article thumbnail

How The Top 25 B2B Public Companies Have Performed In 2025 So Far — And What They Tell Us About the Future

SaaStr

Edge security (Cloudflare) = essential and growing Endpoint security (CrowdStrike) = recession-proof Zero trust (Zscaler) = must-have architecture Identity management (Okta) = nice-to-have that’s getting commoditized Tier 5: Post-Pandemic Normalization Average Return: -15.5% Tier 4: Security (Mixed Results) Average Return: +7.9%

B2B 264
article thumbnail

Authentication as a Service: 5 Components and Critical Best Practices

Frontegg

AaaS services typically include user authentication, authorization, identity management, and methods such as single sign-on (SSO) and multi-factor authentication (MFA). This involves creating, maintaining, and managing user credentials and other info while ensuring only authorized access to sensitive information.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cloud Security Posture Management (CSPM): Top 6 Capabilities

Frontegg

Tips from the expert Anthony Dombrowski Developer Relations Anthony Dombrowski is a product manager and developer advocate with expertise in developer experience, cybersecurity, and product strategy. He has led initiatives at Ping Identity and DevNetwork to enhance developer tools, authentication processes, and user experiences.

Cloud 52
article thumbnail

Identity Management (IdM) Systems: Explained

Frontegg

Identity Management (IdM), a subset of Identity and Access Management (IAM), is a framework of policies and processes that enables the smooth management of user identities and personas within organizations. How does an Identity Management lifecycle look? Let’s take a closer look. Ask Accenture.

article thumbnail

12 Cybersecurity Companies In Hyper-Growth to Add to Your CRM

Sales Hacker

Cybersecurity is a hot topic these days – and for good reason. Investment in cybersecurity companies has increased more than thirteenfold since 2011, and despite the COVID-19 pandemic, 2020 was a record year for cybersecurity with over $7.8 TL;DR: Early-stage cybersecurity venture funding = new sales opportunities for you.

article thumbnail

Different Types of Logs in a SaaS Application

Frontegg

Usually, the characteristics of this log type depend on the type of product you’re managing. In cases of cybersecurity or cloud solutions, for example, this could be very sensitive. In this type of logs we usually refer to any kind of business-related output your product produces for your customer’s administrators or end-users.

article thumbnail

Top 50 AI Companies in SaaS (2020 Edition)

SmartKarrot

Discovering the novel scope of AI in cybersecurity, Sophos is using AI capabilities to achieve information security goals. Delivering enterprise-grade identity management service through a SaaS model, Okta has incorporated various authentication features with the help of AI, thus reducing the risk of attacks. Proofpoint.

AI 8