![2023年SaaS安全調(diào)查報(bào)告(英)_第1頁(yè)](http://file4.renrendoc.com/view/20007d304c5be609bf9f744fe2a1fd05/20007d304c5be609bf9f744fe2a1fd051.gif)
![2023年SaaS安全調(diào)查報(bào)告(英)_第2頁(yè)](http://file4.renrendoc.com/view/20007d304c5be609bf9f744fe2a1fd05/20007d304c5be609bf9f744fe2a1fd052.gif)
![2023年SaaS安全調(diào)查報(bào)告(英)_第3頁(yè)](http://file4.renrendoc.com/view/20007d304c5be609bf9f744fe2a1fd05/20007d304c5be609bf9f744fe2a1fd053.gif)
![2023年SaaS安全調(diào)查報(bào)告(英)_第4頁(yè)](http://file4.renrendoc.com/view/20007d304c5be609bf9f744fe2a1fd05/20007d304c5be609bf9f744fe2a1fd054.gif)
![2023年SaaS安全調(diào)查報(bào)告(英)_第5頁(yè)](http://file4.renrendoc.com/view/20007d304c5be609bf9f744fe2a1fd05/20007d304c5be609bf9f744fe2a1fd055.gif)
版權(quán)說(shuō)明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
TheAnnualSaaSSecuritySurveyReport
2024PlansandPriorities
TheAnnualSaaSSecuritySurveyReport:2024Plans&Priorities1
?AllrightsreservedtoAdaptiveShield&CloudSecurityAlliance
Contents
KeyFindings3
SurveyCreationandMethodology4
Data&Discussion
SaaSSecurityIncidentsontheRise
CurrentSaaSSecurityStrategiesandMethodologiesDon’tGoFarEnough
StakeholderSpreadinSecuringSaaSApplications
HowOrganizationsArePrioritizingPolicies&ProcessesforTheirEntireSaaSInvestmentinSaaSandSaaSSecurityResourcesareDrasticallyIncreasing
Security
Ecosystem
5
5
6
8
9
12
Demographics
15
AppendixA:SurveyResults
17
Acknowledgements
26
AbouttheSponsor26
TheAnnualSaaSSecuritySurveyReport:2024Plans&Priorities2
?AllrightsreservedtoAdaptiveShield&CloudSecurityAlliance
SaaSSecurityIncidentsontheRise
55%oforganizationsreportthattheyexperiencedanincidentinthepasttwoyears,withanother12%unsure.Thesefindingsunderscorethatcompaniesarecomingtounderstandtheharshrealitythatcommonon-premtypesofattacks,suchasransomware,malware,anddatabreaches,canalsooccurintheircloudSaaSenvironments.
CurrentSaaSSecurityStrategiesandMethodologiesDon’tGoFarEnough
Thesurveyfindsthatoverhalf(58%)oforganizationsestimatetheircurrentSaaSsecuritysolutionsonlycover50%orlessoftheirSaaSapplications.It’sbecomingclearthatmanualauditsandCASBsarenotenoughtoprotectcompaniesfromSaaSsecurityincidents.
StakeholderSpreadinSecuringSaaSApps
CISOsandsecuritymanagersareshiftingfrombeingthecontrollerstogovernorsastheownershipofSaaSappsarespreadoutthroughallthedifferentdepartmentsoftheirorganization.Alignment,communicationandcollaborationarekeytobeingabletosecuretheorganization’sSaaSstack.
HowOrganizationsArePrioritizingPolicies&ProcessesforTheirEntireSaaSSecurityEcosystem
SaaSsecuritycontinuestoadapttoencompasstheexpandingbroadrangeofconcernsintheSaaSEcosystem,includingSaaSMisconfigurations,SaaS-to-SaaSAccess,Device-to-SaaSRiskManagement,IdentityandAccessGovernance,andIdentityThreatDetection&Response(ITDR).Organizationsareputtingrobustpolicies,processes,andcapabilitiesinplacethatareessentialforprotectingthesedifferentdomains.
