www.information-age.com Open in urlscan Pro
52.44.9.243  Public Scan

Submitted URL: https://community.leadsmarttech.com/Prod/link-tracker?redirectUrl=aHR0cHMlM0ElMkYlMkZ3d3cuaW5mb3JtYXRpb24tYWdlLmNvbSUyRmtleS1xdWVzdG...
Effective URL: https://www.information-age.com/key-questions-to-ask-when-choosing-saas-provider-123499999/
Submission: On September 26 via manual from CA — Scanned from CA

Form analysis 2 forms found in the DOM

POST /key-questions-to-ask-when-choosing-saas-provider-123499999/#gf_4

<form method="post" enctype="multipart/form-data" target="gform_ajax_frame_4" id="gform_4" action="/key-questions-to-ask-when-choosing-saas-provider-123499999/#gf_4">
  <div class="gform_body gform-body">
    <ul id="gform_fields_4" class="gform_fields top_label form_sublabel_below description_below">
      <li id="field_4_24" class="gfield gfield_html gfield_html_formatted gfield_no_follows_desc field_sublabel_below field_description_below gfield_visibility_visible" data-js-reload="field_4_24">
        <h3 style="text-align: center;">Welcome to Information Age!</h3>
        <p style="font-weight: 500; font-size: 14px;text-align: center;"> Technology is moving extremely fast and you don't want to miss anything, sign up to our newsletter and you will get all the latest tech news straight into your inbox!</p>
      </li>
      <li id="field_4_11" class="gfield gfield_contains_required field_sublabel_below field_description_below gfield_visibility_visible" data-js-reload="field_4_11"><label class="gfield_label screen-reader-text" for="input_4_11">Email<span
            class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label>
        <div class="ginput_container ginput_container_email">
          <input name="input_11" id="input_4_11" type="text" value="" class="medium" placeholder="Email" aria-required="true" aria-invalid="false">
        </div>
      </li>
      <li id="field_4_25" class="gfield gfield_html gfield_html_formatted gfield_no_follows_desc field_sublabel_below field_description_below gfield_visibility_visible" data-js-reload="field_4_25">
        <p style="text-align: center; margin: 0px; font-weight: 600; padding: 0px; margin-top: 5px; }">I want to recieve updates for the followoing:</p>
      </li>
      <li id="field_4_13" class="gfield maincheckboxstyle gfield_contains_required field_sublabel_below field_description_below gfield_visibility_visible" data-js-reload="field_4_13"><label
          class="gfield_label screen-reader-text gfield_label_before_complex"><span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label>
        <div class="ginput_container ginput_container_checkbox">
          <ul class="gfield_checkbox" id="input_4_13">
            <li class="gchoice gchoice_4_13_1">
              <input class="gfield-choice-input" name="input_13.1" type="checkbox" value="true" id="choice_4_13_1">
              <label for="choice_4_13_1" id="label_4_13_1">Newsletter</label>
            </li>
            <li class="gchoice gchoice_4_13_2">
              <input class="gfield-choice-input" name="input_13.2" type="checkbox" value="true" id="choice_4_13_2">
              <label for="choice_4_13_2" id="label_4_13_2">Special Offers</label>
            </li>
          </ul>
        </div>
      </li>
    </ul>
  </div>
  <div class="gform_footer top_label"> <input type="submit" id="gform_submit_button_4" class="gform_button button" value="Sign Me Up" onclick="if(window[&quot;gf_submitting_4&quot;]){return false;}  window[&quot;gf_submitting_4&quot;]=true;  "
      onkeypress="if( event.keyCode == 13 ){ if(window[&quot;gf_submitting_4&quot;]){return false;} window[&quot;gf_submitting_4&quot;]=true;  jQuery(&quot;#gform_4&quot;).trigger(&quot;submit&quot;,[true]); }"> <input type="hidden" name="gform_ajax"
      value="form_id=4&amp;title=&amp;description=&amp;tabindex=0">
    <input type="hidden" class="gform_hidden" name="is_submit_4" value="1">
    <input type="hidden" class="gform_hidden" name="gform_submit" value="4">
    <input type="hidden" class="gform_hidden" name="gform_unique_id" value="">
    <input type="hidden" class="gform_hidden" name="state_4" value="WyJbXSIsIjg2YTg3YjFlYjg1YTRjMDg3YzI0N2M5MzBhYTliMzQ4Il0=">
    <input type="hidden" class="gform_hidden" name="gform_target_page_number_4" id="gform_target_page_number_4" value="0">
    <input type="hidden" class="gform_hidden" name="gform_source_page_number_4" id="gform_source_page_number_4" value="1">
    <input type="hidden" name="gform_field_values" value="">
  </div>
  <p style="display: none !important;"><label>Δ<textarea name="ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js_1" name="ak_js" value="1664193568871">
    <script>
      document.getElementById("ak_js_1").setAttribute("value", (new Date()).getTime());
    </script>
  </p>
</form>

