SlideShare a Scribd company logo
1 of 17
© 2013 CipherCloud | All rights reserved. 1© 2013 CipherCloud | All rights reserved.
CipherCloud for Salesforce
DISCOVER ● PROTECT ● MONITOR
© 2014 CipherCloud | All rights reserved. 2
HowCipherCloud EnhancesSalesforce
Protecting sensitive data from leaks
Extending corporate DLP to the cloud
Preventing unauthorized access to data
Maintaining application functionality
Monitoring user and data activity
Detecting anomalies in user behavior
Data Loss
Prevention
Data
Protection
Activity
Monitoring
© 2014 CipherCloud | All rights reserved. 3
Protecting Sensitive Data in theCloud
Ground breaking
security controls
Protect sensitive
information in real
time, before it is sent
to the cloud while
preserving application
usability.
Searchable Strong
Encryption
Key Management Tokenization
Malware Detection Data Loss Prevention
© 2014 CipherCloud | All rights reserved. 4
CipherCloud for Salesforce –
Features & Benefits
© 2014 CipherCloud | All rights reserved. 5
Direct drill down to source of
DLP violations in Salesforce
Comprehensive dashboard
views of all policies violationsOn-demand scanning
of any Salesforce Org
Cloud Data Loss Prevention
© 2014 CipherCloud | All rights reserved. 6© 2014 CipherCloud | All rights reserved.6
Encrypted data is
indecipherable to
unauthorized users
Transparent to users
Preserves application
functionality
Encryption keys never
leave the enterprise
• Encryption or tokenization at
the enterprise gateway
• Minimal latency
• Integrated malware detection
CipherCloud Encryption Process
© 2014 CipherCloud | All rights reserved. 7© 2014 CipherCloud | All rights reserved.7
Tokenized data is
indecipherable
Complete visibility for
all user cloud activity
• Sensitive data remains
in the organization
• Only random tokens go
to the cloud
• Real-time tokenization
• Near-zero latency
• Malware detection
• Transparent to users
• Preserves usability and
functionality
CipherCloudTokenization Process
Secure
Internal
Database
© 2014 CipherCloud | All rights reserved. 8© 2014 CipherCloud | All rights reserved.8
Unauthorized User
Authorized User
Outsiders going directly to
Salesforce can’t access
encrypted fields
Users going through the
CipherCloud gateway have
full access to Salesforce
NoAccess toUnauthorizedUsers
© 2014 CipherCloud | All rights reserved. 9© 2014 CipherCloud | All rights reserved.9
Data is encrypted field-by-field basis,
based on your security policies
Credit card numbers fully
encrypted with AES 256
Fields can be partially
encrypted
Authorized User
Unauthorized UserUnited Oil & Gas
Encryption on a field-by-field Basis
© 2014 CipherCloud | All rights reserved. 10© 2014 CipherCloud | All rights reserved.10
Encryption can be conditional,
based on a field setting
Conditional Encryption
© 2014 CipherCloud | All rights reserved. 11© 2014 CipherCloud | All rights reserved.11
CloudActivity Monitoring andAnomaly Detection
Tracking of all user activity,
downloads, logins, data access
Extensive dashboard and drill-
down capabilities
Tracking Automated detection
of anomalous user behavior
© 2014 CipherCloud | All rights reserved. 12© 2014 CipherCloud | All rights reserved.12
Full support for unstructured
Chatter posts & attachments
Support # tags and @ mentions
CipherCloud forChatter
© 2014 CipherCloud | All rights reserved. 13
CipherCloud forSalesforce -At aGlance
Protects
 Salesforce Sales Cloud
 Salesforce Service Cloud
 Salesforce Marketing Cloud
 Salesforce Chatter
 Salesforce 1 Platform
Capabilities
 Cloud Data Loss Prevention
(DLP)
 AES 256-bit Encryption,
 Key Management
 Tokenization
 Cloud Malware Detection
 User Activity Monitoring
 Anomaly Detection
© 2014 CipherCloud | All rights reserved. 14
Top 3 US Bank’s Consumer Self-
Service Loan Origination Portal
UK Education Organization Deploys
Global Cloud-Based Portal
Major European Telco Consolidates
Call Centers for 25 Countries
Largest Hospital Chain Meets HIPAA
& HITECH in the Cloud
Top Canadian Bank Safeguards
Proprietary Information in the Cloud
Major Wall Street Firm Adopts Cloud
Applications with Confidence
New Zealand Bank Collaborates in the
Cloud and Meets Compliance
Government-Owned Mortgage
Backer Protect PII Data in the Cloud
High-Profile Federal Office Moves
Public CRM Data to the Cloud
Australian Insurer Reaches Customers
Through Cloud-Based Portal
Investment Fund Giant Consolidates
CRM While Assuring Compliance
Global Enterprises usingCipherCloud forSalesforce
Canadian Provincial Government
Tokenizes Cloud data for Residency
Requirements
Cable & Media Giant Adds
Collaboration with Content Controls
Government-Owned Mortgage
Backer Protects PII Data in the Cloud
Top Australian Bank Tokenizes
Sensitive Chatter Posts
Health Insurance Provider Delivers
Safe Cloud Portal to Patients
Click on
the image
to read
Case-study
© 2014 CipherCloud | All rights reserved. 15
CipherCloud forSalesforce - Product Resources
CipherCloud forSalesforce Datasheet
Online Demo of CipherCloud forSalesforce
Online Demo of CipherCloud forChatter
BestPractices forCloud Information Protection in Financial Services
Cloud Information Protection Overview
© 2014 CipherCloud | All rights reserved. 16
AboutCipherCloud
Awards
Cool Vendor
Solutions
Cloud Discovery
Cloud DLP
Strong Encryption
Tokenization
Activity Monitoring
Anomaly Detection
500+ Employees
Company
3.0+ Million
Active Users
13 Industries
25 Countries
7 Languages
P 13 Patents
© 2014 CipherCloud | All rights reserved. 17
More Information
For additional information :
• Website: www.ciphercloud.com
• Email: info@ciphercloud.com
• Phone: +1 855-5CIPHER
Check out our Global Compliance Center
Twitter.com/ciphercloud
Youtube.com/user/CipherCloudVideo
Linkedin.com/company/ciphercloud
Facebook.com/ciphercloud
Connect with Us!