InvestmentinSaaSandSaaSSecurityResources
AreDrasticallyIncreasing
66%oforganizationshaveincreasedtheirinvestmentinapps,with71%increasingtheirinvestmentinsecuritytoolsforSaaS.Morespecifically,thesurveyshowsthatadoptionofSaaSSecurityPostureManagement(SSPM)solutionshasgrownsignificantly,increasingfrom17%in2022to44%in2023.ThiscanbeattributedtothefactthatSSPMsprovidecoverageinareaswhereothermethodsandstrategieshavefallenshort,offeringmorecomprehensiveprotectionagainstvarioussecurityrisksthroughoutthewholeSaaSSecurityEcosystem.
KeyFindings
1
2
3
4
5
TheAnnualSaaSSecuritySurveyReport:2024Plans&Priorities3
?AllrightsreservedtoAdaptiveShield&CloudSecurityAlliance
CurrentSaaS
applicationusein
organizations
Organizations'securitypoliciesandprocessesregardingSaaSapplications
AwarenessandexperiencewithSaaSthreats
SurveyCreationandMethodology
TheCloudSecurityAlliance(CSA)isanot-for-profitorganizationwithamissiontowidelypromotebestpracticesforensuringcybersecurityincloudcomputingandITtechnologies.CSAalsoeducatesvariousstakeholderswithintheseindustriesaboutsecurityconcernsinallotherformsofcomputing.CSA’smembershipisabroadcoalitionofindustrypractitioners,corporations,andprofessionalassociations.OneofCSA’sprimarygoalsistoconductsurveysthatassessinformationsecuritytrends.Thesesurveysprovideinformationonorganizations'currentmaturity,opinions,interests,andintentionsregardinginformationsecurityandtechnology.
AdaptiveShieldcommissionedCSAtodevelopasurveyandreporttobetterunderstandtheindustry’sknowledge,attitudes,andopinionsregardingSaaSapplicationuse,SaaSsecuritypoliciesandprocesses,SaaSthreats,andSaaSsecuritystrategy/solutions.AdaptiveShieldfinancedtheprojectandco-developedthequestionnairewithCSAresearchanalysts.ThesurveywasconductedonlinebyCSAinMarchof2023andreceived1130responsesfromITandsecurityprofessionalsfromorganizationsofvarioussizesandlocations.CSA’sresearchanalystsperformedthedataanalysisandinterpretationforthisreport.
GoalsoftheStudy
TheprimaryobjectivesofthesurveyweretogainadeeperunderstandingofseveralcriticalaspectsofSaaSsecurityinorganizations.
Currentandfutureuseofsecuritysolutions
TheAnnualSaaSSecuritySurveyReport:2024Plans&Priorities4
?AllrightsreservedtoAdaptiveShield&CloudSecurityAlliance
Data&Discussion
Intoday'sdigitallandscape,SaaSsecurityisofcriticalimportancefororganizationsofallsizes.Asbusinessesincreasinglymovetheiroperationsanddatatothecloud,ormorespecifically–SaaSapplications,thesecurityoftheseappsbecomesparamount.WhileSaaSapplicationsaresecurebydesign,thewaytheyareconfiguredandgovernediswhatposesarisk.Withoutpropersecuritymeasures,organizationsareexposedtodatabreaches,cyber-attacks,andothersecurityincidentsthatcanresultinsignificantfinancialandreputationaldamage.UnderstandingSaaSsecurityisthereforeessentialfororganizationstoprotectthemselvesfromtheserisks.
It'swiththisbackdropthatthissurveyreturns,delvingintotheintricaciesofSaaSsecurityandofferingafollow-uptolastyear'sreport.Belowarethisyear’sfindingsandinsights.
KeyFinding#1
SaaSSecurityIncidentsontheRise
ThesurveyrevealsasignificantincreaseinsecurityincidentswithintheSaaSecosystem,with55%oforganizationsreportingthattheyexperiencedanincidentinthepasttwoyears,up12%fromthepreviousyear.Aboutathird(32%)ofrespondentsstatedthattheyhadn'tencounteredaSaaSsecurityincidentwithinthesameperiod,while12%wereunsure.
