![2023年SaaS安全调查报告(英)_第1页](http://file4.renrendoc.com/view/20007d304c5be609bf9f744fe2a1fd05/20007d304c5be609bf9f744fe2a1fd051.gif)
![2023年SaaS安全调查报告(英)_第2页](http://file4.renrendoc.com/view/20007d304c5be609bf9f744fe2a1fd05/20007d304c5be609bf9f744fe2a1fd052.gif)
![2023年SaaS安全调查报告(英)_第3页](http://file4.renrendoc.com/view/20007d304c5be609bf9f744fe2a1fd05/20007d304c5be609bf9f744fe2a1fd053.gif)
![2023年SaaS安全调查报告(英)_第4页](http://file4.renrendoc.com/view/20007d304c5be609bf9f744fe2a1fd05/20007d304c5be609bf9f744fe2a1fd054.gif)
![2023年SaaS安全调查报告(英)_第5页](http://file4.renrendoc.com/view/20007d304c5be609bf9f744fe2a1fd05/20007d304c5be609bf9f744fe2a1fd055.gif)
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
TheAnnualSaaSSecuritySurveyReport
2024PlansandPriorities
TheAnnualSaaSSecuritySurveyReport:2024Plans&Priorities1
©AllrightsreservedtoAdaptiveShield&CloudSecurityAlliance
Contents
KeyFindings3
SurveyCreationandMethodology4
Data&Discussion
SaaSSecurityIncidentsontheRise
CurrentSaaSSecurityStrategiesandMethodologiesDon’tGoFarEnough
StakeholderSpreadinSecuringSaaSApplications
HowOrganizationsArePrioritizingPolicies&ProcessesforTheirEntireSaaSInvestmentinSaaSandSaaSSecurityResourcesareDrasticallyIncreasing
Security
Ecosystem
5
5
6
8
9
12
Demographics
15
AppendixA:SurveyResults
17
Acknowledgements
26
AbouttheSponsor26
TheAnnualSaaSSecuritySurveyReport:2024Plans&Priorities2
©AllrightsreservedtoAdaptiveShield&CloudSecurityAlliance
SaaSSecurityIncidentsontheRise
55%oforganizationsreportthattheyexperiencedanincidentinthepasttwoyears,withanother12%unsure.Thesefindingsunderscorethatcompaniesarecomingtounderstandtheharshrealitythatcommonon-premtypesofattacks,suchasransomware,malware,anddatabreaches,canalsooccurintheircloudSaaSenvironments.
CurrentSaaSSecurityStrategiesandMethodologiesDon’tGoFarEnough
Thesurveyfindsthatoverhalf(58%)oforganizationsestimatetheircurrentSaaSsecuritysolutionsonlycover50%orlessoftheirSaaSapplications.It’sbecomingclearthatmanualauditsandCASBsarenotenoughtoprotectcompaniesfromSaaSsecurityincidents.
StakeholderSpreadinSecuringSaaSApps
CISOsandsecuritymanagersareshiftingfrombeingthecontrollerstogovernorsastheownershipofSaaSappsarespreadoutthroughallthedifferentdepartmentsoftheirorganization.Alignment,communicationandcollaborationarekeytobeingabletosecuretheorganization’sSaaSstack.
HowOrganizationsArePrioritizingPolicies&ProcessesforTheirEntireSaaSSecurityEcosystem
SaaSsecuritycontinuestoadapttoencompasstheexpandingbroadrangeofconcernsintheSaaSEcosystem,includingSaaSMisconfigurations,SaaS-to-SaaSAccess,Device-to-SaaSRiskManagement,IdentityandAccessGovernance,andIdentityThreatDetection&Response(ITDR).Organizationsareputtingrobustpolicies,processes,andcapabilitiesinplacethatareessentialforprotectingthesedifferentdomains.
