Zylo Tips: Building an Email Template – Guide + Best Practices
Table of Contents ToggleEmail Template Use CasesSet Brand Standards for Consistent...
Back
Back
Search for Keywords...
Blog
Table of Contents
Software-as-a-service (SaaS) is overtaking business software environments. Predicted by Gartner to grow up to $195 billion in spend in 2023, SaaS tools are used by more businesses, more than ever before.
In its State of the Cloud report, Bessemer Venture Partners states that “the cloud is eating software” and projects that by 2025, more than half of all enterprise software environments will be cloud-based. The majority of these applications will be SaaS.
But for many organizations, the growing use of SaaS-based business tools presents enormous challenges. Even though SaaS technology has existed for more than two decades, many organizations and teams struggle to manage this category of software effectively.
Specifically, businesses frequently struggle to define the total cost of their organization’s investment in SaaS and to mitigate SaaS-borne risks.
Based on the experience built from implementing SaaS management practices, Zylo has developed a SaaS Management Lifecycle that establishes an open framework and continuous process for identifying, optimizing, planning, and governing SaaS within a large organization. The Lifecycle creates the ability to immediately address controlling SaaS costs and risks while also providing a plan for future SaaS growth.
It’s impossible to account for what you cannot see and rogue SaaS spending has grown to become a massive blind spot for many businesses due to several factors:
Software purchases on behalf of the business used to be managed exclusively by the IT team. Enterprise software was built to enable entire organizations and required technical expertise to deploy, as well as hardware-based assets such as servers to host the software.
In the early 2000s, software spending began to shift towards individual business units as software publishers began creating business-unit specific products. Examples include Salesforce creating software exclusively for sales teams, Adobe marketing tools to creative teams, and so on.
Based on an analysis of more than $30 billion of managed cloud spending, Zylo data shows that business units and employees now lead IT in SaaS spending and ownership. Business units control 63% of spend and own 45% of SaaS application inventory.
About one in six employees now purchase SaaS using credit cards or expense reimbursement, accounting for 6% of spend, but 37% of SaaS application quantity – creating an enormous challenge to any team tasked with managing SaaS security, compliance, and risk.
In the early 2010s, software spending underwent another shift – this time towards individual teams and employees. With the rise of product-led growth strategies leveraged by software makers such as Slack, Zoom, and Box, SaaS applications have increasingly become acquired not by IT or specific business units, but teams and employees.
The products then spread organically across the organization, often creating enterprise-wide deployments. This trend has also been called the end-user era of software because the end-user, aka the employee, now selects and acquires software, not IT and not specifically business units.
An unfortunate outcome of the end-user era is the corollary growth of shadow IT: when tools and applications enter an organization’s IT environment unbeknownst to IT.
Shadow IT can lead to increased risks and compromised security as applications unknown to IT or IT security teams go unvetted for risk or vulnerabilities that could lead to data breaches or other issues, which carry significant consequences and costs. According to an IBM cybersecurity study, the average data breach in the United States costs more than $9.44 million.
A company’s compliance with regulations that protect personally identifiable information (PII), such as the European Union’s GDPR or the United States’ HIPAA, can also be put at risk due to shadow IT.
Finally, shadow IT creates unmanaged costs beyond its initial purchase price. From free tools that convert to paid subscriptions to redundant purchases of the same application to organizational dysfunction caused by overlapping functionalities or the use of non-standard tools to unexpected renewals, shadow IT creates real and often significant impacts to the organization’s bottom line.
As organizations increasingly recognize the urgency to control costs and manage risks associated with SaaS applications, a logical next step is to ask, how?
Every organization’s technology profile carries unique challenges; this is especially true with the use of SaaS. However, many organizations face the same problems:
Based on these common themes and its experience helping hundreds of businesses incorporate SaaS management into their existing technology management processes, Zylo has developed a SaaS Management Lifecycle to enable SaaS management.
The SaaS Management Lifecycle represents an open, flexible framework that any company can immediately use to meet today’s needs and start managing SaaS applications more effectively.