Thefindingsunderscorethatmanycompaniesarecomingtounderstandtheharshrealitythatcommonon-premtypesofattacks,suchasransomware,malware,anddatabreaches,canalsooccurintheirSaaSenvironments.
HasyourcompanyexperiencedaSaaSapplicationsecurityincidentwithinthepasttwoyears
55%
Yes
12%
Unsure
32%
No
TheAnnualSaaSSecuritySurveyReport:2024Plans&Priorities5
?AllrightsreservedtoAdaptiveShield&CloudSecurityAlliance
KeyFinding#1/SaaSSecurityIncidentsontheRise
AmongthemostprevalentSaaSsecurityincidentsreportedweredataleakage(58%),maliciousapps(47%),databreaches(41%),andSaaSransomware(40%),highlightingthegrowingneedforrobustsecuritymeasuresandincreasedawarenessofthepotentialrisksassociatedwiththeexpandingSaaSlandscape.
Whattypeofsecurityincident(s)haveyouexperienced
41%
32%
11%
47%
58%
40%
DataLeakage
MaliciousApps
InsiderAttack
DataBreach
SaaSRansomware
CorporateEspionage
KeyFinding#2
CurrentSaaSSecurityStrategiesand
MethodologiesDon’tGoFarEnough
InsufficientMonitoringofSaaSApplications
AkeycontributortothenotedincreaseinSaaSsecurityincidents,thefindingsfromthesurveysuggestthatasignificantnumberoforganizationsarefallingshortwhenitcomestoimplementingeffectiveSaaSsecuritymeasures.ManycompaniesareusingsecuritysolutionsthatdonotcovertheirentireSaaS
stack,leavingtheirapplicationsanddataexposedtocyberthreats.Specifically,thesurveyfoundthatoverhalf(58%)oforganizationsestimatetheircurrentSaaSsecuritysolutionsonlycover50%orlessoftheirSaaSapplications.
PercentageoftheSaaSapplicationsmonitoredbySaaSsecuritysolutions
20%
oforganizations
~100%ofthestackismonitored
6%oforganizations
33%oforganizations
7%oforganizations
6%oforganizations
28%oforganizations
~25%ofthestackismonitored
~50%ofthestackismonitored
~75%ofthestackismonitored
Noneofthemmonitored
Unsure
TheAnnualSaaSSecuritySurveyReport:2024Plans&Priorities6
?AllrightsreservedtoAdaptiveShield&CloudSecurityAlliance
KeyFinding#2/CurrentSaaSSecurityStrategiesandMethodologiesDon’tGoFarEnough
ThesefindingshighlightthepressingneedforcompaniestoreassesstheirsecuritysolutionsandensuretheyprovidecomprehensivecoverageacrosstheirentireSaaSecosystem.Bydoingso,organizationscansignificantlyreducetheirriskofsecurityincidents,includingdatabreaches,ransomwareattacks,andothertypesofcyber-attacks.Ultimately,thiswillhelptosafeguardtheirreputationandmaintainthetrustoftheircustomers.
CASBsandManualAuditsFallingShortforSaaSsecurity
ManyorganizationsrelyonCloudAccessSecurityBrokers(CASBs)andmanualauditstosecuretheirSaaSapplications.However,thesemethodsareprovingtobeinsufficientinanumberofkeyareas.Additionally,manualauditsexposecompanydatabetweenaudits,leavingorganizationsatriskforsecurityincidentsduringthosegaps.
