Welcome!

@CloudExpo Authors: Pat Romanski, Yeshim Deniz, Carmen Gonzalez, Elizabeth White, Kevin Benedict

Related Topics: @CloudExpo, Microservices Expo

@CloudExpo: Article

Why SaaS and ISVs Clash

What ISVs need to remember as they plan their SaaS strategies

Interest in cloud-based applications continues apace, but hosting can be a complicated endeavor for ISVs.

The enduring popularity of Software-as-a-service (SaaS) isn't accidental. Whether you're a technology reseller or a traditional enterprise, there's a lot to like about the use of a service model for software delivery, including low monthly cost, fast time-to-market and few deployment hiccups. But SaaS does not reward all organizations equally.

Unfortunately for ISVs, who fall on the 'delivery' side of the service-delivery relationship, the benefits of SaaS are tempered by risks. The nature of being an ISV complicates many decisions about technology and some of these will be amplified when ISVs move toward SaaS delivery. In order to make a smooth transition, ISVs must develop a strategy in full recognition of these unique challenges.

ISVs Are Different
Business has never been a one-size-fits-all proposition. The software industry is no exception. Simply put, ISVs have challenges that other companies don't. Here's a few of the ways in which ISVs are different:

  1. They must anticipate what customers will want and try to accommodate as many of these options as possible. Narrow solutions yield limited revenue.
  2. They must be prepared to accommodate special changes and customization, especially from high-value accounts.
  3. Because solutions frequently transact data from many different customers (and those customers are often close competitors), ISVs must pay extra heed to security to vouchsafe data seclusion.
  4. They must be sure that the technologies they use will be relevant and supportable indefinitely.

Enterprises, which can concentrate on consuming technology rather than provisioning it, can usually absorb the consequences of the occasional short-sighted decision without too much pain. Rewriting an ill-conceived software application is something they can do behind the scenes, while treading water with the sub-optimal system in the meantime. They can even decide to outsource that function on a temporary basis.

ISVs, on the other hand, can rarely afford to back pedal their technology choices. A full rewrite of any customer-facing software system means taking their foot off the gas, the impact of which goes straight to the bottom line. Worse, there is little way to obscure such mistakes from the notice of customers. When ISVs guess wrong about technology, both short-term revenue and long-term reputation are equally at risk. And not everyone will get the opportunity to recoup those losses.

Into the Cloud
The unique challenges faced by ISVs are not new and most ISV executives are well aware of them. But as market pressure and customer demand for SaaS-based applications increase, it can be easy to lose sight of the importance of planning a strategy with these challenges in mind.

Most ISVs are struggling to get to market quickly so they can keep pace with early competitors. With time short, architectural decision planning is curtailed. And the desire to avoid taking on unfamiliar technical competencies, such as server management, become important decision criteria. As a result, the driving importance of customer concerns, such as functionality and customization, as well as control and flexibility over central business assets is being compromised.

Finally, there are new entanglements that arise with hosting, many of which directly conflict with the pressure on ISVs to make broad, inclusive architectural choices. These include:

  • Physical location of data: Many customers will be subject to regulatory or policy requirements related to the physical storage of data. For example, they may require storage only within national boundaries or to be able to identify the exact server machines where data is stored. For the organizations that have them, these requirements are deal-breakers.
  • Security of data in shared databases: Traditional installed applications have naturally isolated data repositories, and thus do not pose the same risk that data could be leaked outside of the organization. Shared storage architectures are simply too risky for some customers.
  • Limitations on customization: Customers will not cease to request customizations simply because their application has moved to the cloud. Will your new infrastructure support your need to customize applications and databases on a customer-by-customer basis? If you don't do it, a competitor will.
  • Supplier vulnerability: ISVs choose suppliers and technologies carefully to minimize their risk exposure to deprecation or loss of support. It may be tempting to choose a cloud infrastructure provider such as Salesforce Force.com or Microsoft Azure in order to keep from absorbing expensive new burdens related to data center maintenance, but these platforms are outside of your control. Hinging your revenue on the indefinite cooperation and success of a third party may be unnecessarily reckless.

Caution and Control
There is much to love about being in the business of helping companies solve their technology problems but, sadly, ISVs have precious little freedom to experiment. They must exercise extraordinary caution when changing tactics. The move toward SaaS-based application delivery is without question one of those times. Those that move ahead on a SaaS initiative without being mindful of the challenges will put key customers and future revenue at risk.

As you move applications to the cloud, give yourself ample time now to choose the architectures, technologies and suppliers that will help you maintain both flexibility and consummate control of your business.

