The Cloud And The Accelerating vs Deflating Time To SaaS Revenue

Accelerating vs. deflating time to SaaS revenue

Over the past 8 months, we have seen an increase in the number of ISVs contacting us to help them plan a roadmap to SaaS. After reviewing these conversations, a trend has started to emerge.

1. On-Premise ISVs see the need to begin the journey, typically due to competitive and market pressures.
2. They understand and want to get to the technical end game — a true multi-tenanted, singular code basis — but they don’t know how or even why they should get there.
3. They want to get to that end game as quickly as possible.
4. They haven’t really evaluated and understood the financial implications of moving from a perpetual license model to a monthly recurring model.
5. They don’t understand the changes needed in their support and operations teams to maintain a true SaaS business.

Many ISVs are testing the SaaS waters by simply re-branding on-premise solutions as SaaS and developing ‘one off’ managed hosted solutions for each customer.
Unfortunately, these approaches are fraught with problems and they set the ISV up for failure. Without understanding the financial and operational impact of the above, companies often find it hard to project profitability with their SaaS solutions; many abandon their SaaS plans.

From a financial perspective, one-off ‘managed hosting’ silos for each customer can be very expensive and these costs are often passed through to end clients. End customers in turn don’t appreciate the value of the service as ISVs struggle to create the sales and marketing messaging for SaaS. This compounds the problem and results in a decline of sales. In addition, companies often struggle to understand the cash flow impact of moving from large perpetual licenses to smaller, monthly recurring revenue models.

Operationally, ISVs struggle to provide the necessary changes in their support organization to enable true 24x7x365 support. The technical skill set(s) and operational processes needed to support always-on operations with SLAs are vastly different from a traditional support model. Many ISVs don’t appreciate the increased number of technical staff required to enable a 24/7 operation (especially if you have 100’s of separate silo’d client implementations). They typically bootstrap this vital function by having fewer resources on call all the time. We have seen incidents in the press where this has backfired. Tired resources make mistakes leading to more outages and downtime due to stress related human errors. It also brings up the interesting topic of liability. Many companies today are not aware of HR laws that prohibit excessive working hours.

By Tenzing

Founded in 1998, Tenzing is a managed hosting company trusted by leading software-as-a-service (SaaS) providers and Ecommerce systems integrators to deliver business critical applications to some of the world’s largest companies and most recognizable brands. Tenzing’s mission-critical hosting infrastructure, mature IT Service Management (ITSM) practices, and comprehensive application-level Service Level Agreements (SLAs), enable the reliable, secure, and scalable delivery of complex SaaS and Ecommerce applications. Tenzing is ISO 27001 and SAS 70 Type II certified with data centres in Toronto, Vancouver and Kelowna, B.C. For more information, visit www.tenzing.com.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and more popular, it is worth…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…