{"id":18037,"date":"2024-04-09T03:04:01","date_gmt":"2024-04-09T07:04:01","guid":{"rendered":"https:\/\/www.comtechadvisory.com\/blog\/phlo-systems-cyber-security-services-help-address-saas-ctrm-cyber-security-questions\/"},"modified":"2024-04-09T03:04:01","modified_gmt":"2024-04-09T07:04:01","slug":"phlo-systems-cyber-security-services-help-address-saas-ctrm-cyber-security-questions","status":"publish","type":"post","link":"https:\/\/www.comtechadvisory.com\/blog\/phlo-systems-cyber-security-services-help-address-saas-ctrm-cyber-security-questions\/","title":{"rendered":"Phlo Systems Cyber Security Services Help Address SaaS CTRM Cyber Security Questions."},"content":{"rendered":"
In the world of SaaS software, security rightly remains a key concern for users and prospective users who want to be certain that their data and systems are secure in the cloud.\u00a0 According to Saurabh Goyal, CEO at Phlo Systems, this question invariably comes up often from prospective users of its solutions.\u00a0 However, Phlo has a history of being engaged in cyber security assessment projects to ensure that it can protect users from cyber threats, he told me. In fact, it is something it now offers as a service especially to smaller companies that don\u2019t have the staff or competency internally to do such a project. Last year, for example, it worked with futures brokers in the USA that had been impacted by a ransomware issue. Phlo was asked to look at all SaaS-based solutions in use for vulnerabilities in the cyber security area. It came back with recommendations and fixes for many of the issues that it discovered. This and similar experiences have been used by Phlo to develop a service offering around cyber security assessments as well as focus on its own software. \u201cWe have actually become cyber security experts,\u201d he said, because of doing these projects, and… continue reading<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"

In the world of SaaS software, security rightly remains a key concern for users and prospective users who want to be certain that their data and systems are secure in the cloud.\u00a0 According to Saurabh Goyal, CEO at Phlo Systems, this question invariably comes up often from prospective users of its solutions.\u00a0 However, Phlo has a history of being engaged in cyber security assessment projects to ensure that it can protect users from cyber threats, he told me. In fact, it is something it now offers as a service especially to smaller companies that don\u2019t have the staff or competency internally to do such a project. Last year, for example, it worked with futures brokers in the USA that had been impacted by a ransomware issue. Phlo was asked to look at all SaaS-based solutions in use for vulnerabilities in the cyber security area. It came back with recommendations and fixes for many of the issues that it discovered. This and similar experiences have been used by Phlo to develop a service offering around cyber security assessments as well as focus on its own software. \u201cWe have actually become cyber security experts,\u201d he said, because of doing these projects, and… … continue reading<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4],"tags":[],"acf":[],"yoast_head":"\nPhlo Systems Cyber Security Services Help Address SaaS CTRM Cyber Security Questions. | Commodity Technology Advisory<\/title>\n<meta name=\"description\" content=\"In the world of SaaS software, security rightly remains a key concern for users and prospective users who want to be certain that their data and systems\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.comtechadvisory.com\/blog\/phlo-systems-cyber-security-services-help-address-saas-ctrm-cyber-security-questions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phlo Systems Cyber Security Services Help Address SaaS CTRM Cyber Security Questions. | Commodity Technology Advisory\" \/>\n<meta property=\"og:description\" content=\"In the world of SaaS software, security rightly remains a key concern for users and prospective users who want to be certain that their data and systems\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.comtechadvisory.com\/blog\/phlo-systems-cyber-security-services-help-address-saas-ctrm-cyber-security-questions\/\" \/>\n<meta property=\"og:site_name\" content=\"Commodity Technology Advisory\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CommodityTechnologyAdvisory\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-09T07:04:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.comtechadvisory.com\/wp-content\/uploads\/2013\/06\/social-square-logo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"700\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Patrick Reames\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@comtechadvisory\" \/>\n<meta name=\"twitter:site\" content=\"@comtechadvisory\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Patrick Reames\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.comtechadvisory.com\/blog\/phlo-systems-cyber-security-services-help-address-saas-ctrm-cyber-security-questions\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.comtechadvisory.com\/blog\/phlo-systems-cyber-security-services-help-address-saas-ctrm-cyber-security-questions\/\"},\"author\":{\"name\":\"Patrick Reames\",\"@id\":\"https:\/\/www.comtechadvisory.com\/#\/schema\/person\/280c24085ee23c1322c66042426ee6b9\"},\"headline\":\"Phlo Systems Cyber Security Services Help Address SaaS CTRM Cyber Security Questions.