WhatpercentageoforganizationsaregettingfullSaaSsecuritycoveragefromCASBandmanualaudits
IdentityandAccessGovernanceSaaSThreatDataLossPrevention
11%CASB
15%CASB
14%CASB
13%ManualAudits
13%ManualAudits
14%ManualAudits
3rdPartyAppDiscoverySaaSUserDeviceRiskManagementSaaSMiscon?gurations
12%CASB
10%CASB
10%CASB
11%ManualAudits
10%ManualAudits
10%ManualAudits
ThesefindingsindicatethatorganizationsneedtoreevaluatetheirsecuritystrategiesandinvestinmorecomprehensivesolutionsandstrategiesthatprovidefullcoverageacrosstheirSaaSecosystemtoreducetheriskofsecurityincidents.ThisisalsolikelywhatiscontributingtotheincreaseduseofSaaSSecurityPostureManagement(SSPM)tools.
TheAnnualSaaSSecuritySurveyReport:2024Plans&Priorities7
?AllrightsreservedtoAdaptiveShield&CloudSecurityAlliance
KeyFinding#3
StakeholderSpreadinSecuring
SaaSApplications
Inadditiontomonetaryinvestmentsintools,security,andstaff,organizationsareincreasinglyinvolvingnumerousstakeholdersintheprocessofsecuringbusiness-criticalapplications.Acrossatypicalorganization,awidearrayofSaaSappsareusedfromfilesharingandcollaborationappstoCRM,projectandworkmanagement,marketingautomation,andmanymore.SaaSappsfillavarietyofnicheroles,yetthisstakeholderspreadcomplicatesthethreatlandscape.
Now,CISOsandsecuritymanagersareshiftingfrombeingthecontrollerstogovernorsofSaaSappsecurity,andthesurveyshowshowmanyofthoseengagedinsecuritygovernanceholdexecutive-levelpositionsorserveasdepartmentheads,indicatingthatbusinessesaretakingSaaSsecurityseriously.Theinvolvementofkeydecision-makersunderscoresthegrowingrecognitionofthecriticalrolethatSaaSsecurityplaysinprotectingvaluableassetsandensuringoperationalcontinuity.
However,withsomanyindividualsinvolved,itcanbecomechallengingtodeterminewhoisultimatelyresponsibleforSaaSsecurity.SaaSapplicationsoftenrequireclosecollaborationbetweenthesecurityteamandappowners,asthesecurityteammaynotalwayshavedirectaccesstotheSaaSapp.Thisnecessitatesprocessesandtoolsthatcanbridgethegapandactivelyengageappowners,whoarecrucialforeffectiveSaaSsecuritymanagement.
Titlesinvolvedinsecuringbusiness-criticalapps
43%
39%
38%
42%
HeadofSecurity
SecurityOperations
IT
CloudSecurityArchitects
4%
16%
29%
26%
GRCTeam
Idon’tknow/Other
CIO
BusinessApplicationOwner
Byfosteringacollaborativeenvironmentandimplementingsolutionsorstrategiesthatfacilitatecommunicationandcoordinationbetweensecurityteamsandappowners,organizationscancreateamorerobustandstreamlinedapproachtosecuringtheirbusiness-criticalapplications.This,inturn,willhelpminimizepotentialthreatandensureahigherlevelofprotectionagainsttheever-evolving
landscapeofSaaSsecuritythreats.
TheAnnualSaaSSecuritySurveyReport:2024Plans&Priorities8
?AllrightsreservedtoAdaptiveShield&CloudSecurityAlliance
KeyFinding#4
HowOrganizationsArePrioritizing
Policies&ProcessesforTheirEntireSaaS
SecurityEcosystem
Overthepastyear,thefocusofSaaSsecurityhasevolvedsignificantly,drivenbyfactorssuchasincreasedinvestmentinbusiness-criticalSaaSapplications,ariseinsecurityincidents,andthegrowingnumberofthreatactorstargetingSaaSapps.Previously,organizationsandsecuritytools,likeSSPMs,wereprimarilyfocusedonmisconfigurationmanagement.However,SaaSsecurityhasadaptedtoencompassabroaderrangeofconcerns,includingSaaS-to-SaaSAccess,Device-to-SaaSRiskManagement,IdentityandAccessGovernance,andIdentityThreatDetection&Response(ITDR).
