Other Business Systems Admin/Salesforce Admin

  • Monthly Cloud Security Roundup: The Capital One Data Breach, CCPA’s Influence on US Privacy Laws, and More

    Monthly Cloud Security Roundup: The Capital One Data Breach, CCPA’s Influence on US Privacy Laws, and More

    Each month, we’ll bring you some of the most compelling cloud and Salesforce security-related stories from the last four weeks. In this post, we discuss the Capital One data breach, British...

    Read
  • Learn How to Monitor Salesforce User Activity in Real Time

    Watch Now
  • Should You Build or Buy a Salesforce Data Protection Solution?

    Find Out Now
  • Cloud Security Tools: Selecting the Right Solutions and the Right Vendors

    Cloud Security Tools: Selecting the Right Solutions and the Right Vendors

    According to IDG’s 2018 Cloud Computing Survey, 89% of companies use Software as a Service (SaaS). With the use of cloud computing increasing every year, challenges have arisen that are unique to...

    Read
  • Uncovering the Value of Salesforce Event Monitoring Logs

    Uncovering the Value of Salesforce Event Monitoring Logs

    Have you ever wanted to know what your Salesforce users are clicking on? Have you ever needed to know what files your employees are downloading? Normally, uncovering this information is...

    Read
  • ×

    All the Latest Cloud Security and Privacy News, in Your Inbox

    First Name
    Last Name
    Company Name
    Thank you!
    Error - something went wrong!
  • Insider Threat Mitigation: 5 Best Practices from Cybersecurity Experts

    Insider Threat Mitigation: 5 Best Practices from Cybersecurity Experts

    Cybersecurity experts Jeffrey DiMuro, Salesforce’s Chief Security and Compliance Architect for Financial Service Industry Team, and Josh Hofer, Stearns Bank’s Chief Risk and Information Security...

    Read
  • How Are Salesforce Customers Building a Reputation of Trust?

    Find Out Now...
  • Are Insider Threats Lurking in Your Financial Organization? How to Identify and Mitigate Risks in Salesforce and Beyond46:24

    Are Insider Threats Lurking in Your Financial Organization? How to Identify and Mitigate Risks in Salesforce and Beyond

    Are insider threats lurking in your financial organization? You might be surprised. This webinar will show you how to identify and mitigate risks in Salesforce and beyond.

    Watch
  • Real-Time Event Monitoring: What’s New in Salesforce’s Summer 2019 Product Release

    Real-Time Event Monitoring: What’s New in Salesforce’s Summer 2019 Product Release

    Eagerly anticipated by Salesforce users every season, the newest product release for 2019 brings exciting updates for Salesforce’s Event Monitoring tool. Primarily used to gain visibility in...

    Read
  • Monthly Cloud Security Roundup: The Debut of Salesforce Blockchain, Equifax’s $1.4B Breach Costs, and More

    Monthly Cloud Security Roundup: The Debut of Salesforce Blockchain, Equifax’s $1.4B Breach Costs, and More

    Each month, we’ll bring you a few of the most compelling cloud and Salesforce security-related stories from the last four weeks. In this post, we discuss the debut of Salesforce Blockchain, zero...

    Read
  • You Just Bought Shield: Now What? A Salesforce Shield Implementation Guide for Admins

    You Just Bought Shield: Now What? A Salesforce Shield Implementation Guide for Admins

    Now that you’ve chosen Salesforce Shield – a set of point-and-click tools for maximizing your Salesforce security, meeting regulatory compliance, improving CRM usage and adoption, and safeguarding...

    Read
  • 5 Questions Banks Should Ask When Evaluating Cloud-Based Security Solutions

    5 Questions Banks Should Ask When Evaluating Cloud-Based Security Solutions

    When banks move to the cloud, the top challenges are a) security and b) regulatory compliance. Evaluating cloud-based security solutions for financial institutions is something that calls for...

