Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

CloudLock Helps Control and Secure Data in Salesforce

CloudLock Expands Security and Compliance Solution to Salesforce

CloudLock, a provider of cloud information security solutions, this week announced that it has extended its security suite to cover popular cloud service Salesforce.com.

CloudLock Expands Security and Compliance Solution to Salesforce

CloudLock, a provider of cloud information security solutions, this week announced that it has extended its security suite to cover popular cloud service Salesforce.com.

Using CloudLock’s technology, Salesforce customers can implement their compliance and security policies and automatically and continuously secure their Salesforce.com objects.

CloudLock Logo

Additionally, customers can locate and highlighting sensitive data (e.g., PII, PCI, intellectual property, financial information, and other business-critical assets), stored in Salesforce.com and enforce governance and regulatory compliance, the company said.

“Historically, organizations have used Profiles, Permission Sets and Roles to attempt to restrict access to regulated and sensitive information,” the company explains on its website. “This is only partially effective: to apply effective data governance and privacy policies to Salesforce, you first need to know where your most sensitive data is.”

According to the company, organizations that use Salesforce can leverage CloudLock’s solution to address the following needs:

Enforcing Regulatory and Security Compliance – Where is your sensitive data stored within Salesforce? (Examples include PCI,PII,PHI, IP, and client/financial data.) Who has Access to It? Who did what with it?

Location Aware Auditing – Who is exporting this sensitive data? Where are they accessing it from?

Advertisement. Scroll to continue reading.

Sandbox Security – How do you ensure that your Salesforce sandboxes do not contain sensitive customer data?

“Organizations adopting Salesforce are doing so across their organization”, said CloudLock founder Gil Zimmerman. “As their use of the cloud grows, so does the need for a scalable security solution that can do more than simply audit and report on potential exposures. CIO’s are looking for ways to reduce risk through action.” 

The combination of CloudLock’s Compliance Scan technology with its Policy Engine protection allows organizations to enforce their acceptable use policies instantly, across their entire Salesforce environment. 

More information on CloudLock for Salesforce is available here.

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...