SaaSPoliciesandProcedures
WiththerisingimportanceofSaaSinthebusinesslandscape,havingrobustpolicies,processes,andcapabilitiesinplaceisessentialforprotectinganorganization'sSaaSstackandthedataitcontainsfromthreatactors.
Organizationsarenowputtingmeasuresinplacetoaddresskeyareas.ThedatabelowpresentswhatorganizationsarestartingtoprioritizewhensecuringtheirSaaSstackthroughoutthedifferentdomainsoftheSaaSSecurityEcosystem.
MisconfigurationManagement
Addressingmisconfigurationissuesisvitaltoprotectanorganization'sSaaSstackfrommisconfiguredsecuritysettingsthatcanbeexploitedbythreatactors.Themainprioritiesformisconfigurationmanagementofrespondentsinclude:
Communicationandcollaborationbetweensecurityandappownerteams
Withastrongsystemandprocessin
Detailedfixesandmitigationofmisconfigurations
place,thesehigh-impactareascan
Prioritizationbasedontheapplication,securitydomain,andrisklevel
helpreducetheSaaSattacksurface.
TheAnnualSaaSSecuritySurveyReport:2024Plans&Priorities9
?AllrightsreservedtoAdaptiveShield&CloudSecurityAlliance
Search,detect,andquantifyriskofconnectedthird-partySaaSapplications
DetectmaliciousappsthathavebeenintegratedintotheSaaSstack
Isyoursecurityteamabletoidentifyandmanageuserswithmultipleusernames
64%Yes14%No18%Idon’tknow3%N/A
KeyFinding#4/HowOrganizationsArePrioritizingPolicies&ProcessesforTheirEntireSaaSSecurityEcosystem
Third-PartyAppAccess
Asorganizationsincreasinglyrelyonthird-partySaaSapplications(appsthatareconnectedtothecorestack),itbecomescrucialtohavepoliciesinplacetoassessandmanagepotentialrisks.Themainprioritiesfor3rd-partyappaccessinclude:
Processforappownersrequiringthemtosubmitarequesttosecuritybeforeconnectinganapp
Theseprioritiesreflecttheneedforstrongsystemsandprocessesinplacetoprotectagainstthird-partyappaccessthreats.
SaaSIdentityandAccessGovernance
ProperidentityandaccessgovernanceisessentialforsafeguardingsensitivedatawithintheSaaSecosystem.TheprioritiesinIdentityandAccessGovernanceinorganizationstodayinclude:
Ensureeachuserhastherightlevelofaccessneeded
DetectusersthathavebeendisabledintheActiveDirectorybutstillhaveaccesstoSaaSapplications
DetectdormantaccountstoquicklyensurethedeprovisioningoftheiraccesstoSaaSifneeded
NotificationofAdminaccess
Authenticationpractices(e.g.,keymanagement,certificatemanagement)
TheAnnualSaaSSecuritySurveyReport:2024Plans&Priorities10?AllrightsreservedtoAdaptiveShield&CloudSecurityAlliance
Checkingthedevicehygiene(vulnerabilitiesandupdatedagents)ofeachandeverySaaSuser,especiallyprivilegedones
Detectbruteforceattacks
KeyFinding#4/HowOrganizationsArePrioritizingPolicies&ProcessforTheirEntireSaaSSecurityEcosystem
MonitoringSaaSUserDevices
EnsuringthesecurityofdevicesthataccesstheSaaSstackiscriticalforpreventingunauthorizedaccessanddatabreaches.OrganizationalprioritiesforensuringSaaSrisksarenotstemmingfromdevicesinclude:
IdentifyingunmanageddevicesaccessingtheSaaSstack
Manydon’tviewdevicesasaweakspotintheirSaaSappsecurity.Theoppositeistrue;devicesareagateway—andifaprivilegeduser’sdeviceisnotsecure,thedamageifathreatactorsucceedswouldbesignificant.
