Value of Salesforce Event Monitoring

advertisement
Watch the Replay
Value of Salesforce
Event Monitoring
Get complete visibility into the adoption, security
& performance of your Salesforce apps
January 13th, 2015
Today’s Panel
Adam Torman
Darin Pederson
Director Product Management
Salesforce
atorman@salesforce.com
Cloud Security Specialist
FairWarning, Inc.
Darin@FairWarning.com
Agenda
• Overview of Salesforce Event Monitoring, Adam Torman
• How to use Salesforce Event Monitoring for data protection,
Darin Pederson
• How to use Salesforce Event Monitoring to measure user
adoption , Darin Pederson
• Q&A
Adam Torman Introduction
•
•
•
•
Overview of Salesforce Event Monitoring
Director Product Management
@atorman
Salesforcehacker.com – Best Practices Blog
Have you ever….
• needed to know what your partners are clicking on?
• needed to know what files your employees are downloading?
• needed to audit when ex-employees leave the company with your
customer list?
• wanted to track the adoption of projects that you roll out on the
Salesforce platform like S1, Chatter, or the FairWarning® app?
• wanted to track who did what, when they did it, where they did it
from, how frequently they did it, and how quickly they did it can be a
challenge
Why Audit Salesforce
•
•
•
•
•
Salesforce is a mission critical application
Employees, partners, and customers in the form of users all
interact within the same organization
Tracking who did what, when they did it, where they did it from,
how frequently they did it
Audit for compliance, adoption, troubleshooting, or performance
monitoring
Use visualizations to explore and analyze the data
Auditing at Salesforce
Field History
Tracking
Setup Audit
Trail
Debug Logs
API Usage
System
Overview
Custom Object
Usage
Login History
Event Monitoring
Forensic
Investigations
All images licensed from dryicons.com
Introducing Event Monitoring
Activity: Track detailed user activity including
location, IP range, browser, and app
information
Adoption: Track adoption of apps and the
success of IT initiatives
Audit: Identify and act on anomalies in user
behavior
Performance: Trend performance of your
people and your code
Log Types
APEX CALLOUT
LOGIN AS
APEX EXECUTION
LOGOUT
APEX SOAP
MDAPI OPERATION
APEX TRIGGER
MULTI BLOCK REPORT
API
PACKAGE INSTALL
ASYNC REPORT
REPORT
BULK API
REPORT EXPORT
CHANGE SET OPERATION
REST API
CONTENT DISTRIBUTION
SANDBOX
CONTENT DOCUMENT LINK
SITES
CONTENT TRANSFER
UI TRACKING (S1 Adoption)
DASHBOARD
URI
DOCUMENT ATTACHMENT DOWNLOADS
WORKFLOW
LOGIN
VISUALFORCE
All images licensed from dryicons.com
Who, What, When, Where
What
When
Who
How
Long
Where
Tracking User Behavior
From Home Tab, Clicked on Marc Benioff Contact Record
From Marc Benioff Contact Record, Clicked Edit Button
/0033000000Vt4Od
Edit
Data Leakage Detection
When
Who
Report URI
Export
Where
Report URI
How
Report Columns
Adoption Metrics
Mobile S1 Clicks
List Views Printed
Accounts Viewed
Account Records Printed
# of Users
Other Use Cases
•
•
•
•
Application Performance Management
Troubleshoot Issues
Device Adoption
Anomaly Detection
How do I get it?
• Add-on Price for Enterprise, Unlimited, and
Performance Editions: 30 Day Data Retention
• Free for Developer Edition: 1 Day Data
Retention
– http://bit.ly/deSignup
Darin Pederson Introduction
• Cloud Security Specialist
• Featured speaker at Information Security and
Privacy national events such as HIMSS, AHIMA,
HCCA, InSight, NCHICA and NCHIMA
• 10 plus years of security solution experience
Where FairWarning® Fits In
Fills an important gap in Salesforce Data Protection
Roles
–
–
–
–
Director, Manager of Salesforce-CRM
Director of Business Information Systems
Salesforce System Administrators
Information Security
Drivers
–
–
–
–
Protection against data theft
Utilize highly sensitive information in Salesforce
HIPAA, EU Data Protection Act,
UK Data Protection Act, SOX 404 IT controls,
PCI, PIPEDA, FFIEC
User adoption
The Basics of How it Works
28 Event Monitoring
Log Files
Example Use Cases
•
Forensic investigation of a user’s activities
•
Easy-to-interpret for a business user
•
Monitoring & alerting on a departing
•
Ad-hoc reporting, monitoring & alerting
employee’s exports
•
Multi-criteria filtering
Monitoring of access to sensitive accounts
•
Visualization, trending, graphing
& contacts
•
Standard and Custom Objects
•
User access after termination
•
Multi-org support
•
User access trends & visualization
•
Performance and Usage
•
How Healthcare Uses Salesforce
Insurers:
•
•
•
Employer accounts
Insureds - patients
ePHI
Providers:
•
•
•
Patient information
Referrals
Physician recruitment
What’s at Risk:
• Competitive loss
• Sensitive patient
information
• Reputational damage
• Regulatory compliance
– HIPAA
How Wealth Management Uses
Salesforce
• Client sensitive
information
• Performance and fee
information
• LP information
• Account and proceeds
disbursement
What’s at Risk
•
•
•
•
Competitive loss
Clients sensitive information
Reputational damage
Regulatory compliance
Recent Headline News:
January 5, 2015 – “... fired one of its
financial advisers after it accused
him of stealing account data …”
DEMO
Q&A
Adam Torman, Salesforce
Darin Pederson, FairWarning ®
Download