Privileged users

  • Cloud Security Tools: Selecting the Right Solutions and the Right Vendors

    Cloud Security Tools: Selecting the Right Solutions and the Right Vendors

    According to IDG’s 2018 Cloud Computing Survey, 89% of companies use Software as a Service (SaaS). With the use of cloud computing increasing every year, challenges have arisen that are unique to...

    Read
  • Insider Threat Mitigation: 5 Best Practices from Cybersecurity Experts

    Insider Threat Mitigation: 5 Best Practices from Cybersecurity Experts

    Cybersecurity experts Jeffrey DiMuro, Salesforce’s Chief Security and Compliance Architect for Financial Service Industry Team, and Josh Hofer, Stearns Bank’s Chief Risk and Information Security...

    Read
  • Managing the Privileged User Threat: Best Practices for Salesforce

    Read the Guide
  • Are Insider Threats Lurking in Your Financial Organization? How to Identify and Mitigate Risks in Salesforce and Beyond46:24

    Are Insider Threats Lurking in Your Financial Organization? How to Identify and Mitigate Risks in Salesforce and Beyond

    Are insider threats lurking in your financial organization? You might be surprised. This webinar will show you how to identify and mitigate risks in Salesforce and beyond.

    Watch
  • You Just Bought Shield: Now What? A Salesforce Shield Implementation Guide for Admins

    You Just Bought Shield: Now What? A Salesforce Shield Implementation Guide for Admins

    Now that you’ve chosen Salesforce Shield – a set of point-and-click tools for maximizing your Salesforce security, meeting regulatory compliance, improving CRM usage and adoption, and safeguarding...

    Read
  • The 6 Elements Every Financial Institution Needs for Defense-in-Depth Security

    The 6 Elements Every Financial Institution Needs for Defense-in-Depth Security

    In the same way that medieval castles were designed with multiple security layers for protection, today’s organizations require a multifaceted approach to safeguarding highly sensitive data....

    Read
  • The Admin’s Guide to Salesforce Visibility: Using Event Monitoring to Boost ROI, Productivity

    The Admin’s Guide to Salesforce Visibility: Using Event Monitoring to Boost ROI, Productivity

    Salesforce has quickly become a mission-critical application for organizations of all types. The great news for admins is that Salesforce visibility can show you not only how users are adopting...

    Read
  • 4 More Salesforce Event Monitoring Myths: Understanding What Event Monitoring Does (and Doesn’t) Do

    4 More Salesforce Event Monitoring Myths: Understanding What Event Monitoring Does (and Doesn’t) Do

    To get the most value from Salesforce Event Monitoring, you must know what the tool does and doesn't do. Uncover the myths and facts and obtain more information by reading this post.

    Read
  • Build or Buy Cloud Security: 5 Key Insights for Choosing a Solution from Salesforce and PURE Insurance Tech Leaders

    Build or Buy Cloud Security: 5 Key Insights for Choosing a Solution from Salesforce and PURE Insurance Tech Leaders

    In order to build trust and meet compliance standards, it’s essential for financial services firms to protect and secure sensitive data. But it’s not always simple to implement a security...

    Read
  • 3 Salesforce Event Monitoring Facts and Misconceptions: Understanding What it Does (and Doesn’t) Do

    3 Salesforce Event Monitoring Facts and Misconceptions: Understanding What it Does (and Doesn’t) Do

    Salesforce Event Monitoring is the only way to obtain your Salesforce user activity log files...true or false? Explore common myths about Event Monitoring in this eye-opening blog post.

    Read
  • 2018 Cloud Visibility Report

    2018 Cloud Visibility Report

    Dive into the 2018 Cloud Visibility Report to discover what top organizations are monitoring in their cloud applications like Salesforce, Office 365, Dropbox, and more.

    Read
  • The Hidden Threat in Your Organization: Preventing Privileged User Abuse In Salesforce

    The Hidden Threat in Your Organization: Preventing Privileged User Abuse In Salesforce

    Read
  • Build vs. Buy Cloud Security Software: 4 Must-Ask Questions During the Decision-Making Process

    Build vs. Buy Cloud Security Software: 4 Must-Ask Questions During the Decision-Making Process

    Balancing an organization’s immediate needs while considering long-term growth can be challenging, especially when deciding whether to build vs. buy cloud security software. Cloud solutions can...

    Read
  • Why Financial Services Companies Are Monitoring for Changes to Salesforce Permission Sets, Profiles

    Why Financial Services Companies Are Monitoring for Changes to Salesforce Permission Sets, Profiles

    Salesforce’s flexible, layered data sharing model means you can dictate which data, objects, and fields users see, through Salesforce permission sets and profiles. Some companies take a blanket...

    Read
  • 2018 Year in Review: Readers’ 10 Favorite Cloud Security Blog Posts

    2018 Year in Review: Readers’ 10 Favorite Cloud Security Blog Posts

    The readers have spoken! Explore the top ten favorite cloud security blog posts of 2018 and learn more about industry trends in this roundup blog.

    Read
  • 5 Business Benefits of Monitoring Salesforce Login Activity

    5 Business Benefits of Monitoring Salesforce Login Activity

    What are the top 5 business benefits of monitoring Salesforce login activity? You might catch someone logging in when they shouldn't be and stealing data. Find out more in this post.

    Read
  • 4 Things You Can Quickly Learn From Monitoring Salesforce Data Exports

    4 Things You Can Quickly Learn From Monitoring Salesforce Data Exports

    What can monitoring Salesforce data exports tell you? For one, the user might be departing your organization soon. Find out other insights you can learn from monitoring in this post.

    Read
  • Complying with Privileged User Regulations: How One Firm Met GDPR, ISO 27001 in Salesforce

    Complying with Privileged User Regulations: How One Firm Met GDPR, ISO 27001 in Salesforce

    Securing personal data is at the core of the EU's General Data Protection Regulation (GDPR). Cloud applications, and Salesforce in particular, are rife with personal data. And while Articles 25...

    Read
  • What to Monitor in the Cloud: 2018 Cloud Visibility Report Reveals Blueprint to Success

    What to Monitor in the Cloud: 2018 Cloud Visibility Report Reveals Blueprint to Success

    Cloud spending is forecasted to reach $160 billion in 2018 – a 23.2 percent increase over 2017. Businesses around the globe are capturing the benefits of cloud technology to meet consumer demand...

    Read
  • Privileged Users in Salesforce: What Can They Access?

    Privileged Users in Salesforce: What Can They Access?

    Privileged user abuse may be malicious, or it may be unintentional. Either way, it represents a huge liability to your company. The two main areas of concern with privileged user abuse in...

    Read
  • IBM Released Its 2018 Data Breach Study — and Financial Services and Healthcare Organizations are Taking Note to Maintain Customer Trust

    IBM Released Its 2018 Data Breach Study — and Financial Services and Healthcare Organizations are Taking Note to Maintain Customer Trust

    IBM and Ponemon’s latest Cost of a Data Breach Report illustrates the dauntingly true cost of a data breach to an organization, from direct financial impact to reputational damage and churn. Below...

    Read
  • loading
    Loading More...