Myorganization'spoliciesandprocessesformonitoringdevicesthataccessSaaSapplicationsinclude
47%
5%
54%
17%
42%
Identifyunmanaged
devicesaccessingthe
SaaSstack
Idon’thavea
process/
I’munabletomonitor
devicesthataccess
ourSaaS
Checkthedevice
hygiene(vulnerabilities
andupdatesagents)of
eachandeverySaaS
user
Checkthedevice
Ourprocessdoesnot
includeanyofthe
above
hygiene(vulnerabilities
andupdatesagents)of
SaaSprivilegedusers
only
ThreatDetectionandResponse
Proactivethreatdetectionandresponseiscrucialfordefendingorganizationsfromtargetedattacks.In
today’senvironment,theprioritiesforthreatdetectionandresponseare:
IdentifyandrespondtouserandentitybehaviorDetectMFAfloodattacks
anomalies
Detectattacksthroughthreatintelligence
Myorganization'sSaaSthreatdetectionandresponsecapabilitiesinclude
47%
DetectMFA?oodattacks
58%
Detectattacksthroughthreatintelligence
36%
Detectbruteforceattacks
6%
2%
Other
44%
Identifyandrespondtouserandentitybehavioranomalies
Idon’thaveSaaSthreatdetectionandresponsecapabilities
TheAnnualSaaSSecuritySurveyReport:2024Plans&Priorities11
?AllrightsreservedtoAdaptiveShield&CloudSecurityAlliance
KeyFinding#5
InvestmentinSaaSandSaaSSecurityResourcesAreDrasticallyIncreasing
IncreasedInvestmentinSaaS
OrganizationsarerelyingmoreheavilyonSaaSresources,encompassingnotjustbusiness-criticalappsandstaffbutalsotherightsecuritytoolsfocusedonSaaSsecurity.
Accordingtothesurvey,71%oforganizationshaveincreasedtheirinvestmentinsecuritytoolsforSaaS,demonstratingagrowingcommitmenttoprotectingtheirdigitalassets.Furthermore,68%oforganizationshaverampeduptheirinvestmentinhiringandtrainingstaffonSaaSsecurity,recognizingtheimportanceofhumancapitalinsafeguardingtheirSaaSecosystems.Additionally,66%oforganizationshaveincreasedtheirinvestmentinbusiness-criticalSaaSapplications,reflectingthegrowingrelianceonthesetoolsforcorebusinessfunctions.
ThisholisticapproachtoSaaSinvestment,encompassingsecuritytools,personnel,andapplications,underscorestheimportanceofrobustsecuritysolutionslikeSSPMs.
ChangesinCompanyInvestmentsinSaaS
71%68%
66%
25%
23%
27%
8%
5%6%
Decreased
Remainedthesame
Increased
BusinesscriticalSaaSapplicationsSecuritytoolsforSaaSHiringand/ortrainingstafforSaaSsecurity
TheAnnualSaaSSecuritySurveyReport:2024Plans&Priorities12
?AllrightsreservedtoAdaptiveShield&CloudSecurityAlliance
KeyFinding#5/InvestmentinSaaSandSaaSSecurityResourcesareDrasticallyIncreasing
IncreaseinUseofSaaSSecurityPostureManagement(SSPM)
WithSaaSsecurityincidentsontheriseandcurrentSaaSsecuritymethods(e.g.,CASBandmanualaudits)fallingshort,organizationsareseekingoutmoreadvancedSaaSsecuritytoolingsuchasSSPMs.ThesurveyshowsthatadoptionofSSPMtoolshasgrownsignificantly,withthepercentageoforganizationsusingSSPMincreasingfrom17%in2022to44%in2023.
ThiscanbeattributedtothefactthatSSPMsprovidecoverageinareaswhereothermethodsandstrategieshavefallenshort,offeringmorecomprehensiveprotectionagainstvarioussecurityrisksthroughoutthewholeSaaSSecurityEcosystem.
Asbrokendownearlierinthispaperbutsummarizedhere,theseareasinclude
?SaaSMisconfigurations:EnsuringproperconfigurationofSaaSapplicationstoavoidbreaches.