More Related Content

What's hot

CIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud AdoptionCIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud AdoptionCipherCloud
 
Shadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining ControlShadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining ControlCipherCloud
 
CipherCloud for Any App
CipherCloud for Any AppCipherCloud for Any App
CipherCloud for Any AppCipherCloud
 
SafeNet: Don't Leave It to Luck: What am I Not Doing?
SafeNet: Don't Leave It to Luck: What am I Not Doing?SafeNet: Don't Leave It to Luck: What am I Not Doing?
SafeNet: Don't Leave It to Luck: What am I Not Doing?Rahul Neel Mani
 
Enterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without CompromiseEnterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without CompromiseRobb Boyd
 
Automate compliance with cloud guard dome9
Automate compliance with cloud guard dome9Automate compliance with cloud guard dome9
Automate compliance with cloud guard dome9John Varghese
 
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXCisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXNetworkCollaborators
 
CASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the CloudCASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the CloudBitglass
 
Cisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response ServicesCisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response ServicesNetworkCollaborators
 
Hardware Security Modules: Critical to Information Risk Management
Hardware Security Modules: Critical to Information Risk ManagementHardware Security Modules: Critical to Information Risk Management
Hardware Security Modules: Critical to Information Risk ManagementSafeNet
 
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...SafeNet
 
Kubernetes meetup k8s_aug_2019
Kubernetes meetup k8s_aug_2019Kubernetes meetup k8s_aug_2019
Kubernetes meetup k8s_aug_2019dhubbard858
 
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...NetworkCollaborators
 
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationCisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationNetworkCollaborators
 
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldCisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldNetworkCollaborators
 
Cisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights onCisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights onNetworkCollaborators
 
Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy  Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy NetworkCollaborators
 
