Remove AWS Remove Cybersecurity Remove Scaling
article thumbnail

5 Interesting Learnings from Crowdstrike at ~$3 Billion in ARR

SaaStr

Being Multi-Platform / Multi-Product Key at Scale A story we’ve seen many times. 64% of Large Customers Sourced From Partners They are AWS’s largest cybersecurity partner. The majority of their customers use 5 or more modules. #3. What’s your channel / partner strategy? #9. Only Founded in 2011.

article thumbnail

State of the Cloud 2019: Europa Edition with Alex Ferrara, Bessemer Venture Partners (Video + Transcript)

SaaStr

It was around that time about 12 years ago that Jeff Bezos launched AWS, and some of you may remember that, when he did this, Wall Street analysts were looking at him and saying, “Why would you take what’s already a very unprofitable business and drive it further into the red by investing in this AWS initiative?”

Cloud 113
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Say Hello to Scytale’s Newest Integrations, Enabling Deeper Compliance Automation

Scytale

Snowflake Snowflake delivers the Data Cloud, a global network where thousands of organizations mobilize data with near-unlimited scale, concurrency, and performance. Their platform includes marketing, sales, service, and website management products that meet their customers’ needs at any stage of growth.

article thumbnail

The best SaaS apps have these 7 web application security controls

Audacix

Combine the above overarching statistic with these 10 cybersecurity questions that enterprise clients consider when evaluating cloud service providers, you'll quickly realise that you've found the illuminated runway that leads to your cloud sales goals. A cloud server, like an AWS EC2 instance, is still a server. Not really.

article thumbnail

Does your cloud application have this 7-pronged defensive line against hackers?

Audacix

Combine the above overarching statistic with these 10 cybersecurity questions that enterprise clients consider when evaluating cloud service providers, you'll quickly realise that you've found the illuminated runway that leads to your cloud sales goals. I’m not telling you cybersecurity is easy. I’m telling you that it is doable.

Cloud 49
article thumbnail

The Fundamentals of Role-Based Access Control

BetterCloud

Achieving RBAC at scale. A crucial cybersecurity tenet for many years, least privilege means giving people only the permissions they need to get their job done. Achieving RBAC at scale. Scale becomes an additional challenge when managing user lifecycles across an entire digital workplace with tens or hundreds of SaaS apps.

Azure 52
article thumbnail

How CIOs & CISOs can prepare to comply with the Indian Digital Personal Data Protection Bill 2023

Audacix

Principle 6: Review and optimise regularly There is no "set and forget" in cybersecurity - again this is not news to you. The first and most obvious step is to conduct a gap analysis to understand your current cybersecurity, application security and data protection posture. Examples include: Veronis, Azure Purview, AWS Macie.