GET https://www.information-age.com/

<form action="https://www.information-age.com/" method="get" class="search-form">
  <div class="search-form__container">
    <input type="text" name="s" class="search" placeholder="Search news, subjects, authors..." value="" required="">
    <button type="submit" class="search-submit"><i class="fa fa-search"></i></button>
  </div>
</form>

Text Content

WE VALUE YOUR PRIVACY

We and our partners store and/or access information on a device, such as cookies
and process personal data, such as unique identifiers and standard information
sent by a device for personalised ads and content, ad and content measurement,
and audience insights, as well as to develop and improve products. With your
permission we and our partners may use precise geolocation data and
identification through device scanning. You may click to consent to our and our
partners’ processing as described above. Alternatively you may access more
detailed information and change your preferences before consenting or to refuse
consenting. Please note that some processing of your personal data may not
require your consent, but you have a right to object to such processing. Your
preferences will apply to this website only. You can change your preferences at
any time by returning to this site or visit our privacy policy.
MORE OPTIONSAGREE


 * WELCOME TO INFORMATION AGE!
   
   Technology is moving extremely fast and you don't want to miss anything, sign
   up to our newsletter and you will get all the latest tech news straight into
   your inbox!

 * Email*
   

 * I want to recieve updates for the followoing:

 * *
    * Newsletter
    * Special Offers



Δ



I accept that the data provided on this form will be processed, stored, and used
in accordance with the terms set out in our privacy policy.

No thanks I don't want to stay up to date

   
 * 

   
 * Diversity
 * Events & Webinars
 * Jobs
 * Whitepapers
 * Subscribe
 * Login
 * 

 * News
    * People Moves
    * Major Contracts
    * Releases & Updates
    * The City & Wall Street
    * Events

 * Data & Insight
    * Research
    * Whitepapers
    * Information Age E-Newsletter
    * Insight Guides
       * Buyers Guides
       * How it Works
       * What it Means
       * Business Skills

 * Sectors
    * Agriculture
    * Automotive
    * Aviation
    * Construction & Civil Engineering
    * Consumer Electronics & Mobile
    * Media & Marketing
    * Defence
    * Education
    * Energy
    * Financial Services
    * Government & Public Sector
    * Healthcare
    * Legal & Accountancy
    * Life Sciences
    * Manufacturing
    * Not for profit
    * Property
    * Retail
    * Technology
    * Telecoms
    * Transport & Logistics
    * Travel & Leisure
    * Utilities

 * Topics
    * AI & Machine Learning
    * Automation
    * Blockchain
    * Business Continuity
    * Business & Strategy
    * CIO and CTO
       * Tech Strategy
   
    * Cloud & Edge Computing
    * Communications & Networking
    * Cybersecurity
       * Cyber Innovation
   
    * Data Storage & Data Lakes
    * Data Analytics & Data Science
    * Data Protection & Privacy
    * Development & Programming
    * DevOps
    * Digital Transformation
       * Disruptive Innovation
       * Transformation in Action
   
    * Emerging Technology & Innovation
    * Governance, Risk and Compliance
    * Hardware & Peripherals
    * Immersive Technology
    * IoT and M2M
    * IT management
    * Legislation & Regulation
    * Outsourcing
    * Robotics
    * Smart Cities
    * Software and Applications
    * Start-up scene
    * Tech Giants

