The Hidden Risks of SaaS

Your SaaS environment grows as each well-meaning employee adds another perfect, productivity-boosting SaaS application. But all too often, that new app ends up introducing enormous and unnecessary risks to your company’s SaaS environment. Here are the hidden risks of SaaS that can impact every IT organization.

role_based_access_control

The Fundamentals of Role-Based Access Control

Statista reports that there were a whopping 540 data breaches in 2020. The solution for many IT teams? A slightly more nuanced approach known as role-based access control (RBAC). This is not exactly a new approach, but it enables you to grant access based on the specific needs of each user’s role and business unit. Let’s take a closer look.

How to Keep Institutional Knowledge from Walking Out the Door

As boomers retire, companies are unwittingly losing valuable institutional data. Why? Because, while the retiree’s job is transitioned to a new employee, many organizations don’t consider the knowledge and experience walking out the door with that employee. Since boomers are the first generation to transfer their knowledge to machines and computer programs and not to apprentices and junior employees, it’s important to know how to transfer all of this data smoothly as part of an ongoing search journey.

6 Things You Should Look for When Selecting a Secure SaaS Vendor

Selecting the right SaaS vendors can prove instrumental in propelling your organization to the next level. However, that’s only one piece of the puzzle. You also need to select vendors with the right security measures in place. This is especially true if you are giving them access to other SaaS applications that are critical to your organization or process sensitive information. But how do you know if a SaaS vendor is secure? We sat down with BetterCloud’s Security Compliance Director Mosi Platt to find out.

What Does a Successful Security Program Look Like?

In the era of data breaches, what makes up a successful security program? BetterCloud’s Senior Security Architect Austin Whipple shares what success and failure look like in a security program. After reading this article, you’ll come away with a few ideas you can implement right away. Here’s what he’s seen work.

Paranormal (User) Activity: 4 Terrifying IT Stories on Insider Threats

For IT and security professionals, spooky season can feel like a year-round experience. Research shows that insider threats — specifically, those caused by end users — are keeping folks up at night. At BetterCloud, we’re seeing insider threats take shape in a variety of surprising forms. Here are four frightening tales from implementation sessions with new customers where we uncovered both malicious and negligent employees jeopardizing confidential business information.

6 Takeaways from Altitude 2018

Last week, we hosted Altitude, our annual customer summit, in Denver, Colorado. It was our best customer summit yet, with over 140 IT and security professionals attending. Thirty speakers from all over the country gave insights and tips on security automation, SaaS management efficiency, and the future of IT and technology. Missed it? No worries. Here are six key takeaways from the conference.

Activity-based Alerts: Giving IT More Granularity and Control

You spoke, we listened. At our annual customer conference last year, the number one feature you requested was activity-based alerts. These are alerts for things like suspicious user logins or the downloading of confidential files. So we built it. So far we’ve released alerts for Okta, Dropbox, and G Suite, with more on the way for Box, Salesforce, and Microsoft. Activity-based alerts are the next frontier for companies securing mission critical SaaS apps. Here’s how they give IT more control and insights than ever before.

A Top G Suite Expert Shares His 31 Best Modern Security Tips

If you ever wanted to find a treasure trove of excellent security tips — written by a top Google expert in a lively, easy-to-understand way — then look no more. Kevin A. McGrail is a cybersecurity and privacy expert who is also ranked as the #1 contributor in the world on Google’s official G Suite platform, Google Cloud Connect. In this post, he shares 31 recommendations and best practices related to passwords, email security, and more. While some of these tips are specific to G Suite, many are broader ones that can help secure any system.

Automate Security & Compliance for Google Drive with AODocs and BetterCloud

BetterCloud has partnered with AODocs, a document management and business application platform built on top of Google Drive. Given the need for companies to identify, audit, and repair security breaches, AODocs and BetterCloud make it easy to automate security and compliance while allowing employees to focus on business critical issues. Learn more about how the two platforms work together.

Here’s What We Found in One Customer’s SaaS Environment That Caused Their IT Director to Say “Nooooo”

The widespread adoption of SaaS apps is creating new risks and ways to expose data. Unbeknownst to IT, these blind spots lie undiscovered below the surface, waiting like a dormant volcano to erupt. Over the last few months at BetterCloud, we’ve uncovered major blind spots during dozens of implementation meetings with new customers, and what we found in their SaaS environments stunned many IT teams. Here’s what we discovered.

Secure Your Data: Where to Start When There Are 1 Million Threats

There are seemingly a million security threats and exposures everywhere today. So where do you start? In a recent webinar, our founder and CEO David Politis explained what the new security frontier is and why IT must start paying attention to it. He also revealed the top three concerns 1,500+ IT professionals have around managing SaaS apps and offered actionable tips for mitigating them.