Organizations can begin the Lifecycle beginning in any phase, then work towards developing a more mature SaaS management process as short-term needs are met.
The objective of the SaaS Management Lifecycle is to create both immediate and long-term actions to control spending and reduce risk.
For many organizations, discovering the entire inventory represents the first step in developing SaaS management processes. Most organizations underestimate the number of applications operating within their environment. Zylo data shows that a large organization maintains more than 650 applications on average.
However, companies consistently underestimate the number of applications used by their organization. Multiple methods exist for discovering and inventorying SaaS applications and their attributes:
Technology-owning teams may survey their organization, requesting teams and employees to self-report their SaaS application uses. This approach can be problematic for larger organizations due to the length of time it takes to collect the information, the high likelihood of inaccuracies in reporting, and the lack of continuous monitoring needed to keep an up-to-date inventory.
CASBs are primarily designed as security tools intended to be installed on hardware, monitoring data that flows between the company and cloud-based data centers. However, If end-users access applications on a personal device, that data will not be reported, making the ability to discover all SaaS limited.
Browser plugins can help sniff out SaaS tools. These plugins are installed on company-managed devices and capture details about application usage based on browser activity. This approach is relatively affordable and straightforward to implement. However, it can be somewhat easy to circumvent. If an end-user bypasses traditional web browsing by enabling private or incognito mode, usage data regarding SaaS applications will go uncollected which can increase costs and risk.
SSO tools can significantly improve SaaS application management. With one set of login credentials, users can access a wide variety of applications. However, as a discovery tool, SSO is a parietal solution at best, as only IT-managed applications are typically added to an SSO platform. The use of personal devices to access SaaS applications or circumventing SSO with a manual sign-on can prevent full discovery.
Finance-based SaaS discovery involves analyzing financial records to uncover any SaaS purchases. By analyzing Accounts Payable and expense reimbursement records, SaaS spend through IT, LOB, and end-user applications accounts can easily be tracked and inventoried.
By tracking the money, an organization can identify all SaaS tools being utilized, regardless of the procurement process. This approach is also feasible from a compliance perspective as no PII is necessary to uncover all applications. For some organizations, providing the needed access to financial data prohibits the use of finance-based discovery.
When completing a discovery process, it’s of crucial importance to record multiple characteristics for each application. This ensures that SaaS applications and their metrics can be compared apples to apples.
These data fields can and will form a system of record that allows technology managers to make informed decisions about the ongoing use of each application, as well as opportunities to reduce costs and optimize future spending.
A system of record can take the form of an actively managed spreadsheet or an automatically updated inventory provided by a SaaS management platform like Zylo.
Ideal SaaS application attributes to capture in a system of record:
Once the discovery process has established the current state of SaaS inventory, it’s essential to monitor the environment for new incoming applications continually and update the system of record. Zylo data shows that an average large company may see as many as six new SaaS applications enter their environments every 30 days. Without an ongoing process that discovers and monitors these new applications, the inventory becomes out of date quickly, and shadow IT may once again grow.
Other factors also signal the need to monitor and update the SaaS application inventory continually. Employee attrition is a prime example of why managing SaaS on an active basis is a vital safeguard against risk.
When an employee leaves the organization, all access to their SaaS-based applications should be terminated as well to prevent potential data leaks or breaches. More than half of all data breaches are due to malicious or criminal attacks, according to IBM and the Ponemon Institute’s annual cybersecurity study, and these attacks have been known to be instigated by disgruntled former employees. Unsecured and unmonitored SaaS applications represent an open vulnerability to these types of attacks.
Read More about the SaaS Management LIfecycle, including how to Optimize, Plan, and Govern SaaS applications
Table of Contents ToggleEmail Template Use CasesSet Brand Standards for Consistent...
Table of Contents ToggleUnmanaged, SaaS Creates Uncontrolled Costs and Increased RiskWhy...
Table of Contents ToggleWhat Are Automated Reports?What Do Automated Reports Look...
Table of Contents ToggleWhat Is SaaS Contract Management?The Challenges of Managing...
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |