Salesforce Shield

  • Reduce Risk Through a Holistic Approach to Salesforce Data Governance

    Reduce Risk Through a Holistic Approach to Salesforce Data Governance

    To help you evaluate and accelerate the implementation of Salesforce security controls with premier solutions, this whitepaper covers how to utilize a shared security responsibility model and more.

    Read
  • Get a Complimentary Salesforce Data Risk Assessment

    Uncover Risk Now
  • Securing a Remote Workforce: How to Protect Your At-Risk Salesforce Data

    Securing a Remote Workforce: How to Protect Your At-Risk Salesforce Data

    This whitepaper explores a number of remote work scenarios that are cause for concern in Salesforce. Read on to learn the red flags and how to mitigate threats to your sensitive Salesforce data.

    Read
  • How Are Salesforce Customers Building a Reputation of Trust?

    Find Out Now...
  • Remote Workforce Management for your Salesforce Environment Part II53:56

    Remote Workforce Management for your Salesforce Environment Part II

    In this townhall session, FairWarning and RevCult discuss monitoring for anomalous events and Salesforce platform security controls for remote workforce management.

    Watch
  • Secure Your Remote Workforce and Salesforce Data

    Learn How
  • Remote Workforce Management for your Salesforce Environment57:07

    Remote Workforce Management for your Salesforce Environment

    This townhall Q&A provides InfoSec & Compliance professionals with timely advice and best practices for securely enabling an expanding, remote workforce who is working with sensitive Salesforce data.

    Watch
  • Learn How to Monitor Salesforce User Activity in Real Time

    Watch Now
  • The Top 13 Signs Your Employee Is About to Quit

    The Top 13 Signs Your Employee Is About to Quit

    Departing employees can create a lot of challenges for an organization. So what are the signs your employee is about to quit?

    Read
  • The Hidden Threat in Your Organization: Preventing Privileged User Abuse In Salesforce

    The Hidden Threat in Your Organization: Preventing Privileged User Abuse In Salesforce

    Read
  • User Activity Monitoring in Salesforce: 5 Lessons Learned for a Stronger Data Governance Program

    User Activity Monitoring in Salesforce: 5 Lessons Learned for a Stronger Data Governance Program

    Here are five lessons learned from user activity monitoring in Salesforce – and what to keep in mind when building a data governance program.

    Read
  • Securing Your Sensitive Information in Salesforce: Data Protection and Security for Cloud

    Securing Your Sensitive Information in Salesforce: Data Protection and Security for Cloud

    Salesforce data protection and security are critical for cloud apps. Protect information from insider threats with FairWarning Cloud Security.

    Read
  • California Consumer Privacy Act: Everything You Need to Know About CCPA, the New California Data Privacy Law

    California Consumer Privacy Act: Everything You Need to Know About CCPA, the New California Data Privacy Law

    The California Consumer Privacy Act of 2018 (CCPA) seemed to appear out of nowhere. Here's a comprehensive guide to the California data privacy law.

    Read
  • Identify Security Risks and Interpret User Behaviors in Real Time

    Identify Security Risks and Interpret User Behaviors in Real Time

    If you want to build organizational trust through Salesforce data privacy and security – and meet compliance requirements in one platform – FairWarning provides the visibility you need on demand.

    Read
  • What is Salesforce's Einstein Analytics?

    Learn More
  • Are Insider Threats Lurking in Your Financial Organization? How to Identify and Mitigate Risks in Salesforce and Beyond46:24

    Are Insider Threats Lurking in Your Financial Organization? How to Identify and Mitigate Risks in Salesforce and Beyond

    Are insider threats lurking in your financial organization? You might be surprised. This webinar will show you how to identify and mitigate risks in Salesforce and beyond.

    Watch
  • What is Einstein Analytics? A Closer Look at Salesforce’s Visibility Tool

    What is Einstein Analytics? A Closer Look at Salesforce’s Visibility Tool

    In June 2017, the world’s #1 CRM platform, Salesforce, released their newly rebranded analytics tools for viewing data – Einstein Analytics (formerly known as “Wave”). Many who use the platform...

    Read
  • Monthly Cloud Security Roundup: The Top Cybersecurity Threat to the U.S. and More

    Monthly Cloud Security Roundup: The Top Cybersecurity Threat to the U.S. and More

    Each month, we’ll bring you some of the most compelling cloud and Salesforce security-related stories from the last four weeks. In this post, we discuss Facebook’s exposed passwords and more.

    Read
  • The 6 Elements Every Financial Institution Needs for Defense-in-Depth Security

    The 6 Elements Every Financial Institution Needs for Defense-in-Depth Security

    In the same way that medieval castles were designed with multiple security layers for protection, today’s organizations require a multifaceted approach to safeguarding highly sensitive data....

    Read
  • Canadian Data Privacy Laws, Security Frameworks, and Cloud Compliance

    Canadian Data Privacy Laws, Security Frameworks, and Cloud Compliance

    Canadian data privacy laws are complex – but which should you be most concerned about, and how can you ensure compliance? This post walks you through the top Canadian regulations and standards.

    Read
  • The Admin’s Guide to Salesforce Visibility: Using Event Monitoring to Boost ROI, Productivity

    The Admin’s Guide to Salesforce Visibility: Using Event Monitoring to Boost ROI, Productivity

    Salesforce has quickly become a mission-critical application for organizations of all types. The great news for admins is that Salesforce visibility can show you not only how users are adopting...

    Read
  • Build vs. Buy Cloud Security Software: 4 Must-Ask Questions During the Decision-Making Process

    Build vs. Buy Cloud Security Software: 4 Must-Ask Questions During the Decision-Making Process

    Choosing a cloud security isn't always a straightforward process. Some companies want to build a custom solution; others prefer to buy one off the sheld. Which is right for you?

    Read
  • 4 More Salesforce Event Monitoring Myths: Understanding What Event Monitoring Does (and Doesn’t) Do

    4 More Salesforce Event Monitoring Myths: Understanding What Event Monitoring Does (and Doesn’t) Do

    To get the most value from Salesforce Event Monitoring, you must know what the tool does and doesn't do. Uncover the myths and facts and obtain more information by reading this post.

    Read
  • Build or Buy Cloud Security: 5 Key Insights for Choosing a Solution from Salesforce and PURE Insurance Tech Leaders

    Build or Buy Cloud Security: 5 Key Insights for Choosing a Solution from Salesforce and PURE Insurance Tech Leaders

    Find out the five key insights that will help you decide whether you should build or buy cloud security solutions, courtesy of the tech and security leaders at Salesforce and PURE Insurance.

    Read
  • Build or Buy: Choosing a Path for Salesforce Security43:56

    Build or Buy: Choosing a Path for Salesforce Security

    Only 29% of in-house software development projects are a success, which means building a cloud security solution for a platform like Salesforce can be challenging.

    Watch
  • loading
    Loading More...