{"id":17982,"date":"2020-12-30T12:31:54","date_gmt":"2020-12-30T12:31:54","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=17982"},"modified":"2021-05-05T14:14:43","modified_gmt":"2021-05-05T14:14:43","slug":"cloud-based-security-secaas","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/cloud\/cloud-based-security-secaas\/","title":{"rendered":"Cloud-based security: SECaaS"},"content":{"rendered":"<p>Irrespective of your organization&#8217;s size or complexity, a robust cybersecurity infrastructure is the key to protecting your <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-network-security-tools\/\">network<\/a> and data. But common problems prevail for IT staff monitoring or managing potential threats: a constant triage of alerts, dispersed information challenging to gather, and lack of time, tools, or resources to effectively protect your organization.<\/p>\n<p>To ease these burdens, SECaaS and SOCaaS vendors have emerged as <a href=\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-security-best-practices\/\">cloud-based security<\/a> as a service that can collect, analyze, and correlate your information from diverse systems and applications &#8212; turning former headaches into actionable information security intelligence.<\/p>\n<h2><strong>Security as a Service (SECaaS)\u00a0<\/strong><\/h2>\n<p>In the growing universe of <a href=\"https:\/\/www.esecurityplanet.com\/networks\/saas-security-risks-its-the-users-stupid\/\">SaaS (Software as a Service)<\/a>, SOCaaS and SECaaS refer to cloud-built alternatives to your organization&#8217;s <a href=\"https:\/\/www.esecurityplanet.com\/networks\/soc-best-practices\/\">security operations center (SOC)<\/a> or security systems (SEC). For consolidation purposes, this article will refer to these services as SECaaS.<\/p>\n<h3><strong>What is SECaaS?<\/strong><\/h3>\n<p>SECaaS is a cloud-delivered, multi-tenant model for outsourcing cybersecurity services. On a subscription basis, these cloud services can secure access to applications no matter the host or where users connect (e.g., <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/remote-workforce-security\/\">remote work<\/a>).<\/p>\n<p>Like SaaS, SECaaS can mean cost savings, flexibility for scaling, and the latest security updates. While it can also ease your IT staff&#8217;s burden, security as a service is not a replacement for your organization&#8217;s security managers.<\/p>\n<h3><strong>Where does SOC fit?\u00a0\u00a0<\/strong><\/h3>\n<p>A security operation center (SOC) functions as the command center for protecting, detecting, and preventing potential cybersecurity threats for an organization. <a href=\"https:\/\/www.esecurityplanet.com\/networks\/security-compliance\/\">Compliance<\/a> and security analysts, incident responders, engineers, and forensic investigators work together to offer uninterrupted monitoring and improved incident protection. SOCs organize to continually monitor and alert security analysts of possible intrusion and attack.<\/p>\n<p>Though any organization could benefit from an in-house SOC, they are often limited to the businesses and organizations with the financial resources to protect highly sensitive data.<\/p>\n<h3><strong>Common features of SECaaS\u00a0<\/strong><\/h3>\n<p><a href=\"https:\/\/assets.cloudsecurityalliance.org\/legacy\/wp-uploads\/2011\/09\/SecaaS_V1_0.pdf\">Standard features of security as a service<\/a> vendors include many of the same benefits of having an SOC, like 24\/7\/365 monitoring, cybersecurity expertise, managed detection and response (MDR), network security, <a href=\"https:\/\/www.esecurityplanet.com\/networks\/penetration-testing\/\">penetration testing<\/a>, <a href=\"https:\/\/www.esecurityplanet.com\/networks\/incident-response-and-anomaly-detection\/\">incident response<\/a>, and <a href=\"https:\/\/www.esecurityplanet.com\/products\/threat-intelligence-platforms\/\">threat intelligence<\/a>.<\/p>\n<p>Additional services offered by SECaaS vendors include:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/siem-tools\/\">Security Information and Event Management (SIEM)\u00a0<\/a><\/li>\n<li><a href=\"https:\/\/www.esecurityplanet.com\/trends\/\">Business Continuity and Disaster Recovery (BCDR)\u00a0<\/a><\/li>\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-iam-software\/\">Identity and Access Management (IAM)\u00a0<\/a><\/li>\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-encryption-software\/\">Endpoint Encryption\u00a0<\/a><\/li>\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/intrusion-detection-and-prevention-systems\/\">Intrusion Detection and Prevention System (IDPS)<\/a><\/li>\n<\/ul>\n<h3><strong>First line of defense<\/strong><\/h3>\n<p>SECaaS vendors can be your organization&#8217;s first line of defense. With algorithmic and automated <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-user-and-entity-behavior-analytics-ueba-tools\/\">detection of abnormal behavior<\/a>, SIEM capabilities, and MDR, vendors can enhance your visibility into your network at any given time through a convenient, web-enabled dashboard. While the latest patches for <a href=\"https:\/\/www.esecurityplanet.com\/products\/antivirus-software\/\">antivirus software<\/a> require time-sensitive management, your SECaaS automatically covers these updates on all of your devices. When alerted to threats, SECaaS analysts can take immediate action by closing access points and promptly report problematic behavior to your organization&#8217;s IT management.<\/p>\n<h2><strong>Current landscape for SECaaS\u00a0<\/strong><\/h2>\n<p>In 2020, the security as a service market remains competitive as cloud-based upstarts battle with technology giants migrating to the cloud. Traditional security vendors serving as <a href=\"https:\/\/www.esecurityplanet.com\/products\/mssp\/\">managed security service (MSS)<\/a> providers continue to blur the line between MSS and SECaaS. Organizations are also increasingly adopting cloud services for their network and security to form what Gartner calls a <a href=\"https:\/\/blogs.gartner.com\/andrew-lerner\/2019\/12\/23\/say-hello-sase-secure-access-service-edge\/\">Secure Access Service Edge (SASE)<\/a>.<\/p>\n<h3><strong>SECaaS in 2021\u00a0<\/strong><\/h3>\n<p>Gartner noted in 2019, &#8220;The enterprise data center is no longer the center of access requirements for users and devices.