Converting Cybersecurity From a Cost Center to a Revenue Source
With great SaaS power comes great responsibility. As of 2022, SaaS is said to be worth over $170 billion and the SaaS industry has increased in size by around 500% over the past seven years. SaaS apps are ruling the world – and now it is time to rule it more securely. SaaS security is based on a shared responsibility model. While preventing DDos or Brute Force attacks may be your responsibility, what a user does with the platform once they’re in may need to be the responsibility of the customer. This shared responsibility model represents an enormous burden for most customers, as they need to manage security across numerous SaaS platforms. SaaS companies have a choice to make: either undertake expensive development to extend their internal security or partner with external cybersecurity providers that will concentrate on security for them through APIs.
In this session, Dror will discuss the financial impact of opening APIs to third party security providers, converting cybersecurity from a cost center to a new revenue stream. Effective security APIs enable 3rd party security providers to provide robust security monitoring and protection without the need to build costly security infrastructure directly into the SaaS applications being protected. As such, offering security through APIs can eliminate software bloat and provide value-added features that can drive revenue.
Dror will map out best practices for SaaS companies to construct security APIs that will ultimately enable third-party security providers to help alleviate the shared responsibility model. He will share battled-tested security API development lessons and tips he has learned from going through integrations with SaaS leaders such as Microsoft, Google, Salesforce, and Dropbox. Specifically, Dror will delve into how to create security APIs for scale across three core areas – Collaboration Controls, Activity Monitoring, and Data Loss Prevention. He will also give examples of how to address Access APIs (e.g. access requests, handshakes, and access approvals/denials), SaaS APIs spanning Collaboration and Content Control (such as file controls, file inspection (including malware, regulatory compliance), and user actions (e.g.logging, suspicious behavior).
Other Videos From This Event
How CMOs at Growing B2B Companies Are Leveraging Data to Scale: And how you can and should be as well
Total Experience: The Hidden Connection Between Company Culture and World-Class Customer Experiences
Positioning for Success: How Effective Positioning Drives Differentiation and Simplifies Marketing Execution