All Posts

zero-trust-model

Taming SaaS Security Challenges with the Zero Trust Security Model

Today, the new reality is that network-based security is no longer adequate. Companies need to invest in a new security architecture to effectively manage their sprawling SaaS portfolio. Enter: Zero Trust. Part one of our blog series explores why a new security framework is essential right now.

On-Demand Workflows: Macros for IT (And Why Customers Love Them)

Last month, we released a heavily requested feature: On-Demand Workflows. Think of these workflows as customizable automation sequences (kind of like macros) where you can string together a collection of actions across SaaS apps and press play when you want, instead of waiting on a trigger. Here are a few of the most valuable ways you can use them.

Paranormal (User) Activity: 4 Terrifying IT Stories on Insider Threats

For IT and security professionals, spooky season can feel like a year-round experience. Research shows that insider threats — specifically, those caused by end users — are keeping folks up at night. At BetterCloud, we’re seeing insider threats take shape in a variety of surprising forms. Here are four frightening tales from implementation sessions with new customers where we uncovered both malicious and negligent employees jeopardizing confidential business information.

Requested by IT, Built for IT: 8 New BetterCloud Features

Here at BetterCloud, we’ve been working hard to answer the feature requests you’ve told us are important to you. We’re thrilled to announce eight enhancements that we released earlier this month at Altitude, our annual customer conference, in Denver.

6 Takeaways from Altitude 2018

Last week, we hosted Altitude, our annual customer summit, in Denver, Colorado. It was our best customer summit yet, with over 140 IT and security professionals attending. Thirty speakers from all over the country gave insights and tips on security automation, SaaS management efficiency, and the future of IT and technology. Missed it? No worries. Here are six key takeaways from the conference.

Activity-based Alerts: Giving IT More Granularity and Control

You spoke, we listened. At our annual customer conference last year, the number one feature you requested was activity-based alerts. These are alerts for things like suspicious user logins or the downloading of confidential files. So we built it. So far we’ve released alerts for Okta, Dropbox, and G Suite, with more on the way for Box, Salesforce, and Microsoft. Activity-based alerts are the next frontier for companies securing mission critical SaaS apps. Here’s how they give IT more control and insights than ever before.

A Top G Suite Expert Shares His 31 Best Modern Security Tips

If you ever wanted to find a treasure trove of excellent security tips — written by a top Google expert in a lively, easy-to-understand way — then look no more. Kevin A. McGrail is a cybersecurity and privacy expert who is also ranked as the #1 contributor in the world on Google’s official G Suite platform, Google Cloud Connect. In this post, he shares 31 recommendations and best practices related to passwords, email security, and more. While some of these tips are specific to G Suite, many are broader ones that can help secure any system.

And the Winning Monitor
T-Shirt Design Is…

If you read our newsletter last week, you saw that we held a contest just for BetterCloud Monitor readers. In the quest to make our first ever Monitor T-shirts, we designed four tongue-in-cheek tees (all IT-themed), and we let readers vote for their favorite one. We said that whichever design won, we’d print. And the winner is….

California’s New Data Privacy Law: A Mini GDPR? What IT Needs to Know

On June 28, 2018, California adopted what is considered the strictest general privacy and data security law in the country. Called the California Consumer Privacy Act (CCPA), it will become effective on January 1, 2020. It’s been called a mini GDPR, but there are differences. Here’s how you can start preparing.

5 Takeaways from “Securing G Suite and Beyond: Tales from the Trenches” (Google Cloud Next ’18)

Well, Google Cloud Next ‘18 is a wrap! If you missed it last week, here are some highlights from a panel called “Securing G Suite and Beyond: Tales from the Trenches” that we thought would be particularly relevant to our audience. The panel explored security topics that are top of mind right now for many modern IT professionals: How have security needs evolved, and what are the biggest concerns moving forward? What important lessons have people learned? Here are five key takeaways, along with some tips and best practices the panelists shared.