Solutions Brief: Adallom for Salesforce Salesforce is a customer relationship management (CRM) application that enables organizations to manage and track customer success. Even though Salesforce invests in infrastructure security, under the shared responsibility model, Salesforce customers are still accountable for the access to and usage of the critical data that resides within the application. Adallom complements Salesforce with visibility, governance and protection capabilities. By deploying Adallom for Salesforce, organizations can secure corporate data, govern information usage, and protect against risky behaviors and threats. Adallom for Salesforce discovers and secures your sensitive corporate data, governs appropriate usage and detects high-risk behaviors and threats Salesforce is a customer relationship management (CRM) application that enables organizations to manage customer accounts, synchronize sales activities, coordinate marketing programs, and enhance customer service activities. Our unique cloud application security platform allows IT organizations to : Salesforce invests in security for their services, from infrastructure security to delivering features such as basic auditing, IP restriction and two-factor authentication. However, reliance on Salesforce security features are not enough, particularly when sensitive corporate data is involved. Organizations must take a proactive approach to securing Salesforce. • Enable collaboration and datasharing among sales, marketing and support teams within Salesforce without compromising security Organizations using Adallom can address potential risks such as hijack of privileged users, sensitive data leakage to unmanaged devices and malicious data exfiltration. Introducing Adallom For Salesforce Adallom is a cloud application security platform deployed to protect Salesforce data in the cloud. It can be deployed as a 100% SaaS deployment, featuring flexible modes ranging from API to SmartProxyTM, or as a private cloud. Copyright ©2014 Adallom Inc • Address security and compliance mandates that requires protection of PII, PCI, PHI data and proprietary IPs • Protect against known and unknown threats including malicious, accidental and compromized insiders 1 Adallom for Salesforce The API deployment mode integrates directly into the framework of enterprise cloud applications in as little as 8 minutes. When deployed in proxy configuration, the patent-pending SmartProxyTM architecture seamlessly directs users through the Adallom cloud, providing complete control over the application without breaking application functions. Hybrid modes can be selected depending on the application or use cases being addressed. For example, organizations may choose to support API mode for normal user access, but utilize the SmartProxyTM capabilities for unmanaged device access. Visibility and audit trails Adallom provides a clear and actionable audit trail of all user activities in Salesforce, including a dashboard featuring geographical and device access, internal and external collaborators, device and browsing software usage per user. Adallom also discovers third-party applications that have access to corporate data, such as business intelligence services that run on the Salesforce platform. Data Discovery Within Salesforce, users may input proprietary enterprise information ranging from customer data and financial information to CRM fields, or include them within attachments and documents. In fact, there are various ways to automate the data upload process. Adallom will discover all possible ways corporate data may exist in Salesforce, including CRM content, Chatter files, attachments and documents, and who is interacting with them. Cloud Data Leakage Protection (DLP) Using Adallom, organizations may centralize DLP policies across all SaaS applications, or extend existing DLP solutions to the cloud. Personal healthcare information (PHI), personal credit card information, personal identifiable information (PII) and intellectual property risks are identified not only with DLP mechanisms, but also using analysis of file metadata. This helps detect compliance violation and excessive exposure of sensitive files within your Salesforce application. Usage Monitoring The biggest attack vector with SaaS applications are users, in particular, privileged users such as officers or IT administrators. This is because their access makes it easier for them to do more damage when they are intentionally being malicious, or if their credentials are stolen. Adallom enables organizations to monitor activities of privileged users. Threat Protection The Adallom SmartEngineTM advanced heuristics technology learns how each user interacts with each SaaS application using more than 75 variables, and through behavioral analysis, accesses the risks in each transaction. This feature is enabled “out-of-the-box” without requiring complex rules and configuration. This allows organizations to discover potential security incidents such as high-rates of dowload activities, simultaneous logins from multiple locations, activities from anonymous proxies and users accessing from blacklisted IPs. Copyright ©2014 Adallom Inc 2 Adallom for Salesforce Proactive SaaS Security Research and Forensics Adallom cloud services include proactive research on threats and alerts by Adallom Labs, staffed by a team of cybersecurity researchers. Adallom Labs has successfully identified a Zeus malware targeting Salesforce users, and collaborated with Salesforce on investigating the Dyre malware. In addition, a regular SaaS Security Assessment Report that summarizes top Salesforce security risks and mitigations is available as part of the Adallom cloud services. Feature Highlights Visibility and Monitoring Salesforce features: Adallom complements with the following: Basic audit trail • Comprehensive audit trails and attestation for user, data, access, activities including device, browsing software inventory and IP access overview • Data discovery for CRM content, Chatter files, documents, attachments • File visibility and monitoring for sensitive files and file metadata • User visibility and monitoring for internal and external collaborators • Privileged user and activitity monitoring. For example, CEO and CFO of organization, or IT administrators Governance and Compliance • Visibility dashboard and reports • Restrict access to enterprise domain • DLP for Salesforce CRM, Chatter files, documents, and attachments • Set types of upload and download files • eDiscovery across all SaaS applications including Salesforce allowed • Governance on access control - enable policies for which user, device, location • may access Salesforce Identity confirmation • Governance on Salesforce transactions. For example, ensuring that deletion of CRM fields are restricted to specific individuals Threat Protection Cloud provider infrastructure security • Compliance reports • Detection of risky usage - zombie users, users with administrator privileges, or users oversharing files publicly • Detection of anomalous behaviors - high-rate of activity within Salesforce that may be indicative of data exfiltration, suspicious login patterns, suspicious location activities • Detection of security incidents - login from blacklisted IPs, or users sharing files with compromised personal accounts • Customized alerts for specific industry needs. For example detecting usage from countries organizations don’t normally do business with. Benefits Of Adallom for Salesforce Salesforce data includes financial records, corporate email addresses, customer information and sales forecast data. It is critical to proactively monitor, govern Salesforce usage and protect from risky behaviors and threats. Adallom for Salesforce enables comprehensive visibility, governance and protection so organizations can accelerate sales and marketing collaboration within Salesforce. HQ 2390 El Camino Real, Suite 240 Palo Alto, CA 94306 +1 (650) 268-8322 R&D Habarzel 21 Street, Building B Tel Aviv, 6971001 Israel www.adallom.com Copyright ©2014 Adallom Inc 3