{"id":202,"date":"2009-02-19T00:00:00","date_gmt":"2009-02-19T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2009\/02\/19\/gartner-dont-assume-saas-is-cheaper\/"},"modified":"2021-12-30T11:36:43","modified_gmt":"2021-12-30T11:36:43","slug":"gartner-dont-assume-saas-is-cheaper","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2009\/02\/19\/gartner-dont-assume-saas-is-cheaper\/","title":{"rendered":"Gartner: Don&#8217;t assume SaaS is cheaper"},"content":{"rendered":"<p>The analyst firm said that there has been a &#8220;great deal of hype&#8221; around SaaS and that businesses had misconceptions about its cost.  SaaS is cheaper during its first two years of use, Gartner said, but the total cost of ownership over five years would be lower for on-premises software.  In its report &#8220;Fact-Checking: The Five Most-Common SaaS Assumptions,&#8221; Gartner also warned that SaaS was not necessarily faster to implement.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>But data could be initially loaded to the SaaS application, then updated regularly or updated in real time using Web services.<\/p>\n<p>In addition, Gartner said, businesses need to remember that SaaS applications can be customized and are no longer only for basic functions.<\/p>\n<p>http:\/\/www.computerworld.com\/action\/article.do?command=viewArticleBasic&#038;articleId=9128347&#038;source=NLT_PM<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-202","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/202","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=202"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/202\/revisions"}],"predecessor-version":[{"id":2689,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/202\/revisions\/2689"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=202"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=202"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=202"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}