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructureCisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructureNetworkCollaborators
 
Cisco Connect 2018 Singapore - The Network Intuitive
Cisco Connect 2018 Singapore - The Network IntuitiveCisco Connect 2018 Singapore - The Network Intuitive
Cisco Connect 2018 Singapore - The Network IntuitiveNetworkCollaborators
 

What's hot (20)

CIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud AdoptionCIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud Adoption
 
Shadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining ControlShadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining Control
 
CipherCloud for Any App
CipherCloud for Any AppCipherCloud for Any App
CipherCloud for Any App
 
SafeNet: Don't Leave It to Luck: What am I Not Doing?
SafeNet: Don't Leave It to Luck: What am I Not Doing?SafeNet: Don't Leave It to Luck: What am I Not Doing?
SafeNet: Don't Leave It to Luck: What am I Not Doing?
 
Enterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without CompromiseEnterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without Compromise
 
Automate compliance with cloud guard dome9
Automate compliance with cloud guard dome9Automate compliance with cloud guard dome9
Automate compliance with cloud guard dome9
 
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXCisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMX
 
Dome9 Public Cloud Security
Dome9 Public Cloud SecurityDome9 Public Cloud Security
Dome9 Public Cloud Security
 
CASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the CloudCASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the Cloud
 
Cisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response ServicesCisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response Services
 
Hardware Security Modules: Critical to Information Risk Management
Hardware Security Modules: Critical to Information Risk ManagementHardware Security Modules: Critical to Information Risk Management
Hardware Security Modules: Critical to Information Risk Management
 
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...
 
Kubernetes meetup k8s_aug_2019
Kubernetes meetup k8s_aug_2019Kubernetes meetup k8s_aug_2019
Kubernetes meetup k8s_aug_2019
 
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
 
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationCisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security Equation
 
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldCisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
 
Cisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights onCisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights on
 
Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy  Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy
 
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructureCisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
 
Cisco Connect 2018 Singapore - The Network Intuitive
Cisco Connect 2018 Singapore - The Network IntuitiveCisco Connect 2018 Singapore - The Network Intuitive
Cisco Connect 2018 Singapore - The Network Intuitive
 

Viewers also liked

Finding the Right Balance: Security vs. Performance with Network Storage Systems
Finding the Right Balance: Security vs. Performance with Network Storage SystemsFinding the Right Balance: Security vs. Performance with Network Storage Systems
Finding the Right Balance: Security vs. Performance with Network Storage SystemsArun Olappamanna Vasudevan
 
BSides London - Scapy Workshop
BSides London - Scapy WorkshopBSides London - Scapy Workshop
BSides London - Scapy WorkshopAdam Maxwell
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challengexKinAnx
 
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
SOME SECURITY CHALLENGES  IN CLOUD COMPUTINGSOME SECURITY CHALLENGES  IN CLOUD COMPUTING
SOME SECURITY CHALLENGES IN CLOUD COMPUTINGHoang Nguyen
 
Cloud Computing 101 Workshop Sample
Cloud Computing 101 Workshop SampleCloud Computing 101 Workshop Sample
Cloud Computing 101 Workshop SampleAlan Quayle
 
Build Cloud & Mobile App on Salesforce Force.com Platform in 15 mins
Build Cloud & Mobile App on Salesforce Force.com Platform in 15 minsBuild Cloud & Mobile App on Salesforce Force.com Platform in 15 mins
Build Cloud & Mobile App on Salesforce Force.com Platform in 15 minsKashi Ahmed
 

Viewers also liked (6)

Finding the Right Balance: Security vs. Performance with Network Storage Systems
Finding the Right Balance: Security vs. Performance with Network Storage SystemsFinding the Right Balance: Security vs. Performance with Network Storage Systems
Finding the Right Balance: Security vs. Performance with Network Storage Systems
 
BSides London - Scapy Workshop
BSides London - Scapy WorkshopBSides London - Scapy Workshop
BSides London - Scapy Workshop
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
SOME SECURITY CHALLENGES  IN CLOUD COMPUTINGSOME SECURITY CHALLENGES  IN CLOUD COMPUTING
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
 
