Cloud Startup – Adallom, Bringing Security Exclusively To SaaS Businesses

Cloud Startup – Adallom, Bringing Security Exclusively To SaaS Businesses

Cloud Startup – Adallom, Bringing Security Exclusively To SaaS Businesses

saas

Startup Adallom Goes Public After 18 Months Of Private Beta 

Tal Klein, VP of marketing for the newest security specialist startup, Adallom, says that after eighteen months of beta testing, clients have urged Adallom to go public; so, public they are going. As of this Tuesday the 12th of November, Adallom will begin offering public services to businesses that specialize in software as a service or SaaS. These past eighteen months have helped Adallom engineer what they consider the first premier SaaS security technology, and while they have gained a significant number of private clients during their stealth era, they are now making things official by opening their doors to the community.

A little background.

Adallom was formally founded in 2011 by a team of security specialists formerly with Israel’s cyber intelligence division. With each of their founders having an extensive background in information security, they have been able to seek out and solve SaaS’s previously most unresolved security challenges; and that, says Klein, starts with a company’s migration onto the cloud.

In December 2012, Adallom reeled in significant backing from Sequoia in the amount of $4.5 million dollars. Thus far, Sequoia is the sole financial backer of Adallom.

So, what type of security does Adallom provide, exactly?

Klein explains that Adallom “fills the security gaps that get created when companies adopt SaaS applications.” Klein continues to explain that companies such as Salesforce and Box are immensely secure while operating; the security challenges occur most during the company’s initial migration to the Cloud and as employees seek to utilize the SaaS applications on various, unmanaged devises off company premises. Adallom tightens security for their clients by monitoring employee behavior and building profiles based on individual usage. Building a user profile includes tracking commonly used devices, locations, as well as even tracking which browsers are common for each individual employee and time frame usages. This allows Adallom to ‘red flag’ any uncommon behaviors such as logging into unknown devices or logging in from an unrecognized location. Adallom can even recognize if an employee is logging in during a time frame that is usual for that individual or through a browser that is generally used by that employee; thus tightening end point controls and parameter controls.

If and when Adallom notices a breach or irregularity, the team flags and tracks it so as to analyze it further. Also, rather than completely blocking an irregularity, Adallom endeavors to differentiate between an authorized user and an unapproved one. In addition, Adallom is capable of tracking breached usage to ensure that future attempts are not made.

Klein states that Adallom will be out of beta and open to the public as of this Tuesday; offering services strictly to SaaS businesses.

By Glenn Blake

About Glenn Blake

Glenn Blake is a writer for CloudTweaks and has been writing about technology trends for over 25 years.

Find out more
View All Articles

Sorry, comments are closed for this post.

Cloud Computing: On The Fringe or Mainstream?

Cloud Computing: On The Fringe or Mainstream?

Cloud Computing Revenue Numbers Imagine that your viewpoint is shared by 5% of people. You’d be in a fringe political party, perhaps, or share a fondness for some obscure sport or hobby. Or you’d be a proponent of Cloud Computing. Because the reality is that after many years of technical development, entrepreneurial freneticism, and big-company marketing,…

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus Shadow IT, a phenomenon defined as building internal IT systems without the official organizational approval has been a growing concern for CIOs over the last few years. In 2015, it climbed to the top of the list of the emerging IT threats, with as much as 83% CIOs reporting…

5 Things Today’s Businesses Couldn’t Do Without The Cloud

5 Things Today’s Businesses Couldn’t Do Without The Cloud

5 Things Today’s Businesses Couldn’t Do Without The Cloud We take a look at how the cloud has changed business for the better. Businesses have been given new and exciting opportunities thanks to the Cloud. Here are five things that wouldn’t be possible for businesses without it. Cloud-based services and platforms, often referred to as ‘cloudware’,…

Carve Outs And The Cloud: A Synergistic Coupling

Carve Outs And The Cloud: A Synergistic Coupling

Carve Outs and the Cloud The mergers and acquisitions market is a complex and challenging industry and the last two years has seen a rise in the number of transactions. Working with companies in this space over the last 10 years, we at RKON have seen and hopefully helped change the mindset of private equity…

Multi-Cloud Integration Has Arrived

Multi-Cloud Integration Has Arrived

Multi-Cloud Integration Speed, flexibility, and innovation require multiple cloud services As businesses seek new paths to innovation, racing to market with new features and products, cloud services continue to grow in popularity. According to Gartner, 88% of total compute will be cloud-based by 2020, leaving just 12% on premise. Flexibility remains a key consideration, and…

Cloud as Our Children’s Playground

Cloud as Our Children’s Playground

Cloud as Our Children’s Playground We read everyday about the fast pace of business adoption of the cloud.  But children are adopting the cloud at just as an aggressive pace.  The Cloud is changing our children’s lives – the way they play, learn, and interact with others and the world around them.  I see children…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Advertising