Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

CloudLock Helps Control and Secure Data in Salesforce

CloudLock Expands Security and Compliance Solution to Salesforce

CloudLock, a provider of cloud information security solutions, this week announced that it has extended its security suite to cover popular cloud service Salesforce.com.

CloudLock Expands Security and Compliance Solution to Salesforce

CloudLock, a provider of cloud information security solutions, this week announced that it has extended its security suite to cover popular cloud service Salesforce.com.

Using CloudLock’s technology, Salesforce customers can implement their compliance and security policies and automatically and continuously secure their Salesforce.com objects.

CloudLock Logo

Additionally, customers can locate and highlighting sensitive data (e.g., PII, PCI, intellectual property, financial information, and other business-critical assets), stored in Salesforce.com and enforce governance and regulatory compliance, the company said.

“Historically, organizations have used Profiles, Permission Sets and Roles to attempt to restrict access to regulated and sensitive information,” the company explains on its website. “This is only partially effective: to apply effective data governance and privacy policies to Salesforce, you first need to know where your most sensitive data is.”

According to the company, organizations that use Salesforce can leverage CloudLock’s solution to address the following needs:

Enforcing Regulatory and Security Compliance – Where is your sensitive data stored within Salesforce? (Examples include PCI,PII,PHI, IP, and client/financial data.) Who has Access to It? Who did what with it?

Location Aware Auditing – Who is exporting this sensitive data? Where are they accessing it from?

Sandbox Security – How do you ensure that your Salesforce sandboxes do not contain sensitive customer data?

“Organizations adopting Salesforce are doing so across their organization”, said CloudLock founder Gil Zimmerman. “As their use of the cloud grows, so does the need for a scalable security solution that can do more than simply audit and report on potential exposures. CIO’s are looking for ways to reduce risk through action.” 

The combination of CloudLock’s Compliance Scan technology with its Policy Engine protection allows organizations to enforce their acceptable use policies instantly, across their entire Salesforce environment. 

More information on CloudLock for Salesforce is available here.

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.

Cloud Security

Microsoft and Proofpoint are warning organizations that use cloud services about a recent consent phishing attack that abused Microsoft’s ‘verified publisher’ status.

Audits

Out of the 335 public recommendations on a comprehensive cybersecurity strategy made since 2010, 190 were not implemented by federal agencies as of December...

Cloud Security

Orca Security published details on four server-side request forgery (SSRF) vulnerabilities impacting different Azure services.

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...