Cloud Computing 101 Workshop Sample
Cloud Computing 101 Workshop SampleCloud Computing 101 Workshop Sample
Cloud Computing 101 Workshop Sample
 
Build Cloud & Mobile App on Salesforce Force.com Platform in 15 mins
Build Cloud & Mobile App on Salesforce Force.com Platform in 15 minsBuild Cloud & Mobile App on Salesforce Force.com Platform in 15 mins
Build Cloud & Mobile App on Salesforce Force.com Platform in 15 mins
 

Similar to CipherCloud for Salesforce - Solution Overview

Windstream Cloud Security Presentation
Windstream Cloud Security PresentationWindstream Cloud Security Presentation
Windstream Cloud Security PresentationIdeba
 
Shedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingShedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingCipherCloud
 
CipherCloud's Solutions for Salesforce Chatter
CipherCloud's Solutions for Salesforce ChatterCipherCloud's Solutions for Salesforce Chatter
CipherCloud's Solutions for Salesforce ChatterCipherCloud
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseCyren, Inc
 
Webinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityWebinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityCyren, Inc
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or looseBjørn Sloth
 
How to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber AttacksHow to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber AttacksSkycure
 
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseWebinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseCyren, Inc
 
Segurity Empower Business
Segurity Empower BusinessSegurity Empower Business
Segurity Empower BusinessNextel S.A.
 
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudOracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudIndus Khaitan
 
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Cyren, Inc
 
CipherCloud_Corporate Overview
CipherCloud_Corporate OverviewCipherCloud_Corporate Overview
CipherCloud_Corporate OverviewScott Dierks
 
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityIBM Security
 
Cisco Live Cancun PR Session
Cisco Live Cancun PR SessionCisco Live Cancun PR Session
Cisco Live Cancun PR SessionFelipe Lamus
 
Moving from a Data Center to a Hybrid IT Environment Securely
Moving from a Data Center to a Hybrid IT Environment SecurelyMoving from a Data Center to a Hybrid IT Environment Securely
Moving from a Data Center to a Hybrid IT Environment SecurelyJeff Green
 
C-Level tools for Cloud security
C-Level tools for Cloud securityC-Level tools for Cloud security
C-Level tools for Cloud securityVladimir Jirasek
 
CeBIT 2015 Presentation
CeBIT 2015 PresentationCeBIT 2015 Presentation
CeBIT 2015 PresentationCyren, Inc
 
Enterprise Mobility: Secure Containerization
Enterprise Mobility: Secure ContainerizationEnterprise Mobility: Secure Containerization
Enterprise Mobility: Secure ContainerizationDomenico Catalano
 

Similar to CipherCloud for Salesforce - Solution Overview (20)

Windstream Cloud Security Presentation
Windstream Cloud Security PresentationWindstream Cloud Security Presentation
Windstream Cloud Security Presentation
 
Shedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingShedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File Sharing
 
CipherCloud's Solutions for Salesforce Chatter
CipherCloud's Solutions for Salesforce ChatterCipherCloud's Solutions for Salesforce Chatter
CipherCloud's Solutions for Salesforce Chatter
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for Enterprise
 
Webinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityWebinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud Security
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or loose
 
How to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber AttacksHow to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber Attacks
 
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseWebinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of Defense
 
Segurity Empower Business
Segurity Empower BusinessSegurity Empower Business
Segurity Empower Business
 
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudOracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
 
Portfolio security, analytics and forensic blue coat
Portfolio security, analytics and forensic blue coatPortfolio security, analytics and forensic blue coat
Portfolio security, analytics and forensic blue coat
 
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
 
CipherCloud_Corporate Overview
CipherCloud_Corporate OverviewCipherCloud_Corporate Overview
CipherCloud_Corporate Overview
 
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud Security
 
Cisco Live Cancun PR Session
Cisco Live Cancun PR SessionCisco Live Cancun PR Session
Cisco Live Cancun PR Session
 