InvestmentinSaaSandSaaSSecurityResources
AreDrasticallyIncreasing
66%oforganizationshaveincreasedtheirinvestmentinapps,with71%increasingtheirinvestmentinsecuritytoolsforSaaS.Morespecifically,thesurveyshowsthatadoptionofSaaSSecurityPostureManagement(SSPM)solutionshasgrownsignificantly,increasingfrom17%in2022to44%in2023.ThiscanbeattributedtothefactthatSSPMsprovidecoverageinareaswhereothermethodsandstrategieshavefallenshort,offeringmorecomprehensiveprotectionagainstvarioussecurityrisksthroughoutthewholeSaaSSecurityEcosystem.
KeyFindings
1
2
3
4
5
TheAnnualSaaSSecuritySurveyReport:2024Plans&Priorities3
©AllrightsreservedtoAdaptiveShield&CloudSecurityAlliance
CurrentSaaS
applicationusein
organizations
Organizations'securitypoliciesandprocessesregardingSaaSapplications
AwarenessandexperiencewithSaaSthreats
SurveyCreationandMethodology
TheCloudSecurityAlliance(CSA)isanot-for-profitorganizationwithamissiontowidelypromotebestpracticesforensuringcybersecurityincloudcomputingandITtechnologies.CSAalsoeducatesvariousstakeholderswithintheseindustriesaboutsecurityconcernsinallotherformsofcomputing.CSA’smembershipisabroadcoalitionofindustrypractitioners,corporations,andprofessionalassociations.OneofCSA’sprimarygoalsistoconductsurveysthatassessinformationsecuritytrends.Thesesurveysprovideinformationonorganizations'currentmaturity,opinions,interests,andintentionsregardinginformationsecurityandtechnology.
AdaptiveShieldcommissionedCSAtodevelopasurveyandreporttobetterunderstandtheindustry’sknowledge,attitudes,andopinionsregardingSaaSapplicationuse,SaaSsecuritypoliciesandprocesses,SaaSthreats,andSaaSsecuritystrategy/solutions.AdaptiveShieldfinancedtheprojectandco-developedthequestionnairewithCSAresearchanalysts.ThesurveywasconductedonlinebyCSAinMarchof2023andreceived1130responsesfromITandsecurityprofessionalsfromorganizationsofvarioussizesandlocations.CSA’sresearchanalystsperformedthedataanalysisandinterpretationforthisreport.
GoalsoftheStudy
TheprimaryobjectivesofthesurveyweretogainadeeperunderstandingofseveralcriticalaspectsofSaaSsecurityinorganizations.
Currentandfutureuseofsecuritysolutions
TheAnnualSaaSSecuritySurveyReport:2024Plans&Priorities4
©AllrightsreservedtoAdaptiveShield&CloudSecurityAlliance
Data&Discussion
Intoday'sdigitallandscape,SaaSsecurityisofcriticalimportancefororganizationsofallsizes.Asbusinessesincreasinglymovetheiroperationsanddatatothecloud,ormorespecifically–SaaSapplications,thesecurityoftheseappsbecomesparamount.WhileSaaSapplicationsaresecurebydesign,thewaytheyareconfiguredandgovernediswhatposesarisk.Withoutpropersecuritymeasures,organizationsareexposedtodatabreaches,cyber-attacks,andothersecurityincidentsthatcanresultinsignificantfinancialandreputationaldamage.UnderstandingSaaSsecurityisthereforeessentialfororganizationstoprotectthemselvesfromtheserisks.
It'swiththisbackdropthatthissurveyreturns,delvingintotheintricaciesofSaaSsecurityandofferingafollow-uptolastyear'sreport.Belowarethisyear’sfindingsandinsights.
KeyFinding#1
SaaSSecurityIncidentsontheRise
ThesurveyrevealsasignificantincreaseinsecurityincidentswithintheSaaSecosystem,with55%oforganizationsreportingthattheyexperiencedanincidentinthepasttwoyears,up12%fromthepreviousyear.Aboutathird(32%)ofrespondentsstatedthattheyhadn'tencounteredaSaaSsecurityincidentwithinthesameperiod,while12%wereunsure.
