Hi [[ session.user.profile.firstName ]]
Sort by:
    • How to Achieve True Scalability in SaaS Applications?
      How to Achieve True Scalability in SaaS Applications? Jothi Rengarajan - Principal Architect – SaaS Solutions, Janakiraman Jayachandran - Cloud Architect Recorded: May 27 2015 6:00 pm UTC 63 mins
    • One of the most unique and critical feature of Cloud is it’s “Elasticity”. The very nature of SaaS applications being delivered over cloud (internet) enforces a natural requirement for these applications to be elastic as well in order to leverage the cloud benefits. However, one of the common myths in SaaS is Cloud will take care of scalability and application need not worry about it. Many SaaS providers realize this when their applications are put for a true scalability test – which can span across all the layers of your application. While the cloud facilitates elasticity the application should have been architected to make use of it. In this webinar we are going focus on the best practices involved in building a true scalable SaaS application.

      Key Takeaways:
      • Scalability considerations in a layered architecture
      • Scalability design patterns
      • Techniques for database scalability
      • Balancing cost vs. scalability in AWS cloud
      • Key services in AWS for SaaS applications to leverage scalability

      Read more >
    • Security Architecture Best Practices for SaaS Applications
      Security Architecture Best Practices for SaaS Applications Jothi Rengarajan - Principal Architect – SaaS Solutions, Janakiraman Jayachandran - Cloud Architect Recorded: Mar 24 2015 6:00 pm UTC 64 mins
    • Gartner has predicted 18-20% growth in SaaS market, and expects it to hit US $22.1 billion by the year 2015. They have also measured that SaaS adoption rate has increased many fold in the last few years (almost 71% of enterprises use SaaS solutions).

      SaaS has come a long way from “hype” to “norm”. The key to this change is the confidence that has been built by the cloud/SaaS community by providing enterprise class security. Since, SaaS model of delivery has become a defacto standard of delivering products it’s critical for software providers to ensure that their SaaS product meets the required industry security standards. In this webinar, we will address the security aspects related to architecture, deployment and management of SaaS solutions.

      Key Takeaways:
      • Security considerations in each of the architecture layers
      • Data isolation risks and mitigation plans
      • Overview of CWE/SANS and OWASP Security threats
      • Data retention and termination policies
      • Infrastructure and cloud related security risks and solutions

      Read more >
    • Making a Smart SaaS Choice: Six Key Questions to Ask
      Making a Smart SaaS Choice: Six Key Questions to Ask Peter Cohen, Managing Partner, SaaS Marketing Strategy Advisors, www.saasmarketingstrategy.com Recorded: Jul 24 2012 2:00 pm UTC 24 mins
    • If it hasn’t happened to you already, sooner or later you’ll probably be asked to evaluate a software-as-a-service (SaaS) solution for your business. No matter what function you’re looking to automate – ERP, CRM, talent management, or some specialized, industry-specific application – there’s probably a SaaS solution available for you to consider.

      So how do you choose? What criteria should you use to determine whether a SaaS solution fits your needs? And which vendor you should work with?

      This brief webinar will present six key questions that you should ask when evaluating SaaS solutions. Better yet, it will point out the kind of answers you should be listening for.

      If you’re in the midst of evaluating a SaaS solution for your organization – and if you’re not, it’s likely that you will be soon – this will be a valuable session for you.

      Speaker bio

      The speaker, Peter Cohen, is the Managing Partner at SaaS Marketing Strategy Advisors. His firm provides expert guidance to help companies effectively market and sell SaaS solutions to enterprises.

      Peter has more than 25 years’ experience developing and implementing successful marketing strategies for technology companies, including IBM, Constant Contact, Progress Software, and Honeywell. He writes and speaks frequently about marketing SaaS solutions and publishes a blog and newsletter entitled “Practical Advice on SaaS Marketing.”

      Read more >
    • Seven SaaS Marketing Hazards to Avoid
      Seven SaaS Marketing Hazards to Avoid Peter Cohen, SaaS Marketing Strategy Advisors Recorded: Feb 16 2012 4:00 pm UTC 48 mins
    • Marketing software-as-a-service (SaaS) solutions presents a unique set of challenges. In contrast to their on-premise brethren, SaaS marketers are tasked with delivering new messages to new audiences, and doing it all extremely cost-effectively.

      To paraphrase, Kermit the Frog, "It isn't easy being SaaS."

      This webinar will point out seven particularly nasty hazards faced by SaaS marketers. Better yet, it will suggest effective ways to navigate around these hazards.


      The speaker, Peter Cohen, is the Managing Partner at SaaS Marketing Strategy Advisors. His firm provides expert guidance to help companies effectively market and sell SaaS solutions to enterprises.

      Peter has more than 25 years’ experience developing and implementing successful marketing strategies for technology companies, including IBM, Authoria, Progress Software, and Honeywell. He writes and speaks frequently about marketing SaaS solutions and publishes a blog and newsletter entitled “Practical Advice on SaaS Marketing.”

      Read more >
    • Secure Your Company from the SaaS Tsunami
      Secure Your Company from the SaaS Tsunami Al Sargent - Senior Director Product Marketing Recorded: Feb 9 2017 4:00 pm UTC 57 mins
    • According to Gartner, a staggering 600 to 1000 SaaS apps are in use at a typical company, yet IT only knows about & manages ~7% . The unmanaged ~93% pose very real security and compliance challenges including unauthorized access, data leakage, and violation of industry regulations.

