Remove compliance Remove Development Remove Scaling Remove Traceability
article thumbnail

Different Types of Logs in a SaaS Application

Frontegg

Following my previous blog post on Audit Logs for SaaS Enterprise Customers , I’ve received a bunch of questions on what’s the difference between Audit Logs and other types of Logs you would typically encounter while developing a SaaS application. Type 1: Developer Logs. Scale — High. Compliance – a.

article thumbnail

User Model: What SaaS platform builders need to know to prepare for growth, Part 1

CloudGeometry

Before you shout “Digital Transformation” in a crowded marketplace, it’s important to recognize two foundational principles in developing a SaaS product plan. Tenant identity is the unique, traceable, and secure mechanism for distinguishing tenants from one another. Or just drop us a line.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Measurement: What SaaS platform builders need to know to prepare for growth, Part 3

CloudGeometry

When developing a SaaS product plan, it’s important to recognize two foundational principles. In this blog series, we explore how these three dimensions figure into key technical recommendations which enable scale in pursuit of SaaS business growth. First, SaaS is a business strategy, not a technology strategy.

article thumbnail

SaaStr Podcasts for the Week with Front and ICONIQ Capital — April 3, 2020

SaaStr

At Gainsight Anthony and the team developed a new playbook for B2B marketing that fueled the company’s growth from $0 to over $100M of ARR. At Gainsight, Anthony and the team developed a new playbook for B2B marketing that fueled the company’s growth from nought to over a hundred million dollars of ARR.

article thumbnail

7 Ways to build Enterprise Readiness into your SaaS roadmap

CloudGeometry

3 Audit Logging and Compliance Enterprise customers view the ROI of your solution as more than a great set of features. Compliance requires that your logging and monitoring infrastructure provide complete, well-organized, retrievable data on all of the above for both (1) security and (2) change management. #4 Seems like a short list?