Thefindingsunderscorethatmanycompaniesarecomingtounderstandtheharshrealitythatcommonon-premtypesofattacks,suchasransomware,malware,anddatabreaches,canalsooccurintheirSaaSenvironments.
HasyourcompanyexperiencedaSaaSapplicationsecurityincidentwithinthepasttwoyears
55%
Yes
12%
Unsure
32%
No
TheAnnualSaaSSecuritySurveyReport:2024Plans&Priorities5
©AllrightsreservedtoAdaptiveShield&CloudSecurityAlliance
KeyFinding#1/SaaSSecurityIncidentsontheRise
AmongthemostprevalentSaaSsecurityincidentsreportedweredataleakage(58%),maliciousapps(47%),databreaches(41%),andSaaSransomware(40%),highlightingthegrowingneedforrobustsecuritymeasuresandincreasedawarenessofthepotentialrisksassociatedwiththeexpandingSaaSlandscape.
Whattypeofsecurityincident(s)haveyouexperienced
41%
32%
11%
47%
58%
40%
DataLeakage
MaliciousApps
InsiderAttack
DataBreach
SaaSRansomware
CorporateEspionage
KeyFinding#2
CurrentSaaSSecurityStrategiesand
MethodologiesDon’tGoFarEnough
InsufficientMonitoringofSaaSApplications
AkeycontributortothenotedincreaseinSaaSsecurityincidents,thefindingsfromthesurveysuggestthatasignificantnumberoforganizationsarefallingshortwhenitcomestoimplementingeffectiveSaaSsecuritymeasures.ManycompaniesareusingsecuritysolutionsthatdonotcovertheirentireSaaS
stack,leavingtheirapplicationsanddataexposedtocyberthreats.Specifically,thesurveyfoundthatoverhalf(58%)oforganizationsestimatetheircurrentSaaSsecuritysolutionsonlycover50%orlessoftheirSaaSapplications.
PercentageoftheSaaSapplicationsmonitoredbySaaSsecuritysolutions
20%
oforganizations
~100%ofthestackismonitored
6%oforganizations
33%oforganizations
7%oforganizations
6%oforganizations
28%oforganizations
~25%ofthestackismonitored
~50%ofthestackismonitored
~75%ofthestackismonitored
Noneofthemmonitored
Unsure
TheAnnualSaaSSecuritySurveyReport:2024Plans&Priorities6
©AllrightsreservedtoAdaptiveShield&CloudSecurityAlliance
KeyFinding#2/CurrentSaaSSecurityStrategiesandMethodologiesDon’tGoFarEnough
ThesefindingshighlightthepressingneedforcompaniestoreassesstheirsecuritysolutionsandensuretheyprovidecomprehensivecoverageacrosstheirentireSaaSecosystem.Bydoingso,organizationscansignificantlyreducetheirriskofsecurityincidents,includingdatabreaches,ransomwareattacks,andothertypesofcyber-attacks.Ultimately,thiswillhelptosafeguardtheirreputationandmaintainthetrustoftheircustomers.
CASBsandManualAuditsFallingShortforSaaSsecurity
ManyorganizationsrelyonCloudAccessSecurityBrokers(CASBs)andmanualauditstosecuretheirSaaSapplications.However,thesemethodsareprovingtobeinsufficientinanumberofkeyareas.Additionally,manualauditsexposecompanydatabetweenaudits,leavingorganizationsatriskforsecurityincidentsduringthosegaps.
