprise SOA and Cloud SecurityLayer 7: The Importance of Standards for Enterprise SOA and Cloud Security
Layer 7: The Importance of Standards for Enterprise SOA and Cloud Security
CA API Management
 
Securing Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security ServiceSecuring Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security Service
Novell
 
Brave new world of encryption v1
Brave new world of encryption v1Brave new world of encryption v1
Brave new world of encryption v1Khazret Sapenov
 
Security in the Cloud
Security in the CloudSecurity in the Cloud
Security in the Cloud
Prabath Siriwardena
 
Security in the Cloud
Security in the CloudSecurity in the Cloud
Security in the CloudWSO2
 
Be Prepared for Tomorrow's IT Forecast Great Chance of Hybrid Clouds
Be Prepared for Tomorrow's IT Forecast Great Chance of Hybrid CloudsBe Prepared for Tomorrow's IT Forecast Great Chance of Hybrid Clouds
Be Prepared for Tomorrow's IT Forecast Great Chance of Hybrid Clouds
Eucalyptus Systems, Inc.
 
Be Prepared for Tomorrow's IT Forecast: Great Chance of Hybrid Clouds
Be Prepared for Tomorrow's IT Forecast: Great Chance of Hybrid CloudsBe Prepared for Tomorrow's IT Forecast: Great Chance of Hybrid Clouds
Be Prepared for Tomorrow's IT Forecast: Great Chance of Hybrid Clouds
Eucalyptus Systems, Inc.
 
security and compliance in the cloud
security and compliance in the cloudsecurity and compliance in the cloud
security and compliance in the cloudAjay Rathi
 
Architecting SaaS
Architecting SaaSArchitecting SaaS
Architecting SaaS
AxEdge Consulting
 
Cloud Tools for Connected Communities
Cloud Tools for Connected CommunitiesCloud Tools for Connected Communities
Cloud Tools for Connected Communities
Peter Coffee
 
Secure and Govern Integration between the Enterprise & the Cloud
Secure and Govern Integration between the Enterprise & the CloudSecure and Govern Integration between the Enterprise & the Cloud
Secure and Govern Integration between the Enterprise & the Cloud
CA API Management
 
Ibm cloud forum managing heterogenousclouds_final
Ibm cloud forum managing heterogenousclouds_finalIbm cloud forum managing heterogenousclouds_final
Ibm cloud forum managing heterogenousclouds_finalMauricio Godoy
 
Gartner Catalyst Savvis Cloud API Case Study
Gartner Catalyst   Savvis Cloud API Case StudyGartner Catalyst   Savvis Cloud API Case Study
Gartner Catalyst Savvis Cloud API Case Study
CA API Management
 
Security Best Practices on AWS
Security Best Practices on AWSSecurity Best Practices on AWS
Security Best Practices on AWS
Amazon Web Services
 
Making of a Successful Cloud Business
Making of a Successful Cloud BusinessMaking of a Successful Cloud Business
Making of a Successful Cloud Business
ACMBangalore
 

Similar to SaaS Challenges & Security Concerns (20)

(SEC311) Architecting for End-to-End Security in the Enterprise | AWS re:Inve...
(SEC311) Architecting for End-to-End Security in the Enterprise | AWS re:Inve...(SEC311) Architecting for End-to-End Security in the Enterprise | AWS re:Inve...
(SEC311) Architecting for End-to-End Security in the Enterprise | AWS re:Inve...
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
 
How Cloud Providers' Business Needs Drive Enterprise Identity & Security
How Cloud Providers' Business Needs Drive Enterprise Identity & SecurityHow Cloud Providers' Business Needs Drive Enterprise Identity & Security
How Cloud Providers' Business Needs Drive Enterprise Identity & Security
 
Layer 7: The Importance of Standards for Enterprise SOA and Cloud Security
Layer 7: The Importance of Standards for Enterprise SOA and Cloud SecurityLayer 7: The Importance of Standards for Enterprise SOA and Cloud Security
Layer 7: The Importance of Standards for Enterprise SOA and Cloud Security
 
Securing Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security ServiceSecuring Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security Service
 
Brave new world of encryption v1
Brave new world of encryption v1Brave new world of encryption v1
Brave new world of encryption v1
 
Security in the Cloud
Security in the CloudSecurity in the Cloud
Security in the Cloud
 
Security in the Cloud
Security in the CloudSecurity in the Cloud
Security in the Cloud
 
Be Prepared for Tomorrow's IT Forecast Great Chance of Hybrid Clouds
Be Prepared for Tomorrow's IT Forecast Great Chance of Hybrid CloudsBe Prepared for Tomorrow's IT Forecast Great Chance of Hybrid Clouds
Be Prepared for Tomorrow's IT Forecast Great Chance of Hybrid Clouds
 
