About Trace3
- A pioneer in the technology consulting space
- Its mission is to empower IT executives and their organizations through a combination of leading technology solutions and elite consulting services
- Provides unique technology solutions and consulting services to clients in healthcare, finance, technology, and a variety of industries
Industry
IT Value Added Reseller &
Services Provider
Use Cases
- Data Protection
- SaaS Security Posture Management
- Data Security
- SaaS-to-SaaS Cyber Risk
The Challenge
Trace3 is a leading transformative IT authority, providing unique technology solutions and consulting services to clients in healthcare, finance, technology, and a variety of industries.
Trace3 Advisory CISO Mark Butler is a veteran in the security space. He applies his expertise to help the leading enterprises address cyber risk across data, cloud, and security disciplines, positioning him to observe the trends in cybersecurity and how security teams must pivot to effectively manage emerging cyber risks.
Butler has noticed with increasing frequency that many organizations are struggling to adequately assess, prioritize, and remediate their SaaS cyber risks and vulnerabilities. This challenge stems from how quickly SaaS applications have become not only ubiquitous but also essential for any enterprise.
Take, for example, applications such as Salesforce, ServiceNow, Workday, and GitHub. These enterprise SaaS solutions typically have hundreds of integrated applications that touch sensitive company and customer data. Ensuring permissions are correctly granted for external users is essential, but applying correct permissions to internal users is vital as this group poses as much — if not more — risk than external users.
Butler is finding more and more organizations are realizing their legacy security tools only provide surface-level SaaS security capabilities and cannot offer the depth needed to offer complete visibility into their SaaS estate. Butler states:
“Data Loss Prevention (DLP) solutions, Cloud Access Security Brokers (CASB), and Security Web Gateways (SWG) are all trying to get at the issue. But they don’t really have the inspection capabilities or the permissions intelligence to understand what’s been provisioned and how that can cascade, or result in a set of permissions that ultimately leads to issues with data access, over exposure, and data sharing that needs to be addressed.”
To keep these business-critical applications running smoothly and securely, security teams are essentially trying to recruit security SMEs for each business-critical app. A team of experts is required to run the apps, and an additional team of experts is needed to configure the correct permissions and ensure only the right users are granted access to the sensitive data in these apps. This burdensome process for SaaS security and oversight is financially infeasible and unsustainable.
Between the lack of depth offered by legacy security products and the vast differences in complexities between each SaaS app, knowing what data security risk is contained in each SaaS app becomes nearly impossible. Butler also notes that stakeholder ownership over SaaS security is often unclear due to the decentralized nature of SaaS adoption, opening organizations up to further cyber risk.
All of these issues are subsets of the greatest challenge Butler has found: neglecting a complete lifecycle approach to SaaS security. He explains that:
“Whether you’re a startup using Google Suite or an organization that has migrated from on-premise exchange to the cloud, all organizations are really starting to feel the heat. Not only from an auditor perspective, but from a governance program or SaaS security lifecycle approach. We are finding that most clients just don’t have a program in place – and it’s pretty obvious. They may have some limited visibility into what apps are in use, but they don’t necessarily have those apps integrated into entitlement reviews, recurring security approval, real-time monitoring, or permission reapproval processes.”
Butler continues that the absence of a programmatic, lifecycle approach to SaaS security will result in an incomplete and piecemeal view of SaaS cyber risk. A lifecycle approach to SaaS cybersecurity provides a comprehensive, risk-based view of an organization’s SaaS estate that can be measured in real-time and historically.
Must-Have Capabilities
Trace3 selected AppOmni as a strategic technology partner based on AppOmni’s enterprise readiness. Butler states, “AppOmni’s respect for the complexity of what it takes to get things done within an organization makes them one of our top partners. One of the biggest challenges of SaaS security is determining who owns it, and AppOmni is able to navigate multiple stakeholders by telling a story that makes sense across the entire organization – resulting in a positive relationship-building experience and obtaining the appropriate funding required to solve the problem.”
- SaaS security lifecycle with a programmatic approach
- Depth of SaaS Security Posture Management (SSPM) coverage for core SaaS apps
- Highly experienced partner, technology, and management teams
AppOmni’s Impact
Comprehensive SaaS and data security coverage
Consolidated approach to security across multiple SaaS apps
SaaS security configuration management
at scale
SaaS Security After AppOmni
By working closely with the AppOmni team, Trace3 is providing its largest customers with end-to-end SaaS Security Lifecycle Management programs, operationalization success, and the intended value of their SSPM investments. Trace3 customers are building sustainable SaaS security programs that incorporate full visibility, continuous drift monitoring, identity correlation, data access reviews, and remediation integration with existing forensics, threat intelligence, and incident response (IR) processes.
Internal or external auditors alike are no longer satisfied knowing just what SaaS apps are in use, according to Butler. They are expecting organizations to continuously monitor usage to reduce licensing spend where possible, refine permissions to only what is needed for business purposes, and establish repeatable processes for continuous cyber risk reduction. AppOmni understands the bigger picture and helps its partners achieve the continually raising bar for SaaS security standards.
Butler recognizes AppOmni for defining the SSPM market and what’s possible for SaaS security. Unlike other SSPM vendors, Butler notes that AppOmni possesses the requisite leadership expertise and product engineering discipline to be successful in large, complex matrixed organizations where stakeholder ownership and accountability is ambiguous for SaaS applications.
When considering the value AppOmni brings to SaaS data security, Butler states, “AppOmni will help you solve the risks you never knew about that could result in a breach or data exposure. The AppOmni platform solves this in a painless, efficient, and programmatic lifecycle way.” He concludes, “AppOmni as a partner helps to shift the entire paradigm of the conversation with multiple stakeholders by showing risk analysis data upfront. This allows us to go to our clients and share the results of analyzed permissions from a risk-based perspective. We are then able to put a plan into place to programmatically improve the SaaS security posture of the organization.”
Latest Research and Publications
-
How AppOmni and Cisco Advance Zero Trust SaaS Security
Learn how AppOmni’s SSPM and Cisco’s SSE create a unified Zero Trust security solution, bridging SaaS and cloud service vulnerabilities to protect critical data.
-
What 2024’s SaaS Breaches Mean for 2025 Cybersecurity
In this blog, we take a look at the most impactful SaaS security incidents in 2024 and share insights on what to expect in 2025 for SaaS security.
-
Microsoft Power Pages: Data Exposure Reviewed
Learn about a data exposure risk in Microsoft Power Pages due to misconfigured access controls, highlighting the need for better security and monitoring.