article thumbnail

Different Types of Logs in a SaaS Application

Frontegg

Some examples: A Cloud Security Permission and Identity Management product might have events like: Excessive permission detected for user John Doe John Doe has tried to act outside of his permission scope 10 redundant roles have been detected in your environment. Learn first hand how easy it is to get your SaaS enterprise ready.

article thumbnail

Kellblog's 10 Predictions for 2020

Kellblog

Blockchain, as an enterprise technology, fades away. While I hate to my find myself on the other side of Ray Wang , I’m personally not seeing much traction for blockchain in the enterprise. The 2019 Blockchain Opportunity Summit’s theme was “ Is Blockchain Dead? Maybe I’m running with the wrong crowd.