\",\"datePublished\":\"2024-04-09T07:04:01+00:00\",\"dateModified\":\"2024-04-09T07:04:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.comtechadvisory.com\/blog\/phlo-systems-cyber-security-services-help-address-saas-ctrm-cyber-security-questions\/\"},\"wordCount\":215,\"publisher\":{\"@id\":\"https:\/\/www.comtechadvisory.com\/#organization\"},\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.comtechadvisory.com\/blog\/phlo-systems-cyber-security-services-help-address-saas-ctrm-cyber-security-questions\/\",\"url\":\"https:\/\/www.comtechadvisory.com\/blog\/phlo-systems-cyber-security-services-help-address-saas-ctrm-cyber-security-questions\/\",\"name\":\"Phlo Systems Cyber Security Services Help Address SaaS CTRM Cyber Security Questions. | Commodity Technology Advisory\",\"isPartOf\":{\"@id\":\"https:\/\/www.comtechadvisory.com\/#website\"},\"datePublished\":\"2024-04-09T07:04:01+00:00\",\"dateModified\":\"2024-04-09T07:04:01+00:00\",\"description\":\"In the world of SaaS software, security rightly remains a key concern for users and prospective users who want to be certain that their data and systems\",\"breadcrumb\":{\"@id\":\"https:\/\/www.comtechadvisory.com\/blog\/phlo-systems-cyber-security-services-help-address-saas-ctrm-cyber-security-questions\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.comtechadvisory.com\/blog\/phlo-systems-cyber-security-services-help-address-saas-ctrm-cyber-security-questions\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.comtechadvisory.com\/blog\/phlo-systems-cyber-security-services-help-address-saas-ctrm-cyber-security-questions\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.comtechadvisory.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Phlo Systems Cyber Security Services Help Address SaaS CTRM Cyber Security Questions.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.comtechadvisory.com\/#website\",\"url\":\"https:\/\/www.comtechadvisory.com\/\",\"name\":\"Commodity Technology Advisory\",\"description\":\"CTRM Market Insights\",\"publisher\":{\"@id\":\"https:\/\/www.comtechadvisory.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.comtechadvisory.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.comtechadvisory.com\/#organization\",\"name\":\"Commodity Technology Advisory\",\"url\":\"https:\/\/www.comtechadvisory.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.comtechadvisory.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.comtechadvisory.com\/wp-content\/uploads\/2013\/06\/social-square-logo.png\",\"contentUrl\":\"https:\/\/www.comtechadvisory.com\/wp-content\/uploads\/2013\/06\/social-square-logo.png\",\"width\":700,\"height\":700,\"caption\":\"Commodity Technology Advisory\"},\"image\":{\"@id\":\"https:\/\/www.comtechadvisory.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CommodityTechnologyAdvisory\",\"https:\/\/x.com\/comtechadvisory\",\"https:\/\/www.linkedin.com\/company\/2980731\",\"https:\/\/www.youtube.com\/user\/Comtechadvisory\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.comtechadvisory.com\/#\/schema\/person\/280c24085ee23c1322c66042426ee6b9\",\"name\":\"Patrick Reames\",\"url\":\"https:\/\/www.comtechadvisory.com\/author\/preames\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Phlo Systems Cyber Security Services Help Address SaaS CTRM Cyber Security Questions. | Commodity Technology Advisory","description":"In the world of SaaS software, security rightly remains a key concern for users and prospective users who want to be certain that their data and systems","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.comtechadvisory.com\/blog\/phlo-systems-cyber-security-services-help-address-saas-ctrm-cyber-security-questions\/","og_locale":"en_US","og_type":"article","og_title":"Phlo Systems Cyber Security Services Help Address SaaS CTRM Cyber Security Questions. | Commodity Technology Advisory","og_description":"In the world of SaaS software, security rightly remains a key concern for users and prospective users who want to be certain that their data and systems","og_url":"https:\/\/www.comtechadvisory.com\/blog\/phlo-systems-cyber-security-services-help-address-saas-ctrm-cyber-security-questions\/","og_site_name":"Commodity Technology