• About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Privacy Policy
  • Contact us
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Awards
      • 2025
      • 2024
      • 2023
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • All events
  • Digital Magazine
  • GITEX GLOBAL
No Result
View All Result
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Awards
      • 2025
      • 2024
      • 2023
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • All events
  • Digital Magazine
  • GITEX GLOBAL
No Result
View All Result
CXO Insight Middle East
No Result
View All Result

Owning the risk: Making the shared responsibility model work in SaaS environments

by Saif Alrefai, Solutions Engineering Manager, OPSWAT
August 18, 2025
in Opinions

With cyber threats accelerating, visibility and control in SaaS platforms are non-negotiable

Owning the risk: Making the shared responsibility model work in SaaS environments

Cloud technology. Cloud computing. Devices connected to digital storage in data center via internet. IOT. Smart home. Communication laptop, tablet, phone and domestic devices with online database.

From sales and marketing to customer support and analytics, Software-as-a-Service (SaaS) platforms have become central to day-to-day operations. But as the cloud becomes more embedded in business processes, so also does the risk. According to recent research, 82 percent of data breaches now target cloud-based data, with ransomware leading the charge. By 2031, global losses tied to malware are projected to hit a staggering US$10.5 trillion annually. The speed and scale of today’s cyber threats mean that cloud security can no longer be treated as someone else’s job.

What shared responsibility really means

A major reason for complacency around cloud security is a lack of clarity over who’s actually responsible for what. Most SaaS providers operate under a shared responsibility model, which means they’ll secure the infrastructure that powers the service, but the liability is on customers to secure how the platform is used. That includes what data is uploaded, how access is controlled, and what workflows are enabled.

In other words, your cloud provider may protect their data centre, but you’re responsible for what your users bring into the platform. If that includes unscanned attachments, malicious uploads, or sensitive customer data, the risk is yours to manage.

Let’s take Salesforce as an example. As one of the most widely adopted enterprise platforms, Salesforce is home to everything from pipeline forecasts and customer files to invoices and contracts. It’s also a place where multiple teams, from sales to service, collaborate and share documents every day.

But in that environment, even a single malicious file upload can cause serious problems. It can sit in a shared folder unnoticed, be sent to customers, or interact with other systems via APIs all going undetected or without ever triggering alarms — unless the right security measures are in place.

Saif Alrefai, OPSWAT

Routes to responsibility: Options and trade-offs

So, how can CIOs meet their security obligations under the shared responsibility model?

One option is to design a tailored on-premise solution that routes cloud traffic through an internal security gateway. But this approach can quickly become complex and costly. It impacts user experience and undermines the core advantages that originally motivated the organisation’s cloud migration strategy.

A far more effective route is to embed security directly into the cloud platform using native integrations available through that service’s own marketplace. These solutions are purpose-built to sit within the cloud environment, meaning they can be deployed rapidly, scale as needed, and operate seamlessly without creating new IT overhead.

They also align with existing procurement models. Instead of negotiating separate vendor contracts and undergoing lengthy compliance reviews, CIOs can procure and deploy trusted security solutions as easily as adding a plug-in. This streamlines rollout while reinforcing trust, both internally and with customers.

It has to be fast, and invisible

Once the decision has been made to embed security into the cloud environment, the next step is choosing the right solution. And here, it’s important to match the rhythm of real-world business activity.

Take file uploads, for example. On a cloud platform used for daily operations, files move quickly as they’re shared between teams, attached to records, and exchanged with external partners. This speed is a strength, but it also makes it easy for an infected file to do damage before it’s detected. Worse still, some malware strains can lie dormant or disguise themselves as legitimate files, evading basic security filters.

That’s why CIOs should seek out solutions that automatically scan every upload in real time, using advanced threat detection that includes behaviour-based analysis, deep file inspection, and Content Disarm and Reconstruction (CDR). Protection must be automatic, invisible to the user, and capable of catching both known and unknown threats. The goal isn’t just to prevent a breach. It’s to maintain the speed of business while staying secure.