 * Tech M&A
    * IPOs
    * M&A
    * PE & VC

 * Careers
    * Business Skills
    * Companies
    * Major Contracts
    * Releases & Updates
    * Recruitment

 * Regions
    * Americas
    * Asia-Pacific
    * EMEA

 * News
    * People Moves
    * Major Contracts
    * Releases & Updates
    * The City & Wall Street
    * Events

 * Data & Insight
    * Research
    * Whitepapers
    * Information Age E-Newsletter
    * Insight Guides
       * Buyers Guides
       * How it Works
       * What it Means
       * Business Skills

 * Sectors
    * Agriculture
    * Automotive
    * Aviation
    * Construction & Civil Engineering
    * Consumer Electronics & Mobile
    * Media & Marketing
    * Defence
    * Education
    * Energy
    * Financial Services
    * Government & Public Sector
    * Healthcare
    * Legal & Accountancy
    * Life Sciences
    * Manufacturing
    * Not for profit
    * Property
    * Retail
    * Technology
    * Telecoms
    * Transport & Logistics
    * Travel & Leisure
    * Utilities

 * Topics
    * AI & Machine Learning
    * Automation
    * Blockchain
    * Business Continuity
    * Business & Strategy
    * CIO and CTO
       * Tech Strategy
   
    * Cloud & Edge Computing
    * Communications & Networking
    * Cybersecurity
       * Cyber Innovation
   
    * Data Storage & Data Lakes
    * Data Analytics & Data Science
    * Data Protection & Privacy
    * Development & Programming
    * DevOps
    * Digital Transformation
       * Disruptive Innovation
       * Transformation in Action
   
    * Emerging Technology & Innovation
    * Governance, Risk and Compliance
    * Hardware & Peripherals
    * Immersive Technology
    * IoT and M2M
    * IT management
    * Legislation & Regulation
    * Outsourcing
    * Robotics
    * Smart Cities
    * Software and Applications
    * Start-up scene
    * Tech Giants

 * Tech M&A
    * IPOs
    * M&A
    * PE & VC

 * Careers
    * Business Skills
    * Companies
    * Major Contracts
    * Releases & Updates
    * Recruitment

 * Regions
    * Americas
    * Asia-Pacific
    * EMEA

 * Subscribe
 * Login




TOPICS

SOFTWARE AND APPLICATIONS

EDITOR'S CHOICE

14 September 2022



KEY QUESTIONS TO ASK WHEN CHOOSING A SAAS PROVIDER

It's a direction many companies are turning towards in order to drive further
value, but it's vital that the following points are taken into account.

Jakub Lewandowski, global data governance officer at Commvault, addresses the
key questions that organisations should bear in mind when it comes to choosing a
SaaS provider

Software-as-a-service (SaaS) models are rapidly becoming the solution of choice
for small- and medium-sized enterprises (SMEs) looking to take advantage of
subscription-based options that make it easy to implement new capabilities as
business needs change. Enabling businesses to simply pay for what they need and
use, the SaaS ecosystem makes it possible for SMEs to leverage cloud-based
services and enterprise-grade software, and compete on a par with much larger
companies.

It’s this affordability and flexibility that is driving SMEs to consider moving
data and applications from their on-site infrastructure to centrally located
services on a cloud-based network — so much so that worldwide spending on SaaS
services is predicted to hit $176.6bn in 2022.

With more SMEs investing in more SaaS solutions, getting to grips with licensing
terms and pricing metrics is just one of the challenges decision-makers face
when looking to select a SaaS vendor. Entrusting data and applications from
their own environment to an outside entity will also raise a host of concerns
around important business-critical issues such as data governance, security, and
compliance.

To determine if a vendor is going to be the right fit for their business,
decision-makers should ideally work through a comprehensive evaluation checklist
that is focused on appraising five key areas.


