
Other IT Director
-
FairWarning for Salesforce: Detect Risk, Interpret User Behaviors, and Investigate Salesforce Threats in Real Time
FairWarning for Salesforce is a user activity monitoring and alerting solution that helps you interpret and leverage Salesforce Shield Event Monitoring with clicks, not code.
-
Discover Why Data Privacy Matters to Your Organization
Watch Now -
Secure Your Remote Workforce and Salesforce Data
Learn How -
Defense In Depth: How to Secure Your Organization from the Inside Out
A defense in depth approach to security is vital for establishing trust, maintaining compliance, and securing sensitive data. Learn how to secure your organization from the inside out in this e-book.
-
Cloud Security Roundup: New Guidelines for Zero Trust Architecture, the Cost of Cybercrime, and More
Discover the latest cloud security news, including new zero trust architecture guidelines, CISO priorities, the cost of cybercrime, and more.
-
Securing a Remote Workforce: How to Protect Your At-Risk Salesforce Data
This whitepaper explores a number of remote work scenarios that are cause for concern in Salesforce. Read on to learn the red flags and how to mitigate threats to your sensitive Salesforce data.
-
Privileged User Monitoring: 5 Ways to Prevent Privileged User Abuse in Salesforce
By using privileged user activity monitoring, you can prevent insider threats like privileged user abuse in Salesforce.
-
5 Reasons Why Privileged User Abuse is a Top Security Concern in the Cloud
Data security should prevent external attacks and insider threats because privileged user abuse is a top concern in the cloud. Find out more about preventing insider abuse in this article.
-
The Top 13 Signs Your Employee Is About to Quit
Departing employees can create a lot of challenges for an organization. So what are the signs your employee is about to quit?
-
Securing Your Sensitive Information in Salesforce: Data Protection and Security for Cloud
Salesforce data protection and security are critical for cloud apps. Protect information from insider threats with FairWarning Cloud Security.
-
Monthly Cloud Security Roundup: The Worst State for Online Privacy, the Adobe Data Breach, Russian Hackers Targeting the Olympics, and More
Discover the latest in cloud security news with October’s roundup, including Adobe’s data breach, the worst state for online privacy, and more.
-
California Consumer Privacy Act: Everything You Need to Know About CCPA, the New California Data Privacy Law
The California Consumer Privacy Act of 2018 (CCPA) seemed to appear out of nowhere. Here's a comprehensive guide to the California data privacy law.
-
Departing Employees May Exit Your Building — But Have They Truly Left Your Organization?
Departing employees are a major source of risk for organizations. Evaluate the strength of your company’s offboarding process with this blog post.
-
8 Takeaways from the 2019 Cost of a Data Breach Report
Discover eight of the top takeaways from the recent 2019 Cost of a Data Breach Report from IBM and Ponemon Institute in this blog post.
-
Cloud Data Compliance and Security – Achieving Regulatory Compliance with Cloud Security Applications
Security and privacy may lead the pack when it comes to cloud usage, but cloud data compliance is an important area that often goes overlooked.
-
Unlock the Potential of Salesforce: Expand Trust, Privacy, and Cloud Application Security
Discover how to unlock the full potential of Salesforce to help you expand trust, privacy, and cloud application security at your organization.
-
Aligning Cloud Security and Privacy Tactics to Meet Cloud Compliance
The cloud has come a long way since its introduction, as have the tactics used to establish compliance, security, and privacy. So what’s changed? Find out in this post.
-
6 Independent Third-Party Sources for Vetting Cloud Security Vendors
How do you choose which vendors are doing their due diligence and offering you the most value? Trust these independent third-party sources when vetting cloud security vendors.
-
Cloud Security Tools: Selecting the Right Solutions and the Right Vendors
In this post, we highlight the five most effective cloud security vendor solutions that thwart the type of malicious activity that threatens the safety of your data.
-
Eliminating the Insider Threat: Mitigating Internal Risks Within Your Organization
Discover best practices for mitigating internal risks in your organization, red flags to watch out for, top solutions for eliminating security vulnerabilities, and more in this e-book.
-
Insider Threat Mitigation: 5 Best Practices from Cybersecurity Experts
Cybersecurity experts Jeffrey DiMuro, Salesforce’s Chief Security and Compliance Architect for Financial Service Industry Team, and Josh Hofer, Stearns Bank’s Chief Risk and Information Security...
-
You Just Bought Shield: Now What? A Salesforce Shield Implementation Guide for Admins
Now that you’ve chosen Salesforce Shield – a set of point-and-click tools for maximizing your Salesforce security, meeting regulatory compliance, improving CRM usage and adoption, and safeguarding...
-
Loading More...

