The Lighter Side Of The Cloud – HaaS
The Lighter Side Of The Cloud – Missing Manuscript
The Lighter Side Of The Cloud – All Platforms
Cloud Startup – Adallom, Bringing Security Exclusively To SaaS Businesses

Cloud Startup – Adallom, Bringing Security Exclusively To SaaS Businesses

Cloud Startup – Adallom, Bringing Security Exclusively To SaaS Businesses

saas

Startup Adallom Goes Public After 18 Months Of Private Beta 

Tal Klein, VP of marketing for the newest security specialist startup, Adallom, says that after eighteen months of beta testing, clients have urged Adallom to go public; so, public they are going. As of this Tuesday the 12th of November, Adallom will begin offering public services to businesses that specialize in software as a service or SaaS. These past eighteen months have helped Adallom engineer what they consider the first premier SaaS security technology, and while they have gained a significant number of private clients during their stealth era, they are now making things official by opening their doors to the community.

A little background.

Adallom was formally founded in 2011 by a team of security specialists formerly with Israel’s cyber intelligence division. With each of their founders having an extensive background in information security, they have been able to seek out and solve SaaS’s previously most unresolved security challenges; and that, says Klein, starts with a company’s migration onto the cloud.

In December 2012, Adallom reeled in significant backing from Sequoia in the amount of $4.5 million dollars. Thus far, Sequoia is the sole financial backer of Adallom.

So, what type of security does Adallom provide, exactly?

Klein explains that Adallom “fills the security gaps that get created when companies adopt SaaS applications.” Klein continues to explain that companies such as Salesforce and Box are immensely secure while operating; the security challenges occur most during the company’s initial migration to the Cloud and as employees seek to utilize the SaaS applications on various, unmanaged devises off company premises. Adallom tightens security for their clients by monitoring employee behavior and building profiles based on individual usage. Building a user profile includes tracking commonly used devices, locations, as well as even tracking which browsers are common for each individual employee and time frame usages. This allows Adallom to ‘red flag’ any uncommon behaviors such as logging into unknown devices or logging in from an unrecognized location. Adallom can even recognize if an employee is logging in during a time frame that is usual for that individual or through a browser that is generally used by that employee; thus tightening end point controls and parameter controls.

If and when Adallom notices a breach or irregularity, the team flags and tracks it so as to analyze it further. Also, rather than completely blocking an irregularity, Adallom endeavors to differentiate between an authorized user and an unapproved one. In addition, Adallom is capable of tracking breached usage to ensure that future attempts are not made.

Klein states that Adallom will be out of beta and open to the public as of this Tuesday; offering services strictly to SaaS businesses.

By Glenn Blake

Follow Us

Glenn Blake

Glenn Blake is a writer for CloudTweaks and has been writing about technology trends for over 25 years.
Follow Us

Latest posts by Glenn Blake (see all)

Sorry, comments are closed for this post.

Recent

The E-Learning Market – Cloud Computing Adoption

The E-Learning Market – Cloud Computing Adoption

The E-Learning Market  We’ve talked a fair bit about e-Learning and MOOCs (Massive Open Online Courses) technologies here on CloudTweaks over the past number of years. The industry is expected to continue to grow at a brisk pace as more and more firms and educational institutions start to adopt cloud based services.  Docebo has an excellent…

Big Data, Business Intelligence And The Programming Language “R”

Big Data, Business Intelligence And The Programming Language “R”

Why Your Next Business Intelligence Hire Will Use R As anyone working in the field knows, business intelligence is an evolving landscape. New technologies, combined with a rapidly expanding marketplace, are disrupting legacy solutions and established platforms. Despite such growth, however, there have been a few constants, such as the R programming language. As other…

Beyond Gaming: Three Practical Applications For Oculus Rift

Beyond Gaming: Three Practical Applications For Oculus Rift

Three Practical Applications For Oculus Rift  Since the announcement of the Oculus Rift in 2012 gamers and game developers alike have been frenzied trying to both get their hands on the unit or build their own proprietary VR machine. The VR gold rush has since lead to the announcement of Project Morpheus from Sony and…

Popular

Using Big Data To Make Cities Smarter

Using Big Data To Make Cities Smarter

Using Big Data To Make Cities Smarter The city of the future is impeccably documented. Sensors are used to measure air quality, traffic patterns, and crowd movement. Emerging neighborhoods are quickly recognized, public safety threats are found via social networks, and emergencies are dealt with quicklier. Crowdsourcing reduces commuting times, provides people with better transportation…

Forrester Releases Its “15 Emerging Technologies To Watch Before 2020” Report

Forrester Releases Its “15 Emerging Technologies To Watch Before 2020” Report

15 Emerging Technologies To Watch Before 2020 The cloud, big data, the internet of things, and wearable technology have all featured heavily in Forrester’s latest list of fifteen technologies to watch before 2020. It is becoming a reality for businesses that they need to adapt and change to an increasingly technologically-minded customer base. Traditional marketing…

Public vs. Private vs. Hybrid: Which Cloud Is Right for Your Business?

Public vs. Private vs. Hybrid: Which Cloud Is Right for Your Business?

Public vs. Private vs. Hybrid The debate surrounding the deliverability of cloud computing is coming to a close. Businesses have begun to rapidly adopt the use of cloud services, courtesy the ROI this disruptive technology brings to the table. They have finally realized they cannot afford to ignore the cloud. A Forrester study found that…

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing Despite the rapid growth of cloud computing, the cloud still commands a small portion of overall enterprise IT spending. Estimates I’ve seen put the percentage between 5% and 10% of the slightly more than $2 trillion (not including telco) spent worldwide in 2014 on enterprise IT. Yet growth projections…

Three Factors for Choosing Your Long-term Cloud Strategy

Three Factors for Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Sponsored Posts

Selling Your Business To Your Employees

Selling Your Business To Your Employees

Mobility For Your Employees It may seem a radical notion, the idea of selling your business to the people who work for you, but this is the era in which we now work. Employees of all levels are all incredibly aware of their options when it comes to mobility and employability. This doesn’t mean that…

Cloud Logo Sponsors

hp Logo CityCloud-PoweredByOpenstack-Bluesquare_logo_100x100-01
cisco_logo_100x100 vmware citrix100
Site 24x7


Contributor Spotlight

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Branded Content Programs

Advertising