1. DOES THE SAAS SOLUTION MEET ALL IDENTIFIED – AND FUTURE – BUSINESS NEEDS?

Ideally, a provider should have mechanisms in place to evaluate the business’s
needs and use cases for the current data environment, so that their solution can
be tailored to these requirements and easily adapted as business needs evolve.

Asking questions around how the SaaS solution will be scaled to support growing
volumes of processed data will deliver valuable insights on potential future
usage costs, or pricing tiers that may kick-in as a result. All of this will
help deliver a more accurate value analysis of the solution for the organisation
over the long term. While the initial focus may well be around initiating
support systems for end-users such as Microsoft 365 or CRM systems,
decision-makers should also think outside the box and evaluate what other
options are on offer.

In addition to data backup and security systems for local and cloud
environments, advanced tool systems that can process data and offer AI-based
data analysis will help ensure the solution is future-proofed to support
evolving business needs. Having the ability to build a service catalogue, and
understand the vendor’s future roadmap for services, will help determine if the
right synergies exist for an lasting and enduring value-add partnership.


2. WHAT ARE THE CONTRACT TERMS?

Undertaking a detailed review of the service contract prior to signing will help
eliminate any possibility of encountering unexpected or additional costs down
the line. This evaluation should also feature an examination of all contract
termination conditions to avoid any potential vendor lock-in risk.

As part of this process, decision-makers will need to clarify when and how their
business can terminate, check the fine print on how ‘service credits’ will be
applied as compensation when SLAs are missed, and agree on who monitors SLA
delivery performance and how reporting is undertaken.


3. WHAT MUST BE CONSIDERED FROM A LEGAL STANDPOINT?

Prior to signing a contract, it’s important to verify if the proposed solution
complies with any specific industry, regulatory, or legal requirements. This
will be especially key for organisations operating in the banking, finance,
insurance, and telecoms sectors. All SMEs are advised to check that a solution
adheres to all national cyber security standards or guidelines that apply today,
or are on the horizon.

When it comes to signing the contract, many providers will employ a clickwrap or
click-through process that approves a specific version of the contract document
and acceptance of all contractual terms with a mouse click. However, some
organisations may well require a more traditional contract signing process and a
provider should be able to accommodate requests to sign contracts via an
electronic signature or on paper.


4. WHO OWNS THE DATA?

Senior decision-makers should double-check contract terms to ensure their
organisation maintains ownership of its data throughout the contract. In
particular, senior teams will need to be fully conversant with any data
processing descriptions so that they can be fully confident about who and how
personal data is processed.

When it comes to who has legal responsibility for data entrusted to the
provider, it is essential to define specifically who bears responsibility and
who will be held accountable. This is vital as SaaS services often run on
infrastructure and platforms provided by other entities and so the contract may
mention third-party contracts. In these ‘shared responsibility’ scenarios,
clarifying who is responsible for what and having a graphical representation of
all shared responsibilities will be helpful.


5. IS THE SOLUTION COMPLIANT?

The ideal SaaS solution will deliver support for critical compliance objectives
such as GDPR and UK-GDPR. For example, ideally a backup solution should prevent
end-users from moving data outside of the cloud and enable the granular
management of data retention periods. It’s also advisable to check whether a
separate contract will be required to cover the processing of personal data.

Assessing where data is stored and establishing if a potential supplier meets
all regulatory standards required by the organisation – for example, SOC2
compliance, or HIPPA as well as GDPR – is vital before committing to using a
service.


NAVIGATING AND OPTIMISING SAAS USAGE

As digital transformation drives more SMEs to invest in SaaS services, key
stakeholders will need to become adept at evaluating the suitability of SaaS
vendors to ensure that their digitalisation journey is cost-effective, safe and
generates anticipated outcomes.

Undertaking a detailed assessment of a provider’s credentials and clearly
defining data ownership; success metrics; and legal and compliance implications
will help ensure that any risks associated with the introduction of an external
SaaS provider are minimised. This will also help towards choosing the right SaaS
solution to fully address business needs, today and into the future.

Written by Jakub Lewandowski, global data governance officer at Commvault

Related:

Empowering procurement leaders to invest in the right tools for innovation —
Simon Whatson, vice-president at Efficio, discusses how procurement leaders can
be empowered to invest in the right tools for innovation.