Advisory","article_publisher":"https:\/\/www.facebook.com\/CommodityTechnologyAdvisory","article_published_time":"2024-04-09T07:04:01+00:00","og_image":[{"width":700,"height":700,"url":"https:\/\/www.comtechadvisory.com\/wp-content\/uploads\/2013\/06\/social-square-logo.jpg","type":"image\/jpeg"}],"author":"Patrick Reames","twitter_card":"summary_large_image","twitter_creator":"@comtechadvisory","twitter_site":"@comtechadvisory","twitter_misc":{"Written by":"Patrick Reames","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.comtechadvisory.com\/blog\/phlo-systems-cyber-security-services-help-address-saas-ctrm-cyber-security-questions\/#article","isPartOf":{"@id":"https:\/\/www.comtechadvisory.com\/blog\/phlo-systems-cyber-security-services-help-address-saas-ctrm-cyber-security-questions\/"},"author":{"name":"Patrick Reames","@id":"https:\/\/www.comtechadvisory.com\/#\/schema\/person\/280c24085ee23c1322c66042426ee6b9"},"headline":"Phlo Systems Cyber Security Services Help Address SaaS CTRM Cyber Security Questions.","datePublished":"2024-04-09T07:04:01+00:00","dateModified":"2024-04-09T07:04:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.comtechadvisory.com\/blog\/phlo-systems-cyber-security-services-help-address-saas-ctrm-cyber-security-questions\/"},"wordCount":215,"publisher":{"@id":"https:\/\/www.comtechadvisory.com\/#organization"},"articleSection":["Blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.comtechadvisory.com\/blog\/phlo-systems-cyber-security-services-help-address-saas-ctrm-cyber-security-questions\/","url":"https:\/\/www.comtechadvisory.com\/blog\/phlo-systems-cyber-security-services-help-address-saas-ctrm-cyber-security-questions\/","name":"Phlo Systems Cyber Security Services Help Address SaaS CTRM Cyber Security Questions. | Commodity Technology Advisory","isPartOf":{"@id":"https:\/\/www.comtechadvisory.com\/#website"},"datePublished":"2024-04-09T07:04:01+00:00","dateModified":"2024-04-09T07:04:01+00:00","description":"In the world of SaaS software, security rightly remains a key concern for users and prospective users who want to be certain that their data and systems","breadcrumb":{"@id":"https:\/\/www.comtechadvisory.com\/blog\/phlo-systems-cyber-security-services-help-address-saas-ctrm-cyber-security-questions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.comtechadvisory.com\/blog\/phlo-systems-cyber-security-services-help-address-saas-ctrm-cyber-security-questions\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.comtechadvisory.com\/blog\/phlo-systems-cyber-security-services-help-address-saas-ctrm-cyber-security-questions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.comtechadvisory.com\/"},{"@type":"ListItem","position":2,"name":"Phlo Systems Cyber Security Services Help Address SaaS CTRM Cyber Security Questions."}]},{"@type":"WebSite","@id":"https:\/\/www.comtechadvisory.com\/#website","url":"https:\/\/www.comtechadvisory.com\/","name":"Commodity Technology Advisory","description":"CTRM Market Insights","publisher":{"@id":"https:\/\/www.comtechadvisory.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.comtechadvisory.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.comtechadvisory.com\/#organization","name":"Commodity Technology Advisory","url":"https:\/\/www.comtechadvisory.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.comtechadvisory.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.comtechadvisory.com\/wp-content\/uploads\/2013\/06\/social-square-logo.png","contentUrl":"https:\/\/www.comtechadvisory.com\/wp-content\/uploads\/2013\/06\/social-square-logo.png","width":700,"height":700,"caption":"Commodity Technology Advisory"},"image":{"@id":"https:\/\/www.comtechadvisory.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CommodityTechnologyAdvisory","https:\/\/x.com\/comtechadvisory","https:\/\/www.linkedin.com\/company\/2980731","https:\/\/www.youtube.com\/user\/Comtechadvisory"]},{"@type":"Person","@id":"https:\/\/www.comtechadvisory.com\/#\/schema\/person\/280c24085ee23c1322c66042426ee6b9","name":"Patrick Reames","url":"https:\/\/www.comtechadvisory.com\/author\/preames\/"}]}},"_links":{"self":[{"href":"https:\/\/www.comtechadvisory.com\/wp-json\/wp\/v2\/posts\/18037"}],"collection":[{"href":"https:\/\/www.comtechadvisory.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.comtechadvisory.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.comtechadvisory.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.comtechadvisory.com\/wp-json\/wp\/v2\/comments?post=18037"}],"version-history":[{"count":0,"href":"https:\/\/www.comtechadvisory.com\/wp-json\/wp\/v2\/posts\/18037\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.comtechadvisory.com\/wp-json\/wp\/v2\/media?parent=18037"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.comtechadvisory.com\/wp-json\/wp\/v2\/categories?post=18037"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.comtechadvisory.com\/wp-json\/wp\/v2\/tags?post=18037"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}