Topic | "SAS-70 Type II Certification"

Evaluating a SaaS Subscription Billing Service

By Subraya Mallya

Selling Software-as-a-Service has created new challenges for companies around subscription billing, pricing and managing customer accounts. This has created a new category of software offerings called Subscription Billing. This post will outline the characteristics of a good subscription billing software.

Comments (0)

Tags: , , , , , , ,

On-Premise to SaaS: Road Less Traveled

By Subraya Mallya

As SaaS increasingly becomes the preferred way for delivery and consumption  for all things software, incumbent on-premise vendors are feeling the heat to come up with their own version of SaaS application. Customers convinced of the  cost efficiencies of the SaaS model are resenting the hefty support contracts. The challenge of coming up with a […]

Comments (27)

Tags: , , , , , , , , ,

SaaS: Data Security – Should I be concerned?

By Subraya Mallya

One of the key concerns associated with Software-as-a-Service (SaaS) is and will be data security. The fact that your business data goes out of your network and resides in the software vendor’s data center should warrant concern. But with upfront due diligence and ongoing oversight, you should be able to get you past your inhibitions […]

Comments (12)

Tags: , , , , ,

SaaS Buyer’s Guide – Choosing the Right Vendor

By Subraya Mallya

As SaaS model becomes more mature and moves beyond Sales Automation into the more involved functional domains of Human Resources Management, Project Management, Supply Chain and Financial Analysis,  IT executives in companies now have to define the right process to procure SaaS offerings. While it is still a software that you are buying, the dynamics […]

Comments (9)

Tags: , , , , , , , , , ,

SaaS – A Compliance Nightmare?

By Subraya Mallya

In the regulatory climate we live in today, by adopting Software-as-a-Service/Cloud based services, business are confronted with two equally challenging choices. On the one-hand, SaaS provides companies with a controlled environment outside the control of their IT organization. The internal IT staff will have no access to the application, the data and infrastructure configuration that […]

Comments (3)

Tags: , , ,
Back to Top