Salesforce Shield

  • Securing Your Sensitive Information in Salesforce: Data Protection and Security for Cloud

    Securing Your Sensitive Information in Salesforce: Data Protection and Security for Cloud

    Salesforce data protection and security are critical for cloud apps. Protect information from insider threats with FairWarning Cloud Security.

    Read
  • California Consumer Privacy Act: Everything You Need to Know About CCPA, the New California Data Privacy Law

    California Consumer Privacy Act: Everything You Need to Know About CCPA, the New California Data Privacy Law

    The California Consumer Privacy Act of 2018 (CCPA) seemed to appear out of nowhere. Here's a comprehensive guide to the California data privacy law.

    Read
  • How Are Salesforce Customers Building a Reputation of Trust?

    Find Out Now...
  • Identify Security Risks and Interpret User Behaviors in Real Time

    Identify Security Risks and Interpret User Behaviors in Real Time

    If you want to build organizational trust through Salesforce data privacy and security – and meet compliance requirements in one platform – FairWarning provides the visibility you need on demand.

    Read
  • Are Insider Threats Lurking in Your Financial Organization? How to Identify and Mitigate Risks in Salesforce and Beyond46:24

    Are Insider Threats Lurking in Your Financial Organization? How to Identify and Mitigate Risks in Salesforce and Beyond

    Are insider threats lurking in your financial organization? You might be surprised. This webinar will show you how to identify and mitigate risks in Salesforce and beyond.

    Watch
  • Learn How to Monitor Salesforce User Activity in Real Time

    Watch Now
  • Monthly Cloud Security Roundup: The Top Cybersecurity Threat to the U.S. and More

    Monthly Cloud Security Roundup: The Top Cybersecurity Threat to the U.S. and More

    Each month, we’ll bring you some of the most compelling cloud and Salesforce security-related stories from the last four weeks. In this post, we discuss Facebook’s exposed passwords and more.

    Read
  • The 6 Elements Every Financial Institution Needs for Defense-in-Depth Security

    The 6 Elements Every Financial Institution Needs for Defense-in-Depth Security

    In the same way that medieval castles were designed with multiple security layers for protection, today’s organizations require a multifaceted approach to safeguarding highly sensitive data....

    Read
  • Canadian Data Privacy Laws, Security Frameworks, and Cloud Compliance

    Canadian Data Privacy Laws, Security Frameworks, and Cloud Compliance

    Canadian data privacy laws are complex – but which should you be most concerned about, and how can you ensure compliance? This post walks you through the top Canadian regulations and standards.

    Read
  • The Admin’s Guide to Salesforce Visibility: Using Event Monitoring to Boost ROI, Productivity

    The Admin’s Guide to Salesforce Visibility: Using Event Monitoring to Boost ROI, Productivity

    Salesforce has quickly become a mission-critical application for organizations of all types. The great news for admins is that Salesforce visibility can show you not only how users are adopting...

    Read
  • Build vs. Buy Cloud Security Software: 4 Must-Ask Questions During the Decision-Making Process

    Build vs. Buy Cloud Security Software: 4 Must-Ask Questions During the Decision-Making Process

    Choosing a cloud security isn't always a straightforward process. Some companies want to build a custom solution; others prefer to buy one off the sheld. Which is right for you?

    Read
  • 4 More Salesforce Event Monitoring Myths: Understanding What Event Monitoring Does (and Doesn’t) Do

    4 More Salesforce Event Monitoring Myths: Understanding What Event Monitoring Does (and Doesn’t) Do

    To get the most value from Salesforce Event Monitoring, you must know what the tool does and doesn't do. Uncover the myths and facts and obtain more information by reading this post.

    Read
  • Build or Buy Cloud Security: 5 Key Insights for Choosing a Solution from Salesforce and PURE Insurance Tech Leaders

    Build or Buy Cloud Security: 5 Key Insights for Choosing a Solution from Salesforce and PURE Insurance Tech Leaders

    Find out the five key insights that will help you decide whether you should build or buy cloud security solutions, courtesy of the tech and security leaders at Salesforce and PURE Insurance.

    Read
  • Build or Buy: Choosing a Path for Salesforce Security43:56

    Build or Buy: Choosing a Path for Salesforce Security

    Only 29% of in-house software development projects are a success, which means building a cloud security solution for a platform like Salesforce can be challenging.

    Watch
  • 3 Salesforce Event Monitoring Facts and Misconceptions: Understanding What it Does (and Doesn’t) Do

    3 Salesforce Event Monitoring Facts and Misconceptions: Understanding What it Does (and Doesn’t) Do

    Salesforce Event Monitoring is the only way to obtain your Salesforce user activity log files...true or false? Explore common myths about Event Monitoring in this eye-opening blog post.

    Read
  • 2018 Cloud Visibility Report

    2018 Cloud Visibility Report

    Dive into the 2018 Cloud Visibility Report to discover what top organizations are monitoring in their cloud applications like Salesforce, Office 365, Dropbox, and more.

    Read
  • Build vs. Buy Cloud Security Software: 4 Must-Ask Questions During the Decision-Making Process

    Build vs. Buy Cloud Security Software: 4 Must-Ask Questions During the Decision-Making Process

    Balancing an organization’s immediate needs while considering long-term growth can be challenging, especially when deciding whether to build vs. buy cloud security software. Cloud solutions can...

    Read
  • Why Financial Services Companies Are Monitoring for Changes to Salesforce Permission Sets, Profiles

    Why Financial Services Companies Are Monitoring for Changes to Salesforce Permission Sets, Profiles

    Salesforce’s flexible, layered data sharing model means you can dictate which data, objects, and fields users see, through Salesforce permission sets and profiles. Some companies take a blanket...

    Read
  • 2018 Year in Review: Readers’ 10 Favorite Cloud Security Blog Posts

    2018 Year in Review: Readers’ 10 Favorite Cloud Security Blog Posts

    The readers have spoken! Explore the top ten favorite cloud security blog posts of 2018 and learn more about industry trends in this roundup blog.

    Read
  • 5 Business Benefits of Monitoring Salesforce Login Activity

    5 Business Benefits of Monitoring Salesforce Login Activity

    What are the top 5 business benefits of monitoring Salesforce login activity? You might catch someone logging in when they shouldn't be and stealing data. Find out more in this post.

    Read
  • 4 Things You Can Quickly Learn From Monitoring Salesforce Data Exports

    4 Things You Can Quickly Learn From Monitoring Salesforce Data Exports

    What can monitoring Salesforce data exports tell you? For one, the user might be departing your organization soon. Find out other insights you can learn from monitoring in this post.

    Read
  • Using Salesforce Shield to Monitor Salesforce Adoption, ROI

    Using Salesforce Shield to Monitor Salesforce Adoption, ROI

    Are employees utilizing Salesforce the way you intended? What can lower performers learn from top performers? Where are your time and finances best spent? Who needs training -- and who can train?...

    Read
  • loading
    Loading More...