with
other 24
security
Volume
tools and data pro-
tection strategies.
June 2018 Edition
Below are some
questions to an-
swer:
• Who has access
to what data?
• Who has controls
over database ac-
cess?
• What
regula-
tions/laws do I
need to comply
with?
• Is my data secure
in transit?
• Is my data secure when it’s not in use?
• What sensitive data does my organization store,
use and transmit?
Gaining insights into your business-crit-
ical applications allows your security
team to be proactive in detecting, in-
vestigating, mitigating and remediat-
2) Monitor your cloud applications ing security incidents.
After you have found where your most
sensitive data resides, monitor who is ac- Monitoring technology will provide
cessing it and what they are doing with your organization with the ability to
trust your employees but verify that
it.
they are not violating your acceptable
With the growth of cloud-based apps such as use policies and putting your organiza-
Salesforce, company data is oftentimes easily tion at risk.
accessible within the application.
Defending against insider threats
requires monitoring user activity
and using behavior analytics that
provide insights into where, when
and what insiders are doing.
So then, say that an employee on the brink of de-
parture is exporting large amounts of company
data from Salesforce.
Your security team can isolate the incident
and prevent data loss or even a full-blown
breach.
83