Moving from a Data Center to a Hybrid IT Environment Securely
Moving from a Data Center to a Hybrid IT Environment SecurelyMoving from a Data Center to a Hybrid IT Environment Securely
Moving from a Data Center to a Hybrid IT Environment Securely
 
C-Level tools for Cloud security
C-Level tools for Cloud securityC-Level tools for Cloud security
C-Level tools for Cloud security
 
C-Level tools for Cloud strategy decisions
C-Level tools for Cloud strategy decisionsC-Level tools for Cloud strategy decisions
C-Level tools for Cloud strategy decisions
 
CeBIT 2015 Presentation
CeBIT 2015 PresentationCeBIT 2015 Presentation
CeBIT 2015 Presentation
 
Enterprise Mobility: Secure Containerization
Enterprise Mobility: Secure ContainerizationEnterprise Mobility: Secure Containerization
Enterprise Mobility: Secure Containerization
 

Recently uploaded

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Recently uploaded (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

CipherCloud for Salesforce - Solution Overview

  • 1. © 2013 CipherCloud | All rights reserved. 1© 2013 CipherCloud | All rights reserved. CipherCloud for Salesforce DISCOVER ● PROTECT ● MONITOR
  • 2. © 2014 CipherCloud | All rights reserved. 2 HowCipherCloud EnhancesSalesforce Protecting sensitive data from leaks Extending corporate DLP to the cloud Preventing unauthorized access to data Maintaining application functionality Monitoring user and data activity Detecting anomalies in user behavior Data Loss Prevention Data Protection Activity Monitoring
  • 3. © 2014 CipherCloud | All rights reserved. 3 Protecting Sensitive Data in theCloud Ground breaking security controls Protect sensitive information in real time, before it is sent to the cloud while preserving application usability. Searchable Strong Encryption Key Management Tokenization Malware Detection Data Loss Prevention
  • 4. © 2014 CipherCloud | All rights reserved. 4 CipherCloud for Salesforce – Features & Benefits
  • 5. © 2014 CipherCloud | All rights reserved. 5 Direct drill down to source of DLP violations in Salesforce Comprehensive dashboard views of all policies violationsOn-demand scanning of any Salesforce Org Cloud Data Loss Prevention
  • 6. © 2014 CipherCloud | All rights reserved. 6© 2014 CipherCloud | All rights reserved.6 Encrypted data is indecipherable to unauthorized users Transparent to users Preserves application functionality Encryption keys never leave the enterprise • Encryption or tokenization at the enterprise gateway • Minimal latency • Integrated malware detection CipherCloud Encryption Process
  • 7. © 2014 CipherCloud | All rights reserved. 7© 2014 CipherCloud | All rights reserved.7 Tokenized data is indecipherable Complete visibility for all user cloud activity • Sensitive data remains in the organization • Only random tokens go to the cloud • Real-time tokenization • Near-zero latency • Malware detection • Transparent to users • Preserves usability and functionality CipherCloudTokenization Process Secure Internal Database
  • 8. © 2014 CipherCloud | All rights reserved. 8© 2014 CipherCloud | All rights reserved.8 Unauthorized User Authorized User Outsiders going directly to Salesforce can’t access encrypted fields Users going through the CipherCloud gateway have full access to Salesforce NoAccess toUnauthorizedUsers