&#8221; In other words, the days of in-house network usage and application hosting grow shorter. Users are tapping SaaS applications and cloud services, and more work is being conducted off-network. These shifts make automated detection of anomalous behavior and IAM essential to suppressing threats on the network perimeter and the cloud.<\/p>\n<p>Gartner added in summary to its report <a href=\"https:\/\/www.gartner.com\/en\/documents\/3957375\/invest-implications-the-future-of-network-security-is-in\"><em>Future of Network Security Is In the Cloud<\/em><\/a>, &#8220;There is no single vendor yet that offers the entire [cybersecurity] portfolio, although several vendors have a majority of the necessary functionality.&#8221; This is an important reminder to your organization when considering security as a service to ensure the vendor meets your unique set of needs.<\/p>\n<p>Vendors in the SECaaS industry in 2020 included: Alert Logic, AT&amp;T Cybersecurity, Barracuda Networks, Cisco, Dell Technologies, CipherCloud, Fortinet, IBM, McAfee, Nominum, Oracle, Panda Security, Proofpoint, Qualys, Radware, Sophos, Symantec, Trend Micro, Websense, and Zscaler.<\/p>\n<p><strong>Also Read: <\/strong><a href=\"https:\/\/www.esecurityplanet.com\/products\/cloud-security-companies\/\">Top Cloud Security Companies and Tools of 2020<\/a><\/p>\n<h3><strong>MSS vs. SECaaS\u00a0<\/strong><\/h3>\n<p>Gartner <a href=\"https:\/\/www.gartner.com\/reviews\/market\/managed-security-services-worldwide\">defines MSS<\/a> as the &#8220;remote monitoring or management or IT security functions delivered via shared services from remote security operations centers.&#8221; MSS providers typically offer managed monitoring, firewalls, IDPS, <a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\">endpoint detection and response (EDR)<\/a>, <a href=\"https:\/\/www.esecurityplanet.com\/products\/secure-web-gateway-vendors\/\">secure web gateway (SWG)<\/a>, threat intelligence, MDR, security analysis and reporting, and SIEM. Sound familiar?<\/p>\n<p>When comparing SECaaS and MSS, the primary difference has been that <a href=\"https:\/\/www.esg-global.com\/blog\/socaas-versus-managed-soc-with-video\">MSS isn&#8217;t inherently built on a SaaS platform<\/a>. As traditional MSS providers expand their security offerings to cloud-based services, this separation is becoming thinner. Notable examples of this convergence occurred in 2018 when <a href=\"https:\/\/venturebeat.com\/2018\/07\/10\/att-acquires-threat-intelligence-company-alienvault\/\">AT&amp;T acquired AlienVault<\/a> and in 2020 when <a href=\"https:\/\/trends\/room.accenture.com\/trends\/\/accenture-completes-acquisition-of-broadcoms-symantec-cyber-security-services-business.htm\">Accenture acquired Symantec<\/a>.<\/p>\n<h2><strong>Scalable, savvy, secure: SECaaS\u00a0<\/strong><\/h2>\n<p>Utilizing security as a service can be an affordable and practical solution for monitoring your network and information as your organization&#8217;s requirements change. SECaaS vendors also stand out in their efficacy for organizations that have hybrid environments with multiple clouds in the mix. With continuous monitoring and a suite of security features, your SECaaS vendor is at the front line to detect and prevent potential attacks so you can feel confident that your organization is secure.<\/p>\n\n\n<div id=\"ta-campaign-widget-66d6d26ca9805-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6d26ca9805\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6d26ca9805\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6d26ca9805\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6d26ca9805\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6d26ca9805\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6d26ca9805\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Irrespective of your organization&#8217;s size or complexity, a robust cybersecurity infrastructure is the key to protecting your network and data. But common problems prevail for IT staff monitoring or managing potential threats: a constant triage of alerts, dispersed information challenging to gather, and lack of time, tools, or resources to effectively protect your organization. To [&hellip;]<\/p>\n","protected":false},"author":250,"featured_media":17983,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[21],"tags":[],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[385],"class_list":["post-17982","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud","b2b_audience-awareness-and-consideration","b2b_product-cloud-saas-and-hosted-security-services"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cloud-based security: SECaaS | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Utilizing SECaaS can be an affordable and practical cloud-based solution for monitoring your organization&#039;s network and information.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-based-security-secaas\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud-based security: SECaaS | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Utilizing SECaaS can be an affordable and practical cloud-based solution for monitoring your organization&#039;s network and information.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-based-security-secaas\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-30T12:31:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-05T14:14:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/secaas.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2240\" \/>\n\t<meta property=\"og:image:height\" content=\"1260\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Sam Ingalls\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/SamIngalls\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sam Ingalls\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-based-security-secaas\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-based-security-secaas\/\"},\"author\":{\"name\":\"Sam Ingalls\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2\"},\"headline\":\"Cloud-based security: SECaaS\",\"datePublished\":\"2020-12-30T12:31:54+00:00\",\"dateModified\":\"2021-05-05T14:14:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-based-security-secaas\/\"},\"wordCount\":898,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-based-security-secaas\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/secaas.png\",\"articleSection\":[\"Cloud\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-based-security-secaas\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-based-security-secaas\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-based-security-secaas\/\",\"name\":\"Cloud-based security: SECaaS | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-based-security-secaas\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-based-security-secaas\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/secaas.png\",\"datePublished\":\"2020-12-30T12:31:54+00:00\",\"dateModified\":\"2021-05-05T14:14:43+00:00\",\"description\":\"Utilizing SECaaS can be an affordable and practical cloud-based solution for monitoring your organization's network and information.