In this townhall session, Mike Mason of FairWarning, along with Brian Olearczyk and Pete Thurston of RevCult, discuss how to monitor for anomalous events and document both current state and modified states of any changes to facilitate error-free recovery.
They also discuss:
This whitepaper explores a number of remote work scenarios that are cause for concern in Salesforce. Read o...
Should You Build or Buy a Salesforce Data Protection Solution?Find Out Now
Learn how FairWarning for Salesforce translates Shield Event Monitoring log files into user-friendly, leverageable insights that transform your Salesforce data security, compliance, and governance.
Discover the latest cloud security news, including, Salesforce’s purchase of Slack, the top cybersecurity threats, CPRA, and more.
FairWarning for Salesforce is a user activity monitoring and alerting solution that helps you interpret and leverage Salesforce Shield Event Monitoring with clicks, not code.
Are your Salesforce data security bases covered? Learn how to proactively manage data user access and quickly react if the worst happens in this on-demand video.
Discover 11 Salesforce data security threats organizations discovered with real findings from FairWarning's Salesforce data risk assessments.
A defense in depth approach to security is vital for establishing trust, maintaining compliance, and securing sensitive data. Learn how to secure your organization from the inside out in this e-book.
Digital transformation isn't new, but it's become a higher priority, particularly where security is concerned. Learn how to manage the "new normal" to protect sensitive data in this webinar.
Find out the three things you need to do to protect PHI in Salesforce and how to meet HIPAA compliance in the on-demand session: Safeguarding PHI in Salesforce to Meet HIPAA Compliance.
Discover the latest cloud security news, including hybrid cloud security challenges, Vermont’s updated data breach law, Zoom’s new CISO, and more.
To help you evaluate and accelerate the implementation of Salesforce security controls with premier solutions, this whitepaper covers how to utilize a shared security responsibility model and more.
With Salesforce, you can take times of change and turn them into opportunities. This whitepaper offers ways to establish a robust infrastructure, cut costs, and secure data using Salesforce.
This whitepaper explores a number of remote work scenarios that are cause for concern in Salesforce. Read on to learn the red flags and how to mitigate threats to your sensitive Salesforce data.
This townhall Q&A provides InfoSec & Compliance professionals with timely advice and best practices for securely enabling an expanding, remote workforce who is working with sensitive Salesforce data.
If you’re switching to a remote work environment, you’ll need to know about securing a remote workforce for maximum data security.
Each month, we bring you some of the most compelling cloud and Salesforce security-related stories from the last four weeks. In this post, we discuss the acquisition of Vlocity by Salesforce,...
Departing employees can take information out the door of your organization. You need a proper data protection strategy to prevent data theft.
Discover the latest cloud security news with January’s roundup, including NIST’s new Privacy Framework and Salesforce’s call for a national data privacy law.
By using privileged user activity monitoring, you can prevent insider threats like privileged user abuse in Salesforce.
Data security should prevent external attacks and insider threats because privileged user abuse is a top concern in the cloud. Find out more about preventing insider abuse in this article.
Here are five lessons learned from user activity monitoring in Salesforce – and what to keep in mind when building a data governance program.