?Identity&AccessGovernance:ManagingandcontrollinguseraccesstoSaaSapplicationsandresources.
?Third-PartyAppAccess:Identifyingandmanagingtherisksassociatedwiththird-partyapplicationsaccessingSaaSenvironments.
?DataLossManagement:PreventingandmitigatingthelossorleakageofsensitivedatainSaaSapplications.
?ConnectedMaliciousApps:DetectingandremovingmaliciousapplicationsthatcouldcompromisethesecurityoftheSaaSenvironment.
?ThreatDetection&Response:Proactivelyidentifyingandrespondingtosecuritythreatsinreal-time.
?SaaSUserDevices:MonitoringandmanagingthesecurityrisksassociatedwithuserdevicesconnectingtoSaaSapplications.
UsageofSSPMYearoverYear
2023
44%
2022
17%
TheAnnualSaaSSecuritySurveyReport:2024Plans&Priorities13
?AllrightsreservedtoAdaptiveShield&CloudSecurityAlliance
KeyFinding#5/InvestmentinSaaSandSaaSSecurityResourcesareDrasticallyIncreasing
AreyoucurrentlyusingorplanningtouseaSaaSSecurityManagment(SSPM)platform
19%
Nocurrentplan
44%
Currentlyusing
36%
AsSaaSsecurityincidentscontinuetorise,
organizationsarerecognizingthelimitations
ofothersecuritymethodslikeCASBsand
manualauditsforSaaS.Theincreasedadoption
aswellasthesignificantpercentageofthose
planningonadoptingSSPMsolutionsreflects
thegrowingawarenessoftheneedformore
robustandcomprehensivesecuritymeasuresto
protectagainsttheever-evolvinglandscapeof
SaaSsecuritythreats.
Plantouseinthe
next18months
SSPMBeneits
GiventheincreasingimportanceofSaaSsecurity,thereisaclearneedforamorecomprehensiveandrobustapproach.ThereareSaaSsecuritytoolssuchasSSPMsthatcanassistorganizationswiththepolicies,processes,andcapabilitiesthattoday’sSaaSsecuritylandscaperequires.Byfocusingonthesecriticalaspects,organizationscanbetterprotecttheirvaluableassetsandensurethesafeoperationoftheirbusiness-criticalapplicationsinanincreasinglycomplexthreatlandscape.
Bene?tsthatinterestcompaniesinSSPM
31%
MitigateSaaSthreats
23%
Timesavingsinmanagementandmaintenance
7%
10%
Costsavings
29%
IncreaseSaaSsecurityposture
Abilitytoadapttonewconditionsorchallenges
OrganizationsareincreasinglyrecognizingthevalueofadoptingSaaSsecuritytoolslikeSSPMstoaddresstheevolvingchallengesintheSaaSlandscape.Thisexplainswhy44%havealreadyadoptedanSSPMsolutioninthepastyearandwhy36%areplanningtoadoptSSPMinthenext18months.Byleveragingthesetools,businessescaneffectivelymitigateSaaSthreatsandsignificantlyenhancetheiroverallsecurityposture.
Inaddition,theuseofSSPMsenablesorganizationstoachievetimesavingsinmanagementandmaintenance,asthesesolutionsstreamlineandautomatevarioussecurityprocessesthatwouldotherwiserequiremanualeffort.Thisautomationnotonlyleadstocostsavingsbyreducingtheneedformanual
workbutalsoallowsorganizationstoreallocateresourcestoothercriticalareas.Moreover,SaaSsecuritytoolsprovidetheadaptabilityneededtorespondtonewconditionsandemergingthreats,ensuringthatbusinessesremainagileandpreparedtoprotecttheirdigitalassetsandcriticalapplicationsinaconstantlychangingenvironment.
TheAnnualSaaSSecuritySurveyReport:2024Plans&Priorities14
?AllrightsreservedtoAdaptiveShield&CloudSecurityAlliance
Demographics
ThesurveywasconductedonlinebyCSAinMarch2023andreceived1130responsesfromITandsecurityprofessionalsfromorganizationsofvarioussizesandlocations.
