Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

10/29/2016
12:00 PM
Al Sargent
Al Sargent
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

Is Your Business Prepared for the SaaS Tsunami?

You don't always have to choose between security and productivity when faced with the challenges of 'Shadow IT.'

Over the last few years, Software-as-a-Service adoption in the enterprise morphed from a slow trickle to a deluge. According to Gartner research (registration required), the average organization uses between 600 and 1,000 SaaS apps – but most IT departments have insight into just 7% of them. The other 93% fall into the category of Shadow IT. This app explosion combined with IT teams’ inability to track it has created a perfect storm of cybersecurity vulnerabilities that jeopardize organizations and their customers.

Rogue SaaS adoption invites a host of risks, from unprotected corporate data, including personally identifiable employee or client information, payment card details and intellectual property, to wasted IT spend on unused SaaS subscriptions. And when the IT department has a SaaS blind spot, it may fail to catch instances of regulatory noncompliance, or revoke app permissions when an employee leaves the company.   

Each month, new SaaS vendors emerge to capitalize on user demand for apps that meet the needs of a particular industry, organizational role, or use case. The more employees procure SaaS apps themselves, the more third parties gain access into organizations’ data. The perfect storm becomes a SaaS tsunami.

Yet, despite these threats, there is an upside to this phenomenon. In most cases, the intentions behind employees’ unsanctioned app usage are good; they crave resources that help them work faster, smarter, and more collaboratively. Organizations that ignore the SaaS tsunami will likely get swept up by its force but those that take action have an opportunity to not only avoid a crisis, but unlock business value.

With the emergence of cloud identity and access management solutions from a handful of vendors (including OneLogin), organizations don’t have to choose between security and productivity. Here are four concrete steps business and IT security leaders can take to ride out the storm:

  • Step One: Follow the money: Ironically, there is a quick and effective non-technical way organizations can expose shadow app adoption: update your accounting processes. The truth is, very few employees purchase their own SaaS subscriptions and fail to expense them. By adding a “SaaS subscription” category on corporate expense reports, you can set a protocol to notify IT whenever a new app purchase is processed.
  • Step Two: Implement a cloud access security broker: Cloud access security brokers (CASBs) can serve as an IT department’s SaaS sonar, uncovering what unsanctioned apps their users are running. Sitting between end users (i.e., their browsers and mobile devices) and cloud vendors, CASBs give IT visibility into what corporate data is in the cloud, and extend governance policies by monitoring for threats and compliance gaps.
  • Step Three: Market the end user benefits of single-sign on (SSO): For employees to change their behavior, they need to understand what’s in it for them. Keeping track of dozens of app passwords (or, in many cases, dozens of variations on the same password) has become a primary frustration of the cloud age. This presents an opportunity for IT to educate users about the productivity of SSO solutions, which provide one-click access to all the apps they need, from any device.
  • Step Four: Embrace Identity-as-a-Service (IDaaS): Paired with cloud access security brokers and single sign-on, IDaaS bolsters organizations’ defense against the perils of rogue app use. IDaaS ensures a higher degree of password complexity, enforces multi-factor authentication when users login from a new or unusual location, and lets IT quickly adjust access permissions in response to specific events (e.g., when an employee quits.)

Successfully making it through the SaaS tsunami isn’t a zero-sum game. With the right strategy, businesses can wind up stronger than when they started.   

Related Content:

Black Hat Europe 2016 is coming to London's Business Design Centre November 1 through 4. Click for information on the briefing schedule and to register.

Al Sargent serves as the senior director of product marketing at OneLogin, a leader in cloud identity management solutions. Prior to OneLogin, Al helped create the world's first software-testing cloud, Sauce Labs; drive the fastest-growing business unit at VMware; advance ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
Unreasonable Security Best Practices vs. Good Risk Management
Jack Freund, Director, Risk Science at RiskLens,  11/13/2019
Breaches Are Inevitable, So Embrace the Chaos
Ariel Zeitlin, Chief Technology Officer & Co-Founder, Guardicore,  11/13/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-2916
PUBLISHED: 2019-11-15
qtnx 0.9 stores non-custom SSH keys in a world-readable configuration file. If a user has a world-readable or world-executable home directory, another local system user could obtain the private key used to connect to remote NX sessions.
CVE-2019-12757
PUBLISHED: 2019-11-15
Symantec Endpoint Protection (SEP), prior to 14.2 RU2 & 12.1 RU6 MP10 and Symantec Endpoint Protection Small Business Edition (SEP SBE) prior to 12.1 RU6 MP10d (12.1.7510.7002), may be susceptible to a privilege escalation vulnerability, which is a type of issue whereby an attacker may attempt t...
CVE-2019-12758
PUBLISHED: 2019-11-15
Symantec Endpoint Protection, prior to 14.2 RU2, may be susceptible to an unsigned code execution vulnerability, which may allow an individual to execute code without a resident proper digital signature.
CVE-2019-12759
PUBLISHED: 2019-11-15
Symantec Endpoint Protection Manager (SEPM) and Symantec Mail Security for MS Exchange (SMSMSE), prior to versions 14.2 RU2 and 7.5.x respectively, may be susceptible to a privilege escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software applicat...
CVE-2019-18372
PUBLISHED: 2019-11-15
Symantec Endpoint Protection, prior to 14.2 RU2, may be susceptible to a privilege escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user.