Skip to content

SaaSOps

BookBlogPost5 FeaturedImage

How Risky Is an Interaction? Here’s How to Tell (and Level Up Your SaaSOps Security)

Some interactions in the digital workplace are far riskier or more important than others. But how do you know which ones really matter to you? Here are 13 things to think about when classifying interactions.

David Politis
4 min read
BookBlogPost4 FeaturedImage

SaaSOps security: See how easily interactions sprawl out of control

See for yourself why two core tenets of SaaSOps—file security and least privilege—are notoriously tough to tackle.

David Politis
4 min read
BookBlogPost3 FeaturedImage

The 3 types of user interactions in every digital workplace

When it comes to SaaSOps security, here are the three categories of interactions to think about.

David Politis
3 min read
BookBlogPost2 FeaturedImage

Why securing user interactions is critical for SaaSOps security

SaaSOps calls for new operational controls and processes to protect SaaS data. Here’s why.

David Politis
3 min read
BookBlogPost1 FeaturedImage 1

How to think about SaaSOps security: It all starts with user interactions

At the heart of SaaSOps is the concept of user interactions—i.e., how people are using SaaS apps, which is what IT must ultimately secure. Here’s a quick dive into user interactions.

David Politis
3 min read
Book2Announcment featuredimage

Introducing my second book: The IT Leader’s Guide to SaaSOps (Volume 2)

I’m thrilled to announce the release of my second book, The IT Leader’s Guide to SaaSOps (Volume 2): How to Secure Your SaaS Applications. First and foremost, I wrote it for our customers. Here’s why.

David Politis
5 min read