Cloud Startup – Adallom, Bringing Security Exclusively To SaaS Businesses

Cloud Startup – Adallom, Bringing Security Exclusively To SaaS Businesses

Cloud Startup – Adallom, Bringing Security Exclusively To SaaS Businesses

saas

Startup Adallom Goes Public After 18 Months Of Private Beta 

Tal Klein, VP of marketing for the newest security specialist startup, Adallom, says that after eighteen months of beta testing, clients have urged Adallom to go public; so, public they are going. As of this Tuesday the 12th of November, Adallom will begin offering public services to businesses that specialize in software as a service or SaaS. These past eighteen months have helped Adallom engineer what they consider the first premier SaaS security technology, and while they have gained a significant number of private clients during their stealth era, they are now making things official by opening their doors to the community.

A little background.

Adallom was formally founded in 2011 by a team of security specialists formerly with Israel’s cyber intelligence division. With each of their founders having an extensive background in information security, they have been able to seek out and solve SaaS’s previously most unresolved security challenges; and that, says Klein, starts with a company’s migration onto the cloud.

In December 2012, Adallom reeled in significant backing from Sequoia in the amount of $4.5 million dollars. Thus far, Sequoia is the sole financial backer of Adallom.

So, what type of security does Adallom provide, exactly?

Klein explains that Adallom “fills the security gaps that get created when companies adopt SaaS applications.” Klein continues to explain that companies such as Salesforce and Box are immensely secure while operating; the security challenges occur most during the company’s initial migration to the Cloud and as employees seek to utilize the SaaS applications on various, unmanaged devises off company premises. Adallom tightens security for their clients by monitoring employee behavior and building profiles based on individual usage. Building a user profile includes tracking commonly used devices, locations, as well as even tracking which browsers are common for each individual employee and time frame usages. This allows Adallom to ‘red flag’ any uncommon behaviors such as logging into unknown devices or logging in from an unrecognized location. Adallom can even recognize if an employee is logging in during a time frame that is usual for that individual or through a browser that is generally used by that employee; thus tightening end point controls and parameter controls.

If and when Adallom notices a breach or irregularity, the team flags and tracks it so as to analyze it further. Also, rather than completely blocking an irregularity, Adallom endeavors to differentiate between an authorized user and an unapproved one. In addition, Adallom is capable of tracking breached usage to ensure that future attempts are not made.

Klein states that Adallom will be out of beta and open to the public as of this Tuesday; offering services strictly to SaaS businesses.

By Glenn Blake

Follow Us

Glenn Blake

Glenn Blake is a writer for CloudTweaks and has been writing about technology trends for over 25 years.
Follow Us

Sorry, comments are closed for this post.


CloudTweaks Sponsors - Find out more!

Popular

Top Viral Impact

2014 Future Of Cloud Computing Survey Results

2014 Future Of Cloud Computing Survey Results

Engine Yard Joins North Bridge Venture Partners, Gigaom Research and Industry Collaborators to Unveil 2014 Future of Cloud Computing Survey Results SAN FRANCISCO, CA–(Marketwired – Jun 25, 2014) – Engine Yard, the leading cloud application management platform, today announced its role as a collaborator in releasing the results of the fourth annual Future of Cloud Computing Survey,…

Cloud Infographic – Cloud Computing And SMEs

Cloud Infographic – Cloud Computing And SMEs

Cloud Infographic – Cloud Computing And SMEs SMEs (Small/Medium Sized Enterprises) make up the bulk of businesses today. Most cloud based applications created today are geared toward the SME market. Accounting, Storage, Backup services are just a few of them. According to the European Commission, cloud based technology could help 80% of organisations reduce costs by…

Technology Advice Report: 2014 Business Intelligence Buying Trends

Technology Advice Report: 2014 Business Intelligence Buying Trends

Technology Advice Report: 2014 Business Intelligence Buying Trends For nearly every business, the concept of business intelligence is nothing new. Ambitious organizations have been searching for any type of data-driven advantage for some time now – perhaps for as long as they’ve existed. However, the historical use of competitive intelligence pales in comparison to the…

Cloud Infographic: Cloud Public, Private & Hybrid Differences

Cloud Infographic: Cloud Public, Private & Hybrid Differences

Many people have heard of cloud computing. There is however a tremendous number of people who still cannot differentiate between Public, Private & Hybrid cloud offerings.  Here is an excellent infographic provided by the group at iWeb which goes into greater detail on this subject. Infographic source: iWeb About Latest Posts Follow UsGlenn BlakeGlenn Blake…


Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

You can help continue to support our community by social sharing, sponsoring, partnering or contributing to this great educational resource.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021
contact@cloudtweaks.com

Join our newsletter