Putting the trust back in software testing in 2022 — Christian Brink
Frederiksen, co-founder and CEO of Leapwork, discusses how trust can be placed
back into software testing.

 * 
 * 
 * 
 * 
 * 
 * 

This article is tagged with: Cloud Applications, SaaS, Strategic Partnership


A LEADER’S GUIDE TO INNOVATION SYSTEMS




The pace of change has never been this fast, yet it will never be this slow
again.


Download now


Airbnb - Manila
Regional Safety & Claims Quality Lead
Jobbio - Dublin 4
QA Engineer
eClerx - New York
Agile Coach
Northrop Grumman - Northridge
Senior Program Manager Avionics Development with Active Clearance
Indeed - Leipzig
Key Account Manager*in (m/w/d) Großkunden


RECENT POSTS

 * Information Age guide to data + privacy
 * Lucinity appoints Hjoertur Stefansson as CTO
 * How AI could be a game-changer for data privacy
 * Best GDPR compliance software for CTOs
 * Data privacy audit checklist – how to compile one




FOLLOW US

 * 2.5k Followers
 * 16.1k Followers
 * 2.5k Followers
 * 169 Followers




LATEST NEWS

People Moves


LUCINITY APPOINTS HJOERTUR STEFANSSON AS CTO

26 September 2022 / Former Amazon manager Hjörtur Líndal Stefánsson has been
appointed as new chief technology officer of AML provider Lucinity.

Data Protection & Privacy


HOW AI COULD BE A GAME-CHANGER FOR DATA PRIVACY

23 September 2022 / AI offers multiple benefits to businesses, but it also poses
data privacy risks

Data Protection & Privacy


BEST GDPR COMPLIANCE SOFTWARE FOR CTOS

23 September 2022 / Not being compliant when it comes to data protection could
cost your business millions. But using software to automate GDPR compliance can
save you time and money. Information Age runs through the best packages out
there

Data Protection & Privacy


DATA PRIVACY AUDIT CHECKLIST – HOW TO COMPILE ONE

23 September 2022 / 8 things to remember when conducting a data privacy audit

Data Protection & Privacy


WHAT IS THE ROLE OF THE DATA MANAGER?

23 September 2022 / What is the role of a data manager today, what skills does
the job require and what challenges do data managers face?

AI & Machine Learning


THERE IS A REAL DEMAND FOR AI IN HEALTHCARE, BUT PRESERVING PRIVACY IS KEY

23 September 2022 / AI in healthcare is not in the testing phase, there are many
existing applications. But, there are also considerable privacy implications.

Legislation & Regulation


WHAT LIZ TRUSS’S CABINET CAN LEARN FROM THE EU CYBER RESILIENCE ACT PROPOSAL

22 September 2022 / Jeff Watkins, CPTO of xDesign, discusses what UK government
legislation under Liz Truss's cabinet can take from the EU Cyber Resilience Act
proposal.

Data Analytics & Data Science


CLIVE HUMBY – DATA CAN PREDICT NEARLY EVERYTHING ABOUT RUNNING A BUSINESS

22 September 2022 / Clive Humby, inventor of the Tesco Clubcard, on ways to stop
feeling so overwhelmed by data, how to convince your CEO of its importance, and
why data should look forward and not backwards

Data Protection & Privacy


HOW BUSINESSES CAN PREPARE FOR THE DATA PROTECTION AND DIGITAL INFORMATION BILL

22 September 2022 / With the Data Protection and Digital Information Bill
currently being reviewed in Parliament, Netwrix vice-president of research and
development Michael Paye explains how businesses can amply prepare.

View All Stories


 * Contact us
 * Privacy Policy
 * Cookie Policy
 * Terms & Conditions
 * About Us
 * Media Packs
 * Contributor Guidelines

© Bonhill Group Plc,

29 Clerkenwell Road, London EC1M 5RN

T. 020 7638 6378

Part of the Bonhill Group.




Information Age


PIN IT ON PINTEREST



Notifications