article thumbnail

The 3 Types of Channel Strategies for SaaS Startups

Tom Tunguz

Most of the time, when companies say they sell through the channel, they refer to this type of arrangement. In contrast to the reseller model, the application developer model has one major difference. The VAR pays some royalty or license fee back to the vendor. The vendor bills the customer directly and supports the customer.

Startup 113
article thumbnail

Technical debt vs. Frankencloud in your SaaS

CloudGeometry

It’s common to refer in the aggregate to code that doesn’t do so well as (squirm and wait for it … ) technical debt. If only some developers in the past had been more virtuous, frugal, expert, what have you, we could have… (“Closed that deal! People are writing more code to solve more problems than ever before.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Beyond Frankencloud: living with your once and future SaaS architecture

CloudGeometry

Frankencloud happens when the speed of customer-facing feature development is paid for by charging interest to functions outside of the direct control of the application developers. Interest payments accelerate faster than you realize. Look out for FrankenCloud How can you tell when you live on a Frankencloud?

article thumbnail

Authentication: Methods, Protocols, and Strategies

Frontegg

Access control refers to the complete process of granting access to users, including both authentication and authorization. The traditional authentication process created several challenges: Traditionally, each IT system or application would handle its own authentication. Applications are increasingly delivered over the web.

article thumbnail

Building a Multi-tenant Enterprise SaaS Application on AWS (Step-by-Step Guide)

Frontegg

How to Build a Multi-tenant SaaS Application on AWS? SaaS application developers must identify a user, link data to its tenant and a user to its tenant, and know what rights have been granted to a particular user. In this example, the “organizationId” column is used to store the reference to the tenant. Create Your Users.

AWS 88
article thumbnail

This online pentest tool helps you fortify your SaaS & APIs

Audacix

These web pentest tools are also commonly referred to as automated penetration testing tools or web app vulnerability scanning tools and they simulate automated attacks on your web app and APIs, without requiring you to install any software on your network or workstations! These older "brand-name" tools require experience to set up and use.

article thumbnail

Understanding Multi-tenancy, the Keystone of SaaS

CloudGeometry

This works for use-cases requiring a strategy that is not exclusively Silo or Pool-based, referred to as a mixed-model. However, the end goal always remains the same – to design a framework that aids the development and deployment of reliable, optimized, and secured SaaS applications.