More Stories By Eric Farrar

Eric Farrar is a senior product manager at Sybase, an SAP company, working on the SQL Anywhere embedded database. He is focused on bringing the power of embedded database technology into the new world of the web, and cloud computing environments.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@CloudExpo Stories
@DevOpsSummit at Cloud taking place June 6-8, 2017, at Javits Center, New York City, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long developm...
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
"This is specifically designed to accommodate some of the needs for high availability and failover in a network managed system for the major Korean corporations," stated Thomas Masters, Managing Director at InfranicsUSA, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Infrastructure is widely available, but who’s managing inbound/outbound traffic? Data is created, stored, and managed online – who is protecting it and how? In his session at 19th Cloud Expo, Jaeson Yoo, SVP of Business Development at Penta Security Systems Inc., discussed how to keep any and all infrastructure clean, safe, and efficient by monitoring and filtering all malicious HTTP/HTTPS traffic at the OSI Layer 7. Stop attacks and web intruders before they can enter your network.
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smar...
Regulatory requirements exist to promote the controlled sharing of information, while protecting the privacy and/or security of the information. Regulations for each type of information have their own set of rules, policies, and guidelines. Cloud Service Providers (CSP) are faced with increasing demand for services at decreasing prices. Demonstrating and maintaining compliance with regulations is a nontrivial task and doing so against numerous sets of regulatory requirements can be daunting task...
Get deep visibility into the performance of your databases and expert advice for performance optimization and tuning. You can't get application performance without database performance. Give everyone on the team a comprehensive view of how every aspect of the system affects performance across SQL database operations, host server and OS, virtualization resources and storage I/O. Quickly find bottlenecks and troubleshoot complex problems.
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
"We build IoT infrastructure products - when you have to integrate different devices, different systems and cloud you have to build an application to do that but we eliminate the need to build an application. Our products can integrate any device, any system, any cloud regardless of protocol," explained Peter Jung, Chief Product Officer at Pulzze Systems, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
The cloud promises new levels of agility and cost-savings for Big Data, data warehousing and analytics. But it’s challenging to understand all the options – from IaaS and PaaS to newer services like HaaS (Hadoop as a Service) and BDaaS (Big Data as a Service). In her session at @BigDataExpo at @ThingsExpo, Hannah Smalltree, a director at Cazena, provided an educational overview of emerging “as-a-service” options for Big Data in the cloud. This is critical background for IT and data professionals...
Internet of @ThingsExpo has announced today that Chris Matthieu has been named tech chair of Internet of @ThingsExpo 2017 New York The 7th Internet of @ThingsExpo will take place on June 6-8, 2017, at the Javits Center in New York City, New York. Chris Matthieu is the co-founder and CTO of Octoblu, a revolutionary real-time IoT platform recently acquired by Citrix. Octoblu connects things, systems, people and clouds to a global mesh network allowing users to automate and control design flo...
You are moving to the Cloud. The question is not if, it’s when. Now that your competitors are in the cloud and lapping you, your “when” better hurry up and get here. But saying and doing are two different things. In his session at @DevOpsSummit at 18th Cloud Expo, Robert Reeves, CTO of Datical, explained how DevOps can be your onramp to the cloud. By adopting simple, platform independent DevOps strategies, you can accelerate your move to the cloud. Spoiler Alert: He also makes sure you don’t...
President Obama recently announced the launch of a new national awareness campaign to "encourage more Americans to move beyond passwords – adding an extra layer of security like a fingerprint or codes sent to your cellphone." The shift from single passwords to multi-factor authentication couldn’t be timelier or more strategic. This session will focus on why passwords alone are no longer effective, and why the time to act is now. In his session at 19th Cloud Expo, Chris Webber, security strateg...
"We are an all-flash array storage provider but our focus has been on VM-aware storage specifically for virtualized applications," stated Dhiraj Sehgal of Tintri in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
The WebRTC Summit New York, to be held June 6-8, 2017, at the Javits Center in New York City, NY, announces that its Call for Papers is now open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 20th International Cloud Expo and @ThingsExpo. WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web co...
Redis is not only the fastest database, but it has become the most popular among the new wave of applications running in containers. Redis speeds up just about every data interaction between your users or operational systems. In his session at 18th Cloud Expo, Dave Nielsen, Developer Relations at Redis Labs, shared the functions and data structures used to solve everyday use cases that are driving Redis' popularity.
Enterprise IT has been in the era of Hybrid Cloud for some time now. But it seems most conversations about Hybrid are focused on integrating AWS, Microsoft Azure, or Google ECM into existing on-premises systems. Where is all the Private Cloud? What do technology providers need to do to make their offerings more compelling? How should enterprise IT executives and buyers define their focus, needs, and roadmap, and communicate that clearly to the providers?
Amazon has gradually rolled out parts of its IoT offerings, but these are just the tip of the iceberg. In addition to optimizing their backend AWS offerings, Amazon is laying the ground work to be a major force in IoT - especially in the connected home and office. In his session at @ThingsExpo, Chris Kocher, founder and managing director of Grey Heron, explained how Amazon is extending its reach to become a major force in IoT by building on its dominant cloud IoT platform, its Dash Button strat...
"We are a custom software development, engineering firm. We specialize in cloud applications from helping customers that have on-premise applications migrating to the cloud, to helping customers design brand new apps in the cloud. And we specialize in mobile apps," explained Peter Di Stefano, Vice President of Marketing at Impiger Technologies, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...