      Gartner calls this the "SaaS Tsunami". It grows daily as employees sign up for new SaaS apps using corporate credentials —all it takes is a browser, a credit card, and an expense report—two clicks and they’re in. Join us for an interactive webinar on how to bring unmanaged SaaS apps out of the shadows to reduce security and compliance risks.

      By joining this webinar, you will:
      - Quantify the scope of the SaaS Tsunami and its security impact on your business
      - Learn how to discover and manage previously unknown apps
      - Be quick on your feet and take action when risk is introduced
      - See a demo on how you can mitigate the security threats posed by the SaaS Tsunami

      Read more >
    • [Breach Prevention] Best Practices for the prevention of SaaS threats
      [Breach Prevention] Best Practices for the prevention of SaaS threats Anuj Sawani, Product Marketing Manager, Palo Alto Networks Upcoming: Mar 7 2017 2:00 pm UTC 60 mins
    • Almost every line of business within enterprise organizations has adopted SaaS apps to be more productive and successful. Meanwhile, IT organizations are embracing SaaS apps by approving them for company-wide use, in part to regain control of these applications and the data residing within them. This transition often prompts questions from security teams: Who has access to the data? Is sensitive data at risk? Are my users exposed to malware in my SaaS application?

      Join this webinar where you will learn:
      •Best practices to build a strategy for securing your SaaS environment
      •Real-world examples of risks seen in enterprise SaaS environments
      •Steps to protect against the new threats and prevent data exposure
      •How to comply with data residency regulations within Europe

      Read more >
    • Office 365 and SaaS Optimization with SD-WAN
      Office 365 and SaaS Optimization with SD-WAN Ramesh Prabagaran, VP Product Management & Lloyd Noronha, Head of Global Marketing, Viptela Recorded: Jan 16 2017 8:00 pm UTC 47 mins
    • Gartner’s recent research revealed that 78% of organization are using or plan to use Office 365, and by 2019 half of the global deployments will face network related problems. Limited WAN optimization capability further complicate the problems and presents a major performance and productivity challenge for Office 365 and all SaaS applications.

      SD-WAN provides an essential set of features that solves the networking issues related to Office 365 and SaaS applications. This webinar will cover the following major topics:

      - How traditional networks impair O365 performance, and why?
      - Why enterprises overlook the importance of strategically placing cloud gateways
      - Understanding tradeoffs among reliability, performance and user-experience when architecting the WAN for your cloud
      - Best practice architectures for different kinds of SaaS applications

      Read more >
    • Live Demo: Safely Enable SaaS Applications with Aperture
      Live Demo: Safely Enable SaaS Applications with Aperture Omar Amarin, Inside Sales Engineer at Palo Alto Networks Recorded: Dec 2 2016 10:00 am UTC 45 mins
    • The adoption of SaaS applications continues to grow at an exponential pace. You do not want to clamp down on these applications because they are valuable tools for many of your employees. However, because the data and usage of these SaaS applications is invisible to IT administrators, they do expose your organization to potentially disastrous security and data theft risks.

      Join us for a live webinar where you will learn how your organization can enable safe usage of SaaS applications and:

      •Gain visibility and granular, context-based control of SaaS applications.
      •Protect corporate data from malicious and inadvertent exposure after it has left the traditional corporate perimeter.
      •Protect against new insertion and distribution points for malware.
      •Satisfy compliance requirements while still maintaining the benefits of SaaS based application services.

      The challenges of SaaS applications are already here whether they are enabled by IT or end users themselves. Find out how to take back control and safely enable their use.

      Read more >
    • Accelerate Your Journey to SaaS
      Accelerate Your Journey to SaaS Aleksandra Corr Recorded: Dec 14 2016 2:45 pm UTC 25 mins
    • This webinar is for software vendors that need to move their licensed software to a Software-as-a-Service consumption model, and how they can accelerate this journey.
      It covers what elements are needed to consider when planning, building and executing your journey, by starting to focus on the needs of the application and then choosing the right infrastructure for those needs.
      Following a Plan>Build>Run structure. What are the key technical, process and people considerations to making this trouble free?
      Throughout the presentation, we will highlight some customer pain points that may be seen whilst migrating your application to a SaaS, and use real life customer examples.

      Read more >
    • Best Practices for Prevention of SaaS Threats
      Best Practices for Prevention of SaaS Threats Anuj Sawani | Palo Alto Networks Recorded: Nov 10 2016 3:00 pm UTC 50 mins
    • Many organizations are already transitioning their data to SaaS applications such as Microsoft Office 365, Box or Salesforce. However, because the data and usage of these SaaS applications is invisible to IT administrators, the typical enterprise security tools can’t effectively protect against the risks exposed by the new attack surface.

      Join this webinar where you will learn:
      •Best practices to build a strategy for securing your SaaS environment
      •Real-world examples of risks seen in enterprise SaaS environments
      •Steps to protect against the new threats and prevent data exposure
      •How to proactively monitor users and data within sanctioned SaaS applications

      Make sure your organization leverages the value of SaaS applications without exposing you to their risks.

      Read more >