  • 9. © 2014 CipherCloud | All rights reserved. 9© 2014 CipherCloud | All rights reserved.9 Data is encrypted field-by-field basis, based on your security policies Credit card numbers fully encrypted with AES 256 Fields can be partially encrypted Authorized User Unauthorized UserUnited Oil & Gas Encryption on a field-by-field Basis
  • 10. © 2014 CipherCloud | All rights reserved. 10© 2014 CipherCloud | All rights reserved.10 Encryption can be conditional, based on a field setting Conditional Encryption
  • 11. © 2014 CipherCloud | All rights reserved. 11© 2014 CipherCloud | All rights reserved.11 CloudActivity Monitoring andAnomaly Detection Tracking of all user activity, downloads, logins, data access Extensive dashboard and drill- down capabilities Tracking Automated detection of anomalous user behavior
  • 12. © 2014 CipherCloud | All rights reserved. 12© 2014 CipherCloud | All rights reserved.12 Full support for unstructured Chatter posts & attachments Support # tags and @ mentions CipherCloud forChatter
  • 13. © 2014 CipherCloud | All rights reserved. 13 CipherCloud forSalesforce -At aGlance Protects  Salesforce Sales Cloud  Salesforce Service Cloud  Salesforce Marketing Cloud  Salesforce Chatter  Salesforce 1 Platform Capabilities  Cloud Data Loss Prevention (DLP)  AES 256-bit Encryption,  Key Management  Tokenization  Cloud Malware Detection  User Activity Monitoring  Anomaly Detection
  • 14. © 2014 CipherCloud | All rights reserved. 14 Top 3 US Bank’s Consumer Self- Service Loan Origination Portal UK Education Organization Deploys Global Cloud-Based Portal Major European Telco Consolidates Call Centers for 25 Countries Largest Hospital Chain Meets HIPAA & HITECH in the Cloud Top Canadian Bank Safeguards Proprietary Information in the Cloud Major Wall Street Firm Adopts Cloud Applications with Confidence New Zealand Bank Collaborates in the Cloud and Meets Compliance Government-Owned Mortgage Backer Protect PII Data in the Cloud High-Profile Federal Office Moves Public CRM Data to the Cloud Australian Insurer Reaches Customers Through Cloud-Based Portal Investment Fund Giant Consolidates CRM While Assuring Compliance Global Enterprises usingCipherCloud forSalesforce Canadian Provincial Government Tokenizes Cloud data for Residency Requirements Cable & Media Giant Adds Collaboration with Content Controls Government-Owned Mortgage Backer Protects PII Data in the Cloud Top Australian Bank Tokenizes Sensitive Chatter Posts Health Insurance Provider Delivers Safe Cloud Portal to Patients Click on the image to read Case-study
  • 15. © 2014 CipherCloud | All rights reserved. 15 CipherCloud forSalesforce - Product Resources CipherCloud forSalesforce Datasheet Online Demo of CipherCloud forSalesforce Online Demo of CipherCloud forChatter BestPractices forCloud Information Protection in Financial Services Cloud Information Protection Overview
  • 16. © 2014 CipherCloud | All rights reserved. 16 AboutCipherCloud Awards Cool Vendor Solutions Cloud Discovery Cloud DLP Strong Encryption Tokenization Activity Monitoring Anomaly Detection 500+ Employees Company 3.0+ Million Active Users 13 Industries 25 Countries 7 Languages P 13 Patents
  • 17. © 2014 CipherCloud | All rights reserved. 17 More Information For additional information : • Website: www.ciphercloud.com • Email: info@ciphercloud.com • Phone: +1 855-5CIPHER Check out our Global Compliance Center Twitter.com/ciphercloud Youtube.com/user/CipherCloudVideo Linkedin.com/company/ciphercloud Facebook.com/ciphercloud Connect with Us!