Compliance: Not just a checkbox

Defending against cyber threats and fulfilling regulatory compliance are both essential components of a comprehensive security strategy. Whether you’re operating under GDPR in the EU, CCPA in California, or local data protection regulations in the GCC, compliance is non-negotiable. In some sectors, particularly finance and healthcare, organisations are also bound by standards like PCI-DSS, HIPAA, SOX, or SWIFT CSCF.

Failure to comply can result in significant penalties, not to mention reputational damage. That’s why any security solution selected should be capable of supporting compliance out of the box, with features like audit trails, policy enforcement, and data classification. It’s about building peace of mind into your processes.

Scaling with the business

Modern cloud usage is often unpredictable. One month, your business might be uploading hundreds of files; the next, it could be thousands. Your security approach needs to scale just as flexibly, without sacrificing speed or reliability.

This means choosing solutions architected for the cloud: high-performance, API-driven, and capable of adapting to workload fluctuations. It also means flexibility in pricing. Models that reflect usage, not rigid seat counts, will ensure that your investment aligns with your actual risk surface, not just your headcount.

Own the risk, protect the platform

For CIOs, cloud platforms are no longer peripheral tools, they’re mission-critical systems. That means treating them with the same severity as your data center or core network. The shared responsibility model is clear: providers secure their stack; you secure your data and how it’s used.

At the same time, taking responsibility doesn’t mean compromising usability. With cloud-native security tools, you can embed protection that’s fast, seamless, and scalable, all without slowing your teams down or burdening IT with complexity.

Because in a world where malware can slip in with a single upload, visibility and control aren’t optional, they’re essential.

Tags: CIOClouddata centredata classificationSaaS
ShareTweet

Related Posts

Safeguard your systems: 10 security rules for AI Agent onboarding
Opinions

Safeguard your systems: 10 security rules for AI Agent onboarding

November 6, 2025

Organisations in the United Arab Emirates (UAE) have recognised that agentic AI is no passing fad. One estimate puts its...

How bots are breaking digital experiences
Opinions

How bots are breaking digital experiences

November 5, 2025

The digital experience under threat A good digital experience drives brand loyalty and revenue. Today’s customer journeys span multiple touchpoints...

Discussion about this post

Latest Issue

Covoro YouCloud unveils Agentic AI UAE E-Invoicing solution at Tax Technology Summit

Covoro YouCloud unveils Agentic AI UAE E-Invoicing solution at Tax Technology Summit

December 5, 2025
EQUATE and Kyndryl extend partnership to strengthen global IT systems

EQUATE and Kyndryl extend partnership to strengthen global IT systems

December 4, 2025
CIS partners with Cequence & Astrix to help enterprises secure AI and Agentic systems

CIS partners with Cequence & Astrix to help enterprises secure AI and Agentic systems

December 4, 2025

The most trusted source of strategic intelligence for IT decision makers in the Middle East.

About

  • About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Contact Us

Policies

  • Privacy Policy
© 2025 – CXO Insight Middle East. All Rights Reserved.
Facebook-f X-twitter Linkedin
Separated they live in Bookmarksgrove right at the coast of the Semantics, a large language ocean. A small river named Duden.

About

  • About Us
  • Site Map
  • Contact Us
  • Career

Policies

  • Help Center
  • Privacy Policy
  • Cookie Setting
  • Term Of Use

Join Our Newsletter

© 2024 – CXO Insight Middle East. All Rights Reserved.

Facebook-f Twitter Youtube Instagram

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Join our mailing list
Sign up here to get the latest news, updates and special offers delivered directly to your inbox.
No Result
View All Result
  • News
  • Opinions
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
  • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Awards
      • 2025
      • 2024
      • 2023
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CX50 Oman
    • CXO50
    • ICT Awards
      • Dubai
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • All events
  • Videos
  • GITEX GLOBAL
  • Digital Magazine

© 2025 - CXO Insight Middle East. All Rights Reserved.