WhatpercentageoforganizationsaregettingfullSaaSsecuritycoveragefromCASBandmanualaudits
IdentityandAccessGovernanceSaaSThreatDataLossPrevention
11%CASB
15%CASB
14%CASB
13%ManualAudits
13%ManualAudits
14%ManualAudits
3rdPartyAppDiscoverySaaSUserDeviceRiskManagementSaaSMisconfigurations
12%CASB
10%CASB
10%CASB
11%ManualAudits
10%ManualAudits
10%ManualAudits
ThesefindingsindicatethatorganizationsneedtoreevaluatetheirsecuritystrategiesandinvestinmorecomprehensivesolutionsandstrategiesthatprovidefullcoverageacrosstheirSaaSecosystemtoreducetheriskofsecurityincidents.ThisisalsolikelywhatiscontributingtotheincreaseduseofSaaSSecurityPostureManagement(SSPM)tools.
TheAnnualSaaSSecuritySurveyReport:2024Plans&Priorities7
©AllrightsreservedtoAdaptiveShield&CloudSecurityAlliance
KeyFinding#3
StakeholderSpreadinSecuring
SaaSApplications
Inadditiontomonetaryinvestmentsintools,security,andstaff,organizationsareincreasinglyinvolvingnumerousstakeholdersintheprocessofsecuringbusiness-criticalapplications.Acrossatypicalorganization,awidearrayofSaaSappsareusedfromfilesharingandcollaborationappstoCRM,projectandworkmanagement,marketingautomation,andmanymore.SaaSappsfillavarietyofnicheroles,yetthisstakeholderspreadcomplicatesthethreatlandscape.
Now,CISOsandsecuritymanagersareshiftingfrombeingthecontrollerstogovernorsofSaaSappsecurity,andthesurveyshowshowmanyofthoseengagedinsecuritygovernanceholdexecutive-levelpositionsorserveasdepartmentheads,indicatingthatbusinessesaretakingSaaSsecurityseriously.Theinvolvementofkeydecision-makersunderscoresthegrowingrecognitionofthecriticalrolethatSaaSsecurityplaysinprotectingvaluableassetsandensuringoperationalcontinuity.
However,withsomanyindividualsinvolved,itcanbecomechallengingtodeterminewhoisultimatelyresponsibleforSaaSsecurity.SaaSapplicationsoftenrequireclosecollaborationbetweenthesecurityteamandappowners,asthesecurityteammaynotalwayshavedirectaccesstotheSaaSapp.Thisnecessitatesprocessesandtoolsthatcanbridgethegapandactivelyengageappowners,whoarecrucialforeffectiveSaaSsecuritymanagement.
Titlesinvolvedinsecuringbusiness-criticalapps
43%
39%
38%
42%
HeadofSecurity
SecurityOperations
IT
CloudSecurityArchitects
4%
16%
29%
26%
GRCTeam
Idon’tknow/Other
CIO
BusinessApplicationOwner
Byfosteringacollaborativeenvironmentandimplementingsolutionsorstrategiesthatfacilitatecommunicationandcoordinationbetweensecurityteamsandappowners,organizationscancreateamorerobustandstreamlinedapproachtosecuringtheirbusiness-criticalapplications.This,inturn,willhelpminimizepotentialthreatandensureahigherlevelofprotectionagainsttheever-evolving
landscapeofSaaSsecuritythreats.
TheAnnualSaaSSecuritySurveyReport:2024Plans&Priorities8
©AllrightsreservedtoAdaptiveShield&CloudSecurityAlliance
KeyFinding#4
HowOrganizationsArePrioritizing
Policies&ProcessesforTheirEntireSaaS
SecurityEcosystem
Overthepastyear,thefocusofSaaSsecurityhasevolvedsignificantly,drivenbyfactorssuchasincreasedinvestmentinbusiness-criticalSaaSapplications,ariseinsecurityincidents,andthegrowingnumberofthreatactorstargetingSaaSapps.Previously,organizationsandsecuritytools,likeSSPMs,wereprimarilyfocusedonmisconfigurationmanagement.However,SaaSsecurityhasadaptedtoencompassabroaderrangeofconcerns,includingSaaS-to-SaaSAccess,Device-to-SaaSRiskManagement,IdentityandAccessGovernance,andIdentityThreatDetection&Response(ITDR).