    Read
  • Monthly Cloud Security Roundup: Facebook’s FTC Charges, iOS Malvertising Attacks, and More

    Monthly Cloud Security Roundup: Facebook’s FTC Charges, iOS Malvertising Attacks, and More

    Each month, we’ll bring you some of the most compelling cloud and Salesforce security-related stories from the last four weeks. In this post, we discuss Facebook’s FTC charges, iOS malvertising...

    Read
  • What is Einstein Analytics? A Closer Look at Salesforce’s Visibility Tool

    What is Einstein Analytics? A Closer Look at Salesforce’s Visibility Tool

    In June 2017, the world’s #1 CRM platform, Salesforce, released their newly rebranded analytics tools for viewing data – Einstein Analytics (formerly known as “Wave”). Many who use the platform...

    Read
  • Monthly Cloud Security Roundup: The Top Cybersecurity Threat to the U.S. and More

    Monthly Cloud Security Roundup: The Top Cybersecurity Threat to the U.S. and More

    Each month, we’ll bring you some of the most compelling cloud and Salesforce security-related stories from the last four weeks. In this post, we discuss Facebook’s exposed passwords and more.

    Read
  • Canadian Data Privacy Laws, Security Frameworks, and Cloud Compliance

    Canadian Data Privacy Laws, Security Frameworks, and Cloud Compliance

    In an increasingly digital world, personal information is becoming harder to protect. In response, many countries have developed and enacted privacy laws to strike a balance between information...

    Read
  • The Admin’s Guide to Salesforce Visibility: Using Event Monitoring to Boost ROI, Productivity

    The Admin’s Guide to Salesforce Visibility: Using Event Monitoring to Boost ROI, Productivity

    Salesforce has quickly become a mission-critical application for organizations of all types. The great news for admins is that Salesforce visibility can show you not only how users are adopting...

    Read
  • 4 More Salesforce Event Monitoring Myths: Understanding What Event Monitoring Does (and Doesn’t) Do

    4 More Salesforce Event Monitoring Myths: Understanding What Event Monitoring Does (and Doesn’t) Do

    One of the biggest challenges customers face when they want to leverage and maximize the value of Salesforce Shield’s Event Monitoring is understanding the basic controls. In order to use the...

    Read
  • Build or Buy Cloud Security: 5 Key Insights for Choosing a Solution from Salesforce and PURE Insurance Tech Leaders

    Build or Buy Cloud Security: 5 Key Insights for Choosing a Solution from Salesforce and PURE Insurance Tech Leaders

    In order to build trust and meet compliance standards, it’s essential for financial services firms to protect and secure sensitive data. But it’s not always simple to implement a security...

    Read
  • California Consumer Privacy Act of 2018: Everything You Need to Know About the New California Data Protection Law

    California Consumer Privacy Act of 2018: Everything You Need to Know About the New California Data Protection Law

    The California Consumer Privacy Act of 2018 (CaCPA) seemed to appear out of nowhere as it passed the desk of Gov. Jerry Brown. Since we’d be hard pressed to find a business that doesn’t somehow...

    Read
  • 3 Salesforce Event Monitoring Facts and Misconceptions: Understanding What it Does (and Doesn’t) Do

    3 Salesforce Event Monitoring Facts and Misconceptions: Understanding What it Does (and Doesn’t) Do

    A key component of the Salesforce Shield security suite, Event Monitoring allows organizations to boost data security and improve forensic investigations within their Salesforce orgs. Thousands of...

    Read
  • The Hidden Threat in Your Organization: Preventing Privileged User Abuse In Salesforce

    The Hidden Threat in Your Organization: Preventing Privileged User Abuse In Salesforce

    Read
  • Build vs. Buy Cloud Security Software: 4 Must-Ask Questions During the Decision-Making Process

    Build vs. Buy Cloud Security Software: 4 Must-Ask Questions During the Decision-Making Process

    Balancing an organization’s immediate needs while considering long-term growth can be challenging, especially when deciding whether to build vs. buy cloud security software. Cloud solutions can...

    Read
  • loading
    Loading More...