article thumbnail

Investing in Tigris

Andreessen Horowitz

The traditional clouds (AWS, GCP, and Azure) are getting dated. Lately, we’ve seen the rise of a number of hosting platforms that are better aligned with modern development practices. It truly is a global multi-master storage platform.

article thumbnail

Best Practices To Ease Your SaaS Cloud Security Challenges

Audacix

Now this is a very generalized security checklist for cloud security, but this area of cyber security is becoming increasingly important as enterprise applications and workloads move to public clouds and business processes become more dependent on cloud services. Do outsourced development teams also need such a comprehensive approach?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Understanding Multi-tenancy, the Keystone of SaaS

CloudGeometry

Some of these include: Create a cluster of nodes per tenant Use IAM and other platform constructs to prevent tenant boundary-crossing. However, the end goal always remains the same – to design a framework that aids the development and deployment of reliable, optimized, and secured SaaS applications.

article thumbnail

The best SaaS apps have these 7 web application security controls

Audacix

Application security is seldom considered during the ideation phase of web application development - unless the development team has previously been hacked and survived to tell the tale. These massive cloud hosting platforms typically offer protections against large-scale DDOS attacks and the like.