The 6 Essential Elements of a Successful SaaS Management Strategy

In recent years, SaaS adoption has been like the Wild West: a somewhat chaotic “free-for-all” frontier with lots of unknowns. After interviewing, surveying, and talking to thousands of modern IT professionals over the last few years, we’ve identified six elements that are integral to successful SaaS management. Here’s a holistic strategy that will set you up for IT success.

The Top Security Blind Spots in Your SaaS Environment

“Fired IT Guy Puts Porn in Ex-Boss’ PowerPoint, Gets Sweet Revenge.” “Corporate Data Slips Out Via Google Calendar.” “Hundreds of Companies Expose PII, Private Emails Through Google Groups Error.” These are just a few of the news headlines that represent hidden security threats lurking in SaaS environments. Last week, we hosted a webinar on the top security blind spots you should know about. Don’t worry if you missed it. Here’s a recap.

SOM vs. CASB vs. IDaaS: The Unique Value of BetterCloud Demonstrated in 10 GIFs

“What is BetterCloud? Is BetterCloud a CASB? An IDaaS?” People ask us these questions all the time. But BetterCloud is solving a set of challenges that no other vendor addresses. We’re not a CASB or an IDaaS (in fact, many of our customers use us alongside those solutions). Instead, we’re pioneering a new IT market: SaaS Operations Management, or SOM. Here are 10 GIFs that illustrate the unique value of BetterCloud.

3 Real-Life IT Horror Stories That Illustrate Dangerous Blind Spots in SaaS Environments

As the adage goes, “You don’t know what you don’t know.” And that’s especially true when it comes to managing SaaS environments. Increasingly, IT teams are running into unforeseen challenges and realizing that there are critical areas—aka blind spots—they have no visibility into. Here are some real-life horror stories that illustrate major blind spots in SaaS environments and the damage they can cause.

First Round Capital BetterCloud

How First Round Capital Orchestrates Employee Offboarding for Immediate Data Security and Precision

BetterCloud, combined with Okta, helps VC firm First Round Capital orchestrate around 90% of the employee offboarding process. With more than $700mm under management, data simply cannot be publicly exposed and offboarding must happen almost immediately. Here’s how Ryan Donnon, IT and data manager at First Round Capital, ensures data security across multiple SaaS applications during offboarding in “thirty seconds.”

Successful Strategies for Improving User Adoption of New Technologies

More often than not, employees are resistant to change and training sessions are ineffective. Brandon Williams, Director of Google Operations for the State of Colorado, shared a few helpful (and surprising) strategies for improving user adoption of new technology. To hear how he was successful in improving user adoption (for 30,000 employees, no less), watch this video.

Modern Workplace Innovators: Meet Brandon Williams

For Brandon Williams, Director of Google Operations for the State of Colorado, working in government means that you can make truly meaningful change. In the latest installment of our Modern Workplace Innovators video series, watch the inspiring story of how Williams used Google Apps to redefine emergency communications, and how he also leveraged shadow IT to empower 30,000 employees.

The Easy Guide to Android Encryption

Consumers are more security conscious than ever, and cellphone manufacturers are taking notice. Default iPhone encryption and Android encryption allow users to lock down their phones, protecting stored data from hackers, as well as government spying. Here’s what you need to know to protect your Android data—both on the device and in the cloud.

HIPAA Compliance

A HIPAA Compliance Checklist for the Cloud Era

The only way to keep PHI secure is to build a secure system from day one, but that’s not exactly easy. After all, HIPAA is a complicated piece of legislation. This complete HIPAA compliance checklist from guest contributor and Virtru Founder and CTO Will Ackerly will get you started.

5 Things You Should Know About Your Office 365 Tenant

Over the last six months, our team has spoken with hundreds of IT admins about the key problems they face when managing their Office 365 tenants. While Microsoft offers customers a multitude of management solutions, the customers we’ve spoken to as part of our BetterCloud for Office 365 Beta Advisor program have made one problem clear — they desperately want better visibility into their environment, but they lack the time or the tools needed to get that critical information.

A Look Back at gCON 360°

gCON, the world’s largest online event series for Google Apps customers, hosted gCON 360 April 27-29, bringing together thousands of Google Apps users from around the world through Google’s Hangouts …

Welcome to the New BetterCloud

Today’s an important day at BetterCloud—the beginning of a new chapter in the company’s history. Several changes went into effect earlier today that impact everything from the names of our …

Event: NYC February Google Apps Meetup

When: February 3rd, 6pm Where: BetterCloud office, 14th floor, 330 7th Avenue, New York  Insider threats are growing. State privacy laws are getting stricter. And your company’s information is a …

Chromebook Deployment

With their speed, simplicity, security and standardization, Chromebooks are a great choice for the computing needs of many organizations. For organizations that decide to switch to Chromebooks, the deployment process …