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-based-security-secaas\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-based-security-secaas\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-based-security-secaas\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/secaas.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/secaas.png\",\"width\":2240,\"height\":1260},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-based-security-secaas\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cloud-based security: SECaaS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2\",\"name\":\"Sam Ingalls\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg\",\"caption\":\"Sam Ingalls\"},\"description\":\"Sam Ingalls is an award-winning writer and researcher covering enterprise technology, cybersecurity, data centers, and IT trends, for eSecurity Planet, Tech Republic, ServerWatch, Webopedia, and Channel Insider.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/singalls\/\",\"https:\/\/x.com\/https:\/\/twitter.com\/SamIngalls\"],\"url\":\"https:\/\/www.esecurityplanet.com\/author\/singalls\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cloud-based security: SECaaS | eSecurity Planet","description":"Utilizing SECaaS can be an affordable and practical cloud-based solution for monitoring your organization's network and information.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/cloud\/cloud-based-security-secaas\/","og_locale":"en_US","og_type":"article","og_title":"Cloud-based security: SECaaS | eSecurity Planet","og_description":"Utilizing SECaaS can be an affordable and practical cloud-based solution for monitoring your organization's network and information.","og_url":"https:\/\/www.esecurityplanet.com\/cloud\/cloud-based-security-secaas\/","og_site_name":"eSecurity Planet","article_published_time":"2020-12-30T12:31:54+00:00","article_modified_time":"2021-05-05T14:14:43+00:00","og_image":[{"width":2240,"height":1260,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/secaas.png","type":"image\/png"}],"author":"Sam Ingalls","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/SamIngalls","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Sam Ingalls","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/cloud\/cloud-based-security-secaas\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/cloud\/cloud-based-security-secaas\/"},"author":{"name":"Sam Ingalls","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2"},"headline":"Cloud-based security: SECaaS","datePublished":"2020-12-30T12:31:54+00:00","dateModified":"2021-05-05T14:14:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/cloud\/cloud-based-security-secaas\/"},"wordCount":898,"commentCount":0,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/cloud\/cloud-based-security-secaas\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/secaas.png","articleSection":["Cloud"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.esecurityplanet.com\/cloud\/cloud-based-security-secaas\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/cloud\/cloud-based-security-secaas\/","url":"https:\/\/www.esecurityplanet.com\/cloud\/cloud-based-security-secaas\/","name":"Cloud-based security: SECaaS | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/cloud\/cloud-based-security-secaas\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/cloud\/cloud-based-security-secaas\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/secaas.png","datePublished":"2020-12-30T12:31:54+00:00","dateModified":"2021-05-05T14:14:43+00:00","description":"Utilizing SECaaS can be an affordable and practical cloud-based solution for monitoring your organization's network and information.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/cloud\/cloud-based-security-secaas\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/cloud\/cloud-based-security-secaas\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/cloud\/cloud-based-security-secaas\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/secaas.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/secaas.png","width":2240,"height":1260},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/cloud\/cloud-based-security-secaas\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Cloud-based security: SECaaS"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2","name":"Sam Ingalls","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg","caption":"Sam Ingalls"},"description":"Sam Ingalls is an award-winning writer and researcher covering enterprise technology, cybersecurity, data centers, and IT trends, for eSecurity Planet, Tech Republic, ServerWatch, Webopedia, and Channel Insider.","sameAs":["https:\/\/www.linkedin.com\/in\/singalls\/","https:\/\/x.com\/https:\/\/twitter.com\/SamIngalls"],"url":"https:\/\/www.esecurityplanet.com\/author\/singalls\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/17982"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/250"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=17982"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/17982\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/17983"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=17982"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=17982"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=17982"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=17982"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=17982"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=17982"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}