Inwhichindustrydoyouwork?
17%
11%
6%
6%
6%
Technology
FinancialServices
Government
Professionalservices(Law,Consulting,etc.)
Media
5%
5%
5%
5%
5%
Healthcare
Education
Insurance
eCommerce&Retail
Energy&Utilities
5%
5%
4%
3%
3%
Food
Industrials(Manufacturing,Construction,etc.)
Pharmaceutical
Banking
Transport&Logistics
3%
2%
1%
1%
1%
PublicServices
Telecom
Agriculture&Mining
Other
Travel&Hospitality
Whichofthefollowingmostcloselymatchesyourrole?
18%
12%
9%
8%
7%
7%
IT
CyberSecurity
CloudSecurity
Architect
SaaSSecurity
DeputyCISO
InfoSec
7%
5%
4%
4%
3%
2%
Cloudsecurity
GRC
SaaSSecurity
Architect
CISO
SecurityEngineer
CIO
2%
2%
2%
2%
1%
5%
SecOps(Security
ForensicsExpert
VendorRisk
PenetrationTester
Vulnerability
Other
Operations)
Assessment
Management
Whatisyourjoblevel?
14%
Staf
49%
Manager
37%
C-Levelorexecutive
TheAnnualSaaSSecuritySurveyReport:2024Plans&Priorities15
?AllrightsreservedtoAdaptiveShield&CloudSecurityAlliance
Demographics
Whatisthesizeofyourorganization?
32%
<1000employees
12%
+10001employees
16%
40%
1001-5000employees
5001-10000
employees
Whatregionoftheworldyoulocatedin?
63%
Americas
11%
Europe,MiddleEast,Africa(EMEA)
26%
Asia-Paci?c(APAC)
TheAnnualSaaSSecuritySurveyReport:2024Plans&Priorities16
?AllrightsreservedtoAdaptiveShield&CloudSecurityAlliance
AppendixA:SurveyResults
Changeincompany’sSaaSinvestments
Overthepastyear,has
溫馨提示
- 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 2025年度高空作業(yè)勞務(wù)及高空作業(yè)設(shè)備定期檢修合同
- 二零二五年度旅游產(chǎn)品銷售顧問(wèn)勞動(dòng)合同模板
- 2025年度新型智能門衛(wèi)值班人員聘用合同
- 二零二五年度教育領(lǐng)域貸款合同
- 2024年甲氨蝶呤項(xiàng)目資金需求報(bào)告代可行性研究報(bào)告
- 虛擬現(xiàn)實(shí)技術(shù)在教室空間規(guī)劃中的應(yīng)用
- 綜合性的安全產(chǎn)品銷售團(tuán)隊(duì)培訓(xùn)與激勵(lì)策略研究報(bào)告
- 教育信息化背景下的小學(xué)數(shù)學(xué)學(xué)習(xí)興趣研究
- 經(jīng)濟(jì)形勢(shì)下個(gè)人與家庭的金融財(cái)產(chǎn)保護(hù)方法
- 科技賦能幼兒園對(duì)話式教育的現(xiàn)代應(yīng)用
- 小學(xué)高年級(jí)數(shù)學(xué)閱讀能力的培養(yǎng)與
- 包裝品質(zhì)彩盒外箱知識(shí)課件
- 神經(jīng)外科課件:神經(jīng)外科急重癥
- 頸復(fù)康腰痛寧產(chǎn)品知識(shí)課件
- 2024年低壓電工證理論考試題庫(kù)及答案
- 微電網(wǎng)市場(chǎng)調(diào)查研究報(bào)告
- 《民航服務(wù)溝通技巧》教案第14課民航服務(wù)人員上行溝通的技巧
- MT/T 538-1996煤鉆桿
- 小學(xué)六年級(jí)語(yǔ)文閱讀理解100篇(及答案)
- CB/T 467-1995法蘭青銅閘閥
- 氣功修煉十奧妙
評(píng)論
0/150
提交評(píng)論