Home

Security protocols for your SaaS vendors

Security protocols for your SaaS vendors

How many SaaS vendors meet their customers' security and compliance requirements today? 100 CIOs share their experience.

How many of your SaaS vendors meet 100% of your company’s security requirements?

11%< 25%
57%25-50%
15%51-75%
17%> 75%
0 views
230 responses

To your knowledge, have you ever had to make a security policy exception for one or more existing SaaS solution providers?

66%Yes
27%No
7%Unsure
0 views
227 responses

When sensitive data is stored in an application outside of your Data Center, is it important that you control the encryption keys protecting that data?

94%Yes
6%No
0 views
227 responses

In your best estimation, what portion of your SaaS solution providers give your team control over your encryption keys?

17%< 25%
62%25-50%
13%51-75%
8%> 75%
0 views
227 responses

To what extent do you agree with this statement - “I am uncomfortable that my SaaS solution providers maintain access and control of my encryption keys.

16%Strongly agree
70%Agree
11%Disagree
3%Strongly disagree
0 views
179 responses

SaaS vendors offer one-size-fits-all security, but there is a movement towards “security customization. To what extent do you believe that in the future your team will require more customization of security applications running outside your Data Centre?

28%Strongly agree
63%Agree
9%Disagree
0%Strongly disagree
0 views
162 responses

In the future, do you believe that you will retire SaaS applications/vendors who maintain control over your encryption keys and/or use one encryption key for multiple customers?

61%Yes
13%No
26%Unsure
0 views
158 responses