Adallom for Salesforce Access Now

advertisement
Solutions Brief:
Adallom for Salesforce
Salesforce is a customer relationship management (CRM) application that enables
organizations to manage and track customer success. Even though Salesforce invests in
infrastructure security, under the shared responsibility model, Salesforce customers are
still accountable for the access to and usage of the critical data that resides within the
application. Adallom complements Salesforce with visibility, governance and protection
capabilities. By deploying Adallom for Salesforce, organizations can secure corporate data,
govern information usage, and protect against risky behaviors and threats.
Adallom for Salesforce
discovers and secures
your sensitive
corporate data, governs
appropriate usage
and detects high-risk
behaviors and threats
Salesforce is a customer relationship management (CRM) application that enables organizations
to manage customer accounts, synchronize sales activities, coordinate marketing programs, and
enhance customer service activities.
Our unique cloud application
security platform allows IT
organizations to :
Salesforce invests in security for their services, from infrastructure security to delivering features such
as basic auditing, IP restriction and two-factor authentication. However, reliance on Salesforce security
features are not enough, particularly when sensitive corporate data is involved. Organizations must
take a proactive approach to securing Salesforce.
• Enable collaboration and
datasharing among sales,
marketing and support teams
within Salesforce without
compromising security
Organizations using Adallom can address potential risks such as hijack of privileged users, sensitive
data leakage to unmanaged devices and malicious data exfiltration.
Introducing Adallom For Salesforce
Adallom is a cloud application security platform deployed to protect Salesforce data in the cloud.
It can be deployed as a 100% SaaS deployment, featuring flexible modes ranging from API to
SmartProxyTM, or as a private cloud.
Copyright ©2014 Adallom Inc
• Address security and
compliance mandates that
requires protection of PII,
PCI, PHI data and proprietary
IPs
• Protect against known and
unknown threats including
malicious, accidental and
compromized insiders
1
Adallom for Salesforce
The API deployment mode integrates directly into the framework of enterprise cloud applications in as little as 8 minutes. When deployed in
proxy configuration, the patent-pending SmartProxyTM architecture seamlessly directs users through the Adallom cloud, providing complete
control over the application without breaking application functions. Hybrid modes can be selected depending on the application or use
cases being addressed. For example, organizations may choose to support API mode for normal user access, but utilize the SmartProxyTM
capabilities for unmanaged device access.
Visibility and audit trails
Adallom provides a clear and actionable audit trail of all user activities in Salesforce, including a dashboard featuring geographical and device
access, internal and external collaborators, device and browsing software usage per user. Adallom also discovers third-party applications that
have access to corporate data, such as business intelligence services that run on the Salesforce platform.
Data Discovery
Within Salesforce, users may input proprietary enterprise information ranging from customer data and financial information to CRM fields, or
include them within attachments and documents. In fact, there are various ways to automate the data upload process. Adallom will discover
all possible ways corporate data may exist in Salesforce, including CRM content, Chatter files, attachments and documents, and who is
interacting with them.
Cloud Data Leakage Protection (DLP)
Using Adallom, organizations may centralize DLP policies across all SaaS applications, or extend existing DLP solutions to the cloud. Personal
healthcare information (PHI), personal credit card information, personal identifiable information (PII) and intellectual property risks are
identified not only with DLP mechanisms, but also using analysis of file metadata. This helps detect compliance violation and excessive
exposure of sensitive files within your Salesforce application.
Usage Monitoring
The biggest attack vector with SaaS applications are users, in particular, privileged users such as officers or IT administrators. This is because
their access makes it easier for them to do more damage when they are intentionally being malicious, or if their credentials are stolen.
Adallom enables organizations to monitor activities of privileged users.
Threat Protection
The Adallom SmartEngineTM advanced heuristics technology learns how each user interacts with each SaaS application using more than 75
variables, and through behavioral analysis, accesses the risks in each transaction. This feature is enabled “out-of-the-box” without requiring
complex rules and configuration. This allows organizations to discover potential security incidents such as high-rates of dowload activities,
simultaneous logins from multiple locations, activities from anonymous proxies and users accessing from blacklisted IPs.
Copyright ©2014 Adallom Inc
2
Adallom for Salesforce
Proactive SaaS Security Research and Forensics
Adallom cloud services include proactive research on threats and alerts by Adallom Labs, staffed by a team of cybersecurity researchers.
Adallom Labs has successfully identified a Zeus malware targeting Salesforce users, and collaborated with Salesforce on investigating
the Dyre malware. In addition, a regular SaaS Security Assessment Report that summarizes top Salesforce security risks and mitigations is
available as part of the Adallom cloud services.
Feature Highlights
Visibility and Monitoring
Salesforce features:
Adallom complements with the following:
Basic audit trail
•
Comprehensive audit trails and attestation for user, data, access, activities
including device, browsing software inventory and IP access overview
•
Data discovery for CRM content, Chatter files, documents, attachments
•
File visibility and monitoring for sensitive files and file metadata
•
User visibility and monitoring for internal and external collaborators
•
Privileged user and activitity monitoring. For example, CEO and CFO of
organization, or IT administrators
Governance and
Compliance
•
Visibility dashboard and reports
•
Restrict access to enterprise domain
•
DLP for Salesforce CRM, Chatter files, documents, and attachments
•
Set types of upload and download files
•
eDiscovery across all SaaS applications including Salesforce
allowed
•
Governance on access control - enable policies for which user, device, location
•
may access Salesforce
Identity confirmation
•
Governance on Salesforce transactions. For example, ensuring that deletion of
CRM fields are restricted to specific individuals
Threat Protection
Cloud provider infrastructure security
•
Compliance reports
•
Detection of risky usage - zombie users, users with administrator privileges, or
users oversharing files publicly
•
Detection of anomalous behaviors - high-rate of activity within Salesforce that
may be indicative of data exfiltration, suspicious login patterns, suspicious
location activities
•
Detection of security incidents - login from blacklisted IPs, or users sharing files
with compromised personal accounts
•
Customized alerts for specific industry needs. For example detecting usage from
countries organizations don’t normally do business with.
Benefits Of Adallom for Salesforce
Salesforce data includes financial records, corporate email addresses, customer information and sales forecast data. It is critical to proactively
monitor, govern Salesforce usage and protect from risky behaviors and threats. Adallom for Salesforce enables comprehensive visibility,
governance and protection so organizations can accelerate sales and marketing collaboration within Salesforce.
HQ
2390 El Camino Real, Suite 240
Palo Alto, CA 94306
+1 (650) 268-8322
R&D
Habarzel 21 Street, Building B
Tel Aviv, 6971001
Israel
www.adallom.com
Copyright ©2014 Adallom Inc
3
Download