Remove compliance Remove Data Remove Underperforming Technical Team
article thumbnail

The $939B Question: Is AI Eating SaaS or Feeding It?

SaaStr

The company later clarified it didn’t actually “replace” Salesforce with pure AI — it consolidated data onto its own tech stack using tools like Neo4j and built new interfaces. Industry observers like Josh Bersin remain skeptical about replicating complex systems like Workday’s payroll and compliance frameworks.

AI Search 274
article thumbnail

Is AI Penetration … Slowing Down? Ramp Says Possibly

SaaStr

New spending data from Ramp reveals a possible trend: end user AI adoption may be hitting its first growth slow down. But it’s just one data point, albeit across many Ramp customers. Companies are discovering that hiring AI talent or upskilling existing teams takes much longer than anticipated.

AI 275
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Okta’s Playbook to PLG, Developer Experience, and Enterprise ARR

SaaStr

Okta’s VP of Engineering, Monica Bajaj, and Senior Director of Platform Product Marketing, Priya Ramamurthi, share Okta’s playbook to PLG, developer experience, and Enterprise ARR. How do you build a stellar developer experience and continue to scale when the user base skyrockets overnight? Let’s start with product-led growth (PLG).

article thumbnail

Top 5 Risk and Compliance Trends for 2025

Scytale

As technology continues to evolve, compliance industry trends and requirements adapt accordingly. Compliance trends in 2025 continue to be influenced by emerging technologies such as artificial intelligence, Internet of Things, blockchain, and cloud computing.

article thumbnail

Cloud Security Posture Management (CSPM): Top 6 Capabilities

Frontegg

Key takeaways CSPM identifies and fixes cloud misconfigurations to maintain compliance and reduce security risks. Common misconfigurations include exposed storage buckets, excessive permissions, unsecured APIs, and poor network segmentation. What is cloud security posture management (CSPM)?

Cloud 52
article thumbnail

Why your privacy ecosystem is crucial in the age of GDPR

Intercom, Inc.

When building your products, the security and privacy of your customers’ data needs to be a top priority. And that is also true when selling and marketing your product, particularly with the arrival of GDPR, which has brought the issue of data security and privacy to widespread public awareness.

article thumbnail

Biggest Data Breaches of 2024: Emerging Threats, Impact, and Proactive Prevention Strategies

Scytale

Data breaches are a modern-day nightmare for all types of businesses, particularly for SaaS companies handling sensitive customer information. While it often feels like were constantly hearing about the biggest data breaches in US history, 2024 truly set the bar for some of the most significant security crises to date.