article thumbnail

Using Tailscale to Access Amazon VPCs, EC2 Instances, and RDS Clusters

Crafty CTO

Better Idea: AWS Systems Manager Session Manager Our development partner suggested a better solution, AWS Systems Manager Session Manager , which enables tunneled sessions into the AWS environment and leverages AWS IAM to manage access. The result: better security and no need for manual IP whitelisting.

article thumbnail

Snowflake, CrowdStike and SumoLogic: “How to Leverage the Cloud Giants to Scale to 100 Million ARR and Beyond”

SaaStr

Jessica Alexander, Senior Director Cloud Technology & OEM Partnerships, Crowdstrike. So for the audience, cloud giants are turbocharging startup sales, and the predominant reason for this is because they’re fundamentally changing IT budgets at the customers that we’re all selling to. Rico Mallozzi, Sr.

Scale 191
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Monetization: What SaaS platform builders need to know to prepare for growth, Part 2

CloudGeometry

Cost to serve a customer-facing feature is money that comes out of your pocket, and goes straight into the cloud provider’s pocket. When you want to procure more cloud resources faster, cloud providers make it easiest to buy speed, whether or not that pays off for you in the long run. It‘s almost always a function of time.

article thumbnail

Cloud Prem Architecture - The New Way of Serving the Enterprise with a Hub and Spoke Data Model

Tom Tunguz

Typically, the data resides in the customer’s cloud account. This cloud account has many names but no real moniker yet. Some call it a VPC for virtual private cloud. Others call it cloud prem, a contraction of cloud and on-prem(ises). Cloud is more expensive for larger enterprises.

Cloud 198
article thumbnail

SaaS Security: Basic Principles and Best Practices

SaaS Metrics

Security is one of the main reasons why many businesses, especially small and medium businesses hold themselves back from taking advantage of powerful cloud technologies. Virtualization. This means that if someone hacks a single server, it puts many virtual machines or data of many customers at risk. Cloud Standards.