Be Prepared for Tomorrow's IT Forecast: Great Chance of Hybrid Clouds
Be Prepared for Tomorrow's IT Forecast: Great Chance of Hybrid CloudsBe Prepared for Tomorrow's IT Forecast: Great Chance of Hybrid Clouds
Be Prepared for Tomorrow's IT Forecast: Great Chance of Hybrid Clouds
 
security and compliance in the cloud
security and compliance in the cloudsecurity and compliance in the cloud
security and compliance in the cloud
 
Architecting SaaS
Architecting SaaSArchitecting SaaS
Architecting SaaS
 
Cloud Tools for Connected Communities
Cloud Tools for Connected CommunitiesCloud Tools for Connected Communities
Cloud Tools for Connected Communities
 
Secure and Govern Integration between the Enterprise & the Cloud
Secure and Govern Integration between the Enterprise & the CloudSecure and Govern Integration between the Enterprise & the Cloud
Secure and Govern Integration between the Enterprise & the Cloud
 
Ibm cloud forum managing heterogenousclouds_final
Ibm cloud forum managing heterogenousclouds_finalIbm cloud forum managing heterogenousclouds_final
Ibm cloud forum managing heterogenousclouds_final
 
Enterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - IntelEnterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - Intel
 
Gartner Catalyst Savvis Cloud API Case Study
Gartner Catalyst   Savvis Cloud API Case StudyGartner Catalyst   Savvis Cloud API Case Study
Gartner Catalyst Savvis Cloud API Case Study
 
Security Best Practices on AWS
Security Best Practices on AWSSecurity Best Practices on AWS
Security Best Practices on AWS
 
Making of a Successful Cloud Business
Making of a Successful Cloud BusinessMaking of a Successful Cloud Business
Making of a Successful Cloud Business
 

More from Kannan Subbiah

Implementing an Effective Third-party & Vendor Risk Management Program
Implementing an Effective Third-party & Vendor Risk Management ProgramImplementing an Effective Third-party & Vendor Risk Management Program
Implementing an Effective Third-party & Vendor Risk Management Program
Kannan Subbiah
 
Developing & Deploying Effective Data Governance Framework
Developing & Deploying Effective Data Governance FrameworkDeveloping & Deploying Effective Data Governance Framework
Developing & Deploying Effective Data Governance Framework
Kannan Subbiah
 
Cyber fraud and Security - What risks does family office's face in today's wo...
Cyber fraud and Security - What risks does family office's face intoday's wo...Cyber fraud and Security - What risks does family office's face intoday's wo...
Cyber fraud and Security - What risks does family office's face in today's wo...
Kannan Subbiah
 
Disruptive Technologies – a closer look
Disruptive Technologies – a closer lookDisruptive Technologies – a closer look
Disruptive Technologies – a closer look
Kannan Subbiah
 
Introduction to risk management
Introduction to risk managementIntroduction to risk management
Introduction to risk management
Kannan Subbiah
 
Globalization & internationalization
Globalization & internationalizationGlobalization & internationalization
Globalization & internationalization
Kannan Subbiah
 
EAI Best Practices
EAI Best PracticesEAI Best Practices
EAI Best Practices
Kannan Subbiah
 
Cloud computing – An Overview
Cloud computing – An OverviewCloud computing – An Overview
Cloud computing – An Overview
Kannan Subbiah
 
Social Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils FinalSocial Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils Final
Kannan Subbiah
 

More from Kannan Subbiah (9)

Implementing an Effective Third-party & Vendor Risk Management Program
Implementing an Effective Third-party & Vendor Risk Management ProgramImplementing an Effective Third-party & Vendor Risk Management Program
Implementing an Effective Third-party & Vendor Risk Management Program
 
Developing & Deploying Effective Data Governance Framework
Developing & Deploying Effective Data Governance FrameworkDeveloping & Deploying Effective Data Governance Framework
Developing & Deploying Effective Data Governance Framework
 
Cyber fraud and Security - What risks does family office's face in today's wo...
Cyber fraud and Security - What risks does family office's face intoday's wo...Cyber fraud and Security - What risks does family office's face intoday's wo...
Cyber fraud and Security - What risks does family office's face in today's wo...
 
Disruptive Technologies – a closer look
Disruptive Technologies – a closer lookDisruptive Technologies – a closer look
Disruptive Technologies – a closer look
 
Introduction to risk management
Introduction to risk managementIntroduction to risk management
Introduction to risk management
 
Globalization & internationalization
Globalization & internationalizationGlobalization & internationalization
Globalization & internationalization
 
EAI Best Practices
EAI Best PracticesEAI Best Practices
EAI Best Practices
 
Cloud computing – An Overview
Cloud computing – An OverviewCloud computing – An Overview
Cloud computing – An Overview
 
Social Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils FinalSocial Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils Final
 

Recently uploaded

Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 

Recently uploaded (20)

Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 

SaaS Challenges & Security Concerns

  • 1. Kannan Subbiah Knowledge Universe Technologies India Pvt Ltd
  • 2. Own a house Vs Rent a house Own a Car Vs Engage Call Taxi
  • 3. •Chargeable unit •Geographical boundary •Business Domain •Implementation Partners •… •Hosting infrastucture •Support Multi-tenancy •On-boarding / Exit •Scalability •Customer Support •Internationalization •Service Level •… •Contract terms •…
  • 4. Subscribed Self subscribe Hosted to the software or parts of Hosted (ASP) Affordability software. Software Software Customizable In-house Owned and rented, but by tenants to an H/W, S/W Managed, not designed extent owned and Infrastructure to scale managed. rented Time
  • 5. Multi Tenancy  Subscription based service  Scalability  Manageability  Self Service Sign-up  Tenant specific customization
  • 6. Attribute Traditional SaaS Application Delivery Installed Hosted Updates / Release Cycle Larger / Longer Smaller / Shorter Pricing One Time + Maintenance Subscription Accounting CAP-EX OP-EX Implementation Engage Partners / Simple, end user consultants configurable Operating Platform Multiple Single Value proposition Once at the time of selling Continuous
  • 7. Pay per use  Any where Access  Subscription to service not software  Least or no investment on infrastructure
  • 8. Stronger protection for IPR  Operational control of the environment  Recurring revenue stream  Shared Infrastructure – PaaS / IaaS
  • 9. Microsoft – 4 level  Scalability, Multi- Tenancy and Configuration  Forrester – 6 Level  SEI – for assessing the organization and not the application  Euro Cloud Star Audit  None of them are popular
  • 10. Level 0 – Outsourcing  Level 1 – Manual ASP  Level 2 – Industrial ASP  Level 3 – Single-app SaaS  Level 4 – Business Domain SaaS  Level 5 – Dynamic Business Apps
  • 11.
  • 12. Solution Design to address  Internationalization  Cloud Infrastructure  Support business & operating model  Multi-tenancy  Extensibility  Security and Audit  Wider scope - cover industry needs
  • 13. Must Support  Larger impact  SLA driven  Disclaimers  Increased Focus on  Reliability  Availability  Extensibility  Scalability  Quality, etc
  • 14. Migration from existing software  Application Integration  Data Integration  Data Mining  Authentication, Single Sign-on  Network infrastructure
  • 15. Areas of support to include  Hosting infrastructure  Data center operations  Systems and network monitoring  Billing  Customer education  Longer customer retention for better RoI
  • 16. Agile approach  Rapid releases and upgrades  Primary focus on  Rapid action on feedbacks  Usage statistics  Predict industry trends  Platform and tools used  Automated testing  Service aggregation
  • 17. Driving Contracts online  Termination and Migration  Security, Privacy and related risks  Country specific regulations  SLAs
  • 18. Data Security IdM & SSO Data Seggregation Back up & Deployment Recovery Model SaaS Security Availability Deployment Environment Regulatory Network Compliance Security
  • 19. Data Security  Data Location  Data Encryption  Data Integration APIs  Access Logs  Return / destruction of data upon exit
  • 20. Data Seggregation  Understand the Data & Application Architecture  Separate Physical / Virtual Server(s)  Separate Instance on shared hardware  Separate Database  Shared Database  Authentication and Authorization
  • 21. Deployment Model  Security aware developers  Application Design  Application / Data Partitioning  Information Sensitivity  Design for Performance & Scalability  Configuration Management  Security Testing  Threat Remediation  Build & Release Cycles
  • 22. Deployment Environment  Boundary Protection  Resource Priority  Configuration Management  Cloud Infrastructure  Certification / accreditation  Continuous Monitoring  Audit
  • 23. Network Security  Transmission Integrity  Secure Data in transit (SSL)  Intrusion Detection & Prevention  Other standard security measures  Man-in-the-middle  IP Spoofing  Port Scanning  Packet Sniffing
  • 24. Regulatory Compliance  Global Legal compliance  SAS 70  SOX  HIPAA  …  Contractual obligations  Need for Logs and Audit Trails  Data Retention needs
  • 25. Availability  Application Design and Architecture  Design for performance  Graceful exits  Instance Isolation  Custom Code Modules  SLA  Uptime Guarantees  Maintenance / Outage Notifications  Documented BC & DRP plans  Code Escrow
  • 26. Back up & Recovery  Infrastructure  Protection of back up location  Encryption  Access control to Backup location  Recovery  Documented process  Drills
  • 27. IdM & SSO  Who manages it?  Checks & Controls  Id provisioning  Secure storage  Password Policies  Federated IdM  Trust relationships with tenants  Secure federation of user identities
  • 28. Follow Me  Email: kanna@vsnl.com  Facebook: http://www.facebook.com/kannan.subbiah  LinkedIn: http://in.linkedin.com/in/ksubbiah  Blog: http://www.kannan-subbiah.com