SaaSPoliciesandProcedures
WiththerisingimportanceofSaaSinthebusinesslandscape,havingrobustpolicies,processes,andcapabilitiesinplaceisessentialforprotectinganorganization'sSaaSstackandthedataitcontainsfromthreatactors.
Organizationsarenowputtingmeasuresinplacetoaddresskeyareas.ThedatabelowpresentswhatorganizationsarestartingtoprioritizewhensecuringtheirSaaSstackthroughoutthedifferentdomainsoftheSaaSSecurityEcosystem.
MisconfigurationManagement
Addressingmisconfigurationissuesisvitaltoprotectanorganization'sSaaSstackfrommisconfiguredsecuritysettingsthatcanbeexploitedbythreatactors.Themainprioritiesformisconfigurationmanagementofrespondentsinclude:
Communicationandcollaborationbetweensecurityandappownerteams
Withastrongsystemandprocessin
Detailedfixesandmitigationofmisconfigurations
place,thesehigh-impactareascan
Prioritizationbasedontheapplication,securitydomain,andrisklevel
helpreducetheSaaSattacksurface.
TheAnnualSaaSSecuritySurveyReport:2024Plans&Priorities9
©AllrightsreservedtoAdaptiveShield&CloudSecurityAlliance
Search,detect,andquantifyriskofconnectedthird-partySaaSapplications
DetectmaliciousappsthathavebeenintegratedintotheSaaSstack
Isyoursecurityteamabletoidentifyandmanageuserswithmultipleusernames
64%Yes14%No18%Idon’tknow3%N/A
KeyFinding#4/HowOrganizationsArePrioritizingPolicies&ProcessesforTheirEntireSaaSSecurityEcosystem
Third-PartyAppAccess
Asorganizationsincreasinglyrelyonthird-partySaaSapplications(appsthatareconnectedtothecorestack),itbecomescrucialtohavepoliciesinplacetoassessandmanagepotentialrisks.Themainprioritiesfor3rd-partyappaccessinclude:
Processforappownersrequiringthemtosubmitarequesttosecuritybeforeconnectinganapp
Theseprioritiesreflecttheneedforstrongsystemsandprocessesinplacetoprotectagainstthird-partyappaccessthreats.
SaaSIdentityandAccessGovernance
ProperidentityandaccessgovernanceisessentialforsafeguardingsensitivedatawithintheSaaSecosystem.TheprioritiesinIdentityandAccessGovernanceinorganizationstodayinclude:
Ensureeachuserhastherightlevelofaccessneeded
DetectusersthathavebeendisabledintheActiveDirectorybutstillhaveaccesstoSaaSapplications
DetectdormantaccountstoquicklyensurethedeprovisioningoftheiraccesstoSaaSifneeded
NotificationofAdminaccess
Authenticationpractices(e.g.,keymanagement,certificatemanagement)
TheAnnualSaaSSecuritySurveyReport:2024Plans&Priorities10©AllrightsreservedtoAdaptiveShield&CloudSecurityAlliance
Checkingthedevicehygiene(vulnerabilitiesandupdatedagents)ofeachandeverySaaSuser,especiallyprivilegedones
Detectbruteforceattacks
KeyFinding#4/HowOrganizationsArePrioritizingPolicies&ProcessforTheirEntireSaaSSecurityEcosystem
MonitoringSaaSUserDevices
EnsuringthesecurityofdevicesthataccesstheSaaSstackiscriticalforpreventingunauthorizedaccessanddatabreaches.OrganizationalprioritiesforensuringSaaSrisksarenotstemmingfromdevicesinclude:
IdentifyingunmanageddevicesaccessingtheSaaSstack
Manydon’tviewdevicesasaweakspotintheirSaaSappsecurity.Theoppositeistrue;devicesareagateway—andifaprivilegeduser’sdeviceisnotsecure,thedamageifathreatactorsucceedswouldbesignificant.