Editor's Notes

  1. Privacy regulations and corporate data governance issues continue to block many enterprises from realizing the full business benefits of Salesforce. CipherCloud helps remove these barriers by providing tools to detect compliance violations, provide strong protection for sensitive data, and monitor your Salesforce user activity for anomalous behavior.
  2. With CipherCloud for Salesforce you can: Discover what your users are doing in the cloud and prevent data loss with detailed and precise visibility over all activity in Salesforce. Protect your cloud data with strong encryption (FIPS 140-2 validated), tokenization, and malware protection to ensure that no unauthorized users can access sensitive information. Monitor cloud usage with complete visibility over user activity and alerting on user behavior anomalies
  3. The Cloud Data Loss Prevention (DLP) module enables you to extend your corporate data security policies to the cloud, providing detailed visibility over sensitive business data in Salesforce and Salesforce Chatter. The solution is tightly integrated with the entire Salesforce platform and understands all types of objects and data stored in the cloud. With a single click, you can scan your Salesforce Orgs and Salesforce Chatter content to quickly spot violations of your content policies. CipherCloud provides out-of-the-box DLP controls and policies that can detect compliance violations of HIPAA/HITECH, GLBA, PCI, ABA, SWIFT, and NDC codes. The module can also integrate enterprise DLP systems, such as Symantec, RSA, or Intel Security (McAfee). Results are delivered in clear, intuitive, and configurable dashboards. Easy drill-downs let you view specific user information and spot the exact source of policy violations directly in Salesforce. Any information captured by CipherCloud can be easily exported to a range of report formats.
  4. CipherCloud gives you a control point for corporate data going to and from the cloud. All your users—internal, remote, or mobile—can seamlessly access Salesforce and Salesforce Chatter, while enabling you to enforce your company’s security policies. CipherCloud Data Protection provides FIPS 140-2 validated encryption or tokenization for data before the data goes to the cloud. Malware detection is also available as an added safeguard, scanning your data for threats before it goes into Salesforce. High-performance scanning engines detect the latest threats (viruses, spyware, network worms, Trojans, bots, rootkits, and more) and clean or quarantine infected content on-the-fly, without adding noticeable latency.
  5. CipherCloud also provides tokenization to meet the most stringent data residency requirements. With tokenization, randomly generated values are substituted for the original data, which does not leave the enterprise. The original data and mappings for the tokens are stored locally in a JDBC-compliant database.
  6. Only your authorized users have access to protected data in Salesforce. Unauthorized users will only see indecipherable codes.
  7. Granular controls let you select protection options on a field-by-field basis for structured or free-form Salesforce data. CipherCloud offers multiple strong encryption options that preserve formats, partial field encryption, and Searchable Strong Encryption (SSE). You can mix and match encryption or tokenization methods to meet your specific data protection requirements.
  8. CipherCloud’s patented technology enables you to retain the format and functioning of Salesforce, even when data is encrypted or tokenized. This enables your Salesforce users to search, sort, and report on protected data in Salesforce.
  9. No protection solution is complete without ongoing usage and activity monitoring. The Activity Monitoring and Anomaly Detection modules provide you with the tools to quickly and effectively respond to security events or policy violations. The interactive dashboard provides complete visibility into ongoing user activity, along with anomaly detection that can help you identify system misuse in real-time. Events are monitored against historic usage patterns, identifying anomalous behaviors that could be a sign of malicious use or an account breach. You can easily configure thresholds and dashboard alerts on any unusual user activity that might indicate problems. This includes activity such as excessive downloads, after-hours activity, or unauthorized access to sensitive content. Thresholds can be automatically or manually configured to minimize false positives.
  10. CipherCloud for Salesforce includes deep integration with Chatter, providing Cloud DLP, encryption, tokenization, and activity monitoring for unstructured Chatter posts and file attachments. The solution provides seamless support for Chatter # tags and @ mentions, maintaining the searchability of encrypted Chatter posts.
  11. CipherCloud works with the entire Salesforce Platform, providing deep integration with popular Salesforce products including Sales Cloud, Service Cloud, Marketing Cloud and Chatter. In addition, the CipherCloud Extensible Platform can support any type of custom application built on the Salesforce1 Platform, as well as a wide range of third-party applications available on the AppExchange ecosystem.
  12. CipherCloud for Salesforce is typically deployed as an in-line solution between users and Salesforce. Acting as a gateway, CipherCloud for Salesforce is positioned to transparently inspect data and apply data protection policies before the data goes to Salesforce. Designed for high-performance and availability, the CipherCloud for Salesforce gateway adds virtually zero latency, maintaining the normal Salesforce user experience. CipherCloud for Salesforce integrates with your existing single sign-on tools and, with only a simple URL redirect required, your users can access Salesforce as usual and without change to the user experience. Because of the in-line architecture, CipherCloud for Salesforce is able to monitor and analyze Salesforce content and all user activity. Deeply integrated with Salesforce, the solution is aware of all your Salesforce data fields, enabling it to scan and analyze data entered into Salesforce, both through the CipherCloud gateway and out of band.