Salesforce security

  • How FairWarning for Salesforce Works

    How FairWarning for Salesforce Works

    Learn how FairWarning for Salesforce translates Shield Event Monitoring log files into user-friendly, leverageable insights that transform your Salesforce data security, compliance, and governance.

    Read
  • Cloud Security Roundup: Salesforce Buys Slack, Top Cybersecurity Threats, CPRA Amends CCPA, and More

    Cloud Security Roundup: Salesforce Buys Slack, Top Cybersecurity Threats, CPRA Amends CCPA, and More

    Discover the latest cloud security news, including, Salesforce’s purchase of Slack, the top cybersecurity threats, CPRA, and more.

    Read
  • FairWarning for Salesforce: Detect Risk, Interpret User Behaviors, and Investigate Salesforce Threats in Real Time

    FairWarning for Salesforce: Detect Risk, Interpret User Behaviors, and Investigate Salesforce Threats in Real Time

    FairWarning for Salesforce is a user activity monitoring and alerting solution that helps you interpret and leverage Salesforce Shield Event Monitoring with clicks, not code.

    Read
  • Covering All Bases - See Proactive and Reactive Salesforce Data Security Solutions56:20

    Covering All Bases - See Proactive and Reactive Salesforce Data Security Solutions

    Are your Salesforce data security bases covered? Learn how to proactively manage data user access and quickly react if the worst happens in this on-demand video.

    Watch
  • How Are Salesforce Customers Building a Reputation of Trust?

    Find Out Now...
  • Get a Complimentary Salesforce Data Risk Assessment

    Uncover Risk Now
  • 11 Salesforce Data Security Threats Uncovered by Risk Assessments

    11 Salesforce Data Security Threats Uncovered by Risk Assessments

    Discover 11 Salesforce data security threats organizations discovered with real findings from FairWarning's Salesforce data risk assessments.

    Read
  • Managing the Privileged User Threat: Best Practices for Salesforce

    Read the Guide
  • Defense In Depth: How to Secure Your Organization from the Inside Out

    Defense In Depth: How to Secure Your Organization from the Inside Out

    A defense in depth approach to security is vital for establishing trust, maintaining compliance, and securing sensitive data. Learn how to secure your organization from the inside out in this e-book.

    Read
  • The New Normal: Navigating Workforce Management in your Salesforce Environment28:06

    The New Normal: Navigating Workforce Management in your Salesforce Environment

    Digital transformation isn't new, but it's become a higher priority, particularly where security is concerned. Learn how to manage the "new normal" to protect sensitive data in this webinar.

    Watch
  • Safeguarding PHI in Salesforce to Meet HIPAA Compliance38:28

    Safeguarding PHI in Salesforce to Meet HIPAA Compliance

    Find out the three things you need to do to protect PHI in Salesforce and how to meet HIPAA compliance in the on-demand session: Safeguarding PHI in Salesforce to Meet HIPAA Compliance.

    Watch
  • Should You Build or Buy a Salesforce Data Protection Solution?

    Find Out Now
  • Monthly Cloud Security Roundup: Hybrid Cloud Security Challenges, Vermont’s Updated Data Breach Law, Zoom’s New CISO, And More

    Monthly Cloud Security Roundup: Hybrid Cloud Security Challenges, Vermont’s Updated Data Breach Law, Zoom’s New CISO, And More

    Discover the latest cloud security news, including hybrid cloud security challenges, Vermont’s updated data breach law, Zoom’s new CISO, and more.

    Read
  • Reduce Risk Through a Holistic Approach to Salesforce Data Governance

    Reduce Risk Through a Holistic Approach to Salesforce Data Governance

    To help you evaluate and accelerate the implementation of Salesforce security controls with premier solutions, this whitepaper covers how to utilize a shared security responsibility model and more.

    Read
  • How to Overcome Unprecedented Business Challenges Using Salesforce

    How to Overcome Unprecedented Business Challenges Using Salesforce

    With Salesforce, you can take times of change and turn them into opportunities. This whitepaper offers ways to establish a robust infrastructure, cut costs, and secure data using Salesforce.

    Read
  • Securing a Remote Workforce: How to Protect Your At-Risk Salesforce Data

    Securing a Remote Workforce: How to Protect Your At-Risk Salesforce Data

    This whitepaper explores a number of remote work scenarios that are cause for concern in Salesforce. Read on to learn the red flags and how to mitigate threats to your sensitive Salesforce data.

    Read
  • Secure Your Remote Workforce and Salesforce Data

    Learn How
  • Remote Workforce Management for your Salesforce Environment Part II53:56

    Remote Workforce Management for your Salesforce Environment Part II

    In this townhall session, FairWarning and RevCult discuss monitoring for anomalous events and Salesforce platform security controls for remote workforce management.

    Watch
  • Remote Workforce Management for your Salesforce Environment57:07

    Remote Workforce Management for your Salesforce Environment

    This townhall Q&A provides InfoSec & Compliance professionals with timely advice and best practices for securely enabling an expanding, remote workforce who is working with sensitive Salesforce data.

    Watch
  • Securing a Remote Workforce: Learn How to Protect Your At-Risk Salesforce Data

    Securing a Remote Workforce: Learn How to Protect Your At-Risk Salesforce Data

    If you’re switching to a remote work environment, you’ll need to know about securing a remote workforce for maximum data security.

    Read
  • Monthly Cloud Security Roundup: The Least Secure Industry (According to Hackers), the Cybersecurity Skills Shortage, and More

    Monthly Cloud Security Roundup: The Least Secure Industry (According to Hackers), the Cybersecurity Skills Shortage, and More

    Each month, we bring you some of the most compelling cloud and Salesforce security-related stories from the last four weeks. In this post, we discuss the acquisition of Vlocity by Salesforce,...

    Read
  • Learn How to Monitor Salesforce User Activity in Real Time

    Watch Now
  • 6 Ways to Prevent Data Theft From Departing Employees

    6 Ways to Prevent Data Theft From Departing Employees

    Departing employees can take information out the door of your organization. You need a proper data protection strategy to prevent data theft.

    Read
  • Monthly Cloud Security Roundup: NIST’s New Privacy Framework, Salesforce’s Call for a National Data Privacy Law, and More

    Monthly Cloud Security Roundup: NIST’s New Privacy Framework, Salesforce’s Call for a National Data Privacy Law, and More

    Discover the latest cloud security news with January’s roundup, including NIST’s new Privacy Framework and Salesforce’s call for a national data privacy law.

    Read
  • Privileged User Monitoring: 5 Ways to Prevent Privileged User Abuse in Salesforce

    Privileged User Monitoring: 5 Ways to Prevent Privileged User Abuse in Salesforce

    By using privileged user activity monitoring, you can prevent insider threats like privileged user abuse in Salesforce.

    Read
  • 5 Reasons Why Privileged User Abuse is a Top Security Concern in the Cloud

    5 Reasons Why Privileged User Abuse is a Top Security Concern in the Cloud

    Data security should prevent external attacks and insider threats because privileged user abuse is a top concern in the cloud. Find out more about preventing insider abuse in this article.

    Read
  • loading
    Loading More...