Myorganization'spoliciesandprocessesformonitoringdevicesthataccessSaaSapplicationsinclude
47%
5%
54%
17%
42%
Identifyunmanaged
devicesaccessingthe
SaaSstack
Idon’thavea
process/
I’munabletomonitor
devicesthataccess
ourSaaS
Checkthedevice
hygiene(vulnerabilities
andupdatesagents)of
eachandeverySaaS
user
Checkthedevice
Ourprocessdoesnot
includeanyofthe
above
hygiene(vulnerabilities
andupdatesagents)of
SaaSprivilegedusers
only
ThreatDetectionandResponse
Proactivethreatdetectionandresponseiscrucialfordefendingorganizationsfromtargetedattacks.In
today’senvironment,theprioritiesforthreatdetectionandresponseare:
IdentifyandrespondtouserandentitybehaviorDetectMFAfloodattacks
anomalies
Detectattacksthroughthreatintelligence
Myorganization'sSaaSthreatdetectionandresponsecapabilitiesinclude
47%
DetectMFAfloodattacks
58%
Detectattacksthroughthreatintelligence
36%
Detectbruteforceattacks
6%
2%
Other
44%
Identifyandrespondtouserandentitybehavioranomalies
Idon’thaveSaaSthreatdetectionandresponsecapabilities
TheAnnualSaaSSecuritySurveyReport:2024Plans&Priorities11
©AllrightsreservedtoAdaptiveShield&CloudSecurityAlliance
KeyFinding#5
InvestmentinSaaSandSaaSSecurityResourcesAreDrasticallyIncreasing
IncreasedInvestmentinSaaS
OrganizationsarerelyingmoreheavilyonSaaSresources,encompassingnotjustbusiness-criticalappsandstaffbutalsotherightsecuritytoolsfocusedonSaaSsecurity.
Accordingtothesurvey,71%oforganizationshaveincreasedtheirinvestmentinsecuritytoolsforSaaS,demonstratingagrowingcommitmenttoprotectingtheirdigitalassets.Furthermore,68%oforganizationshaverampeduptheirinvestmentinhiringandtrainingstaffonSaaSsecurity,recognizingtheimportanceofhumancapitalinsafeguardingtheirSaaSecosystems.Additionally,66%oforganizationshaveincreasedtheirinvestmentinbusiness-criticalSaaSapplications,reflectingthegrowingrelianceonthesetoolsforcorebusinessfunctions.
ThisholisticapproachtoSaaSinvestment,encompassingsecuritytools,personnel,andapplications,underscorestheimportanceofrobustsecuritysolutionslikeSSPMs.
ChangesinCompanyInvestmentsinSaaS
71%68%
66%
25%
23%
27%
8%
5%6%
Decreased
Remainedthesame
Increased
BusinesscriticalSaaSapplicationsSecuritytoolsforSaaSHiringand/ortrainingstafforSaaSsecurity
TheAnnualSaaSSecuritySurveyReport:2024Plans&Priorities12
©AllrightsreservedtoAdaptiveShield&CloudSecurityAlliance
KeyFinding#5/InvestmentinSaaSandSaaSSecurityResourcesareDrasticallyIncreasing
IncreaseinUseofSaaSSecurityPostureManagement(SSPM)
WithSaaSsecurityincidentsontheriseandcurrentSaaSsecuritymethods(e.g.,CASBandmanualaudits)fallingshort,organizationsareseekingoutmoreadvancedSaaSsecuritytoolingsuchasSSPMs.ThesurveyshowsthatadoptionofSSPMtoolshasgrownsignificantly,withthepercentageoforganizationsusingSSPMincreasingfrom17%in2022to44%in2023.
ThiscanbeattributedtothefactthatSSPMsprovidecoverageinareaswhereothermethodsandstrategieshavefallenshort,offeringmorecomprehensiveprotectionagainstvarioussecurityrisksthroughoutthewholeSaaSSecurityEcosystem.
Asbrokendownearlierinthispaperbutsummarizedhere,theseareasinclude
•SaaSMisconfigurations:EnsuringproperconfigurationofSaaSapplicationstoavoidbreaches.
•Identity&AccessGovernance:ManagingandcontrollinguseraccesstoSaaSapplicationsandresources.
•Third-PartyAppAccess:Identifyingandmanagingtherisksassociatedwiththird-partyapplicationsaccessingSaaSenvironments.
•DataLossManagement:PreventingandmitigatingthelossorleakageofsensitivedatainSaaSapplications.
•ConnectedMaliciousApps:DetectingandremovingmaliciousapplicationsthatcouldcompromisethesecurityoftheSaaSenvironment.
•ThreatDetection&Response:Proactivelyidentifyingandrespondingtosecuritythreatsinreal-time.
•SaaSUserDevices:MonitoringandmanagingthesecurityrisksassociatedwithuserdevicesconnectingtoSaaSapplications.
UsageofSSPMYearoverYear
2023
44%
2022
17%
TheAnnualSaaSSecuritySurveyReport:2024Plans&Priorities13
©AllrightsreservedtoAdaptiveShield&CloudSecurityAlliance
KeyFinding#5/InvestmentinSaaSandSaaSSecurityResourcesareDrasticallyIncreasing
AreyoucurrentlyusingorplanningtouseaSaaSSecurityManagment(SSPM)platform
19%
Nocurrentplan
44%
Currentlyusing
36%
AsSaaSsecurityincidentscontinuetorise,
organizationsarerecognizingthelimitations
ofothersecuritymethodslikeCASBsand
manualauditsforSaaS.Theincreasedadoption
aswellasthesignificantpercentageofthose
planningonadoptingSSPMsolutionsreflects
thegrowingawarenessoftheneedformore
robustandcomprehensivesecuritymeasuresto
protectagainsttheever-evolvinglandscapeof
SaaSsecuritythreats.
Plantouseinthe
next18months
SSPMBeneits
GiventheincreasingimportanceofSaaSsecurity,thereisaclearneedforamorecomprehensiveandrobustapproach.ThereareSaaSsecuritytoolssuchasSSPMsthatcanassistorganizationswiththepolicies,processes,andcapabilitiesthattoday’sSaaSsecuritylandscaperequires.Byfocusingonthesecriticalaspects,organizationscanbetterprotecttheirvaluableassetsandensurethesafeoperationoftheirbusiness-criticalapplicationsinanincreasinglycomplexthreatlandscape.
BenefitsthatinterestcompaniesinSSPM
31%
MitigateSaaSthreats
23%
Timesavingsinmanagementandmaintenance
7%
10%
Costsavings
29%
IncreaseSaaSsecurityposture
Abilitytoadapttonewconditionsorchallenges
OrganizationsareincreasinglyrecognizingthevalueofadoptingSaaSsecuritytoolslikeSSPMstoaddresstheevolvingchallengesintheSaaSlandscape.Thisexplainswhy44%havealreadyadoptedanSSPMsolutioninthepastyearandwhy36%areplanningtoadoptSSPMinthenext18months.Byleveragingthesetools,businessescaneffectivelymitigateSaaSthreatsandsignificantlyenhancetheiroverallsecurityposture.
Inaddition,theuseofSSPMsenablesorganizationstoachievetimesavingsinmanagementandmaintenance,asthesesolutionsstreamlineandautomatevarioussecurityprocessesthatwouldotherwiserequiremanualeffort.Thisautomationnotonlyleadstocostsavingsbyreducingtheneedformanual
workbutalsoallowsorganizationstoreallocateresourcestoothercriticalareas.Moreover,SaaSsecuritytoolsprovidetheadaptabilityneededtorespondtonewconditionsandemergingthreats,ensuringthatbusinessesremainagileandpreparedtoprotecttheirdigitalassetsandcriticalapplicationsinaconstantlychangingenvironment.
TheAnnualSaaSSecuritySurveyReport:2024Plans&Priorities14
©AllrightsreservedtoAdaptiveShield&CloudSecurityAlliance
Demographics
ThesurveywasconductedonlinebyCSAinMarch2023andreceived1130responsesfromITandsecurityprofessionalsfromorganizationsofvarioussizesandlocations.
Inwhichindustrydoyouwork?
17%
11%
6%
6%
6%
Technology
FinancialServices
Government
Professionalservices(Law,Consulting,etc.)
Media
5%
5%
5%
5%
5%
Healthcare
Education
Insurance
eCommerce&Retail
Energy&Utilities
5%
5%
4%
3%
3%
Food
Industrials(Manufacturing,Construction,etc.)
Pharmaceutical
Banking
Transport&Logistics
3%
2%
1%
1%
1%
PublicServices
Telecom
Agriculture&Mining
Other
Travel&Hospitality
Whichofthefollowingmostcloselymatchesyourrole?
18%
12%
9%
8%
7%
7%
IT
CyberSecurity
CloudSecurity
Architect
SaaSSecurity
DeputyCISO
InfoSec
7%
5%
4%
4%
3%
2%
Cloudsecurity
GRC
SaaSSecurity
Architect
CISO
SecurityEngineer
CIO
2%
2%
2%
2%
1%
5%
SecOps(Security
ForensicsExpert
VendorRisk
PenetrationTester
Vulnerability
Other
Operations)
Assessment
Management
Whatisyourjoblevel?
14%
Staf
49%
Manager
37%
C-Levelorexecutive
TheAnnualSaaSSecuritySurveyReport:2024Plans&Priorities15
©AllrightsreservedtoAdaptiveShield&CloudSecurityAlliance
Demographics
Whatisthesizeofyourorganization?
32%
<1000employees
12%
+10001employees
16%
40%
1001-5000employees
5001-10000
employees
Whatregionoftheworldyoulocatedin?
63%
Americas
11%
Europe,MiddleEast,Africa(EMEA)
26%
Asia-Pacific(APAC)
TheAnnualSaaSSecuritySurveyReport:2024Plans&Priorities16
©AllrightsreservedtoAdaptiveShield&CloudSecurityAlliance
AppendixA:SurveyResults
Changeincompany’sSaaSinvestments
Overthepastyear,has
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 出租车买卖合同范本
- 北京市居住房出租合同范本
- 消防喷淋改造协议书范本
- 班组安全协议书范本
- 生猪养殖场租赁合同范本
- 苏科版数学七年级下册《数学活动 拼图·公式》听评课记录5
- 燕山大学里仁学院《石油与天然气地质学含实验》2023-2024学年第二学期期末试卷
- 唐山师范学院《数据库原理及技术》2023-2024学年第二学期期末试卷
- 苏州高博软件技术职业学院《标志设计》2023-2024学年第二学期期末试卷
- 四川传媒学院《建设工程经济》2023-2024学年第二学期期末试卷
- 公司市场分析管理制度
- 焊接材料制造工-国家职业标准(2024版)
- 江西省2024年中考数学试卷(含答案)
- 榆神矿区郭家滩煤矿(700 万吨-年)项目环评
- 2024年200MW-400MWh电化学储能电站设计方案
- 余土外运施工方案
- DB32-T 186-2015建筑消防设施检测技术规程
- 中考英语1600词汇对照表-(带音标)
- 虚拟化与云计算技术应用实践项目化教程 课件全套 陈宝文 项目1-8 虚拟化与云计算导论- 腾讯云服务
- 2024广东高压电工考试电工证考试题模拟试题(全国版)
- JJG 705-2014液相色谱仪行业标准
评论
0/150
提交评论