Data-first security for Salesforce

May 18, 2022
12 p.m. ET

As the market’s leading CRM, Salesforce houses some of your organization’s most valuable data — whether that’s customer and prospect information, contracts, or support cases. But what many security teams don’t realize is the depth and breadth at which Salesforce acquires and houses information.

For example, if a bank were to build an app using Salesforce, guess what would happen when you upload your financial documents with your mortgage application? All that information ends up in Salesforce as files and attachments. And there’s no way to find, classify, or protect these files natively in Salesforce.

Join us as we dive into the complexities of Salesforce and debut brand-new functionality in Varonis for Salesforce. We'll help you locate regulated data in the hardest-to-find places and show you where it's at risk with never-before-seen permissions views that will revolutionize how you protect your data.

Register now


About Rob

Rob Sobers has been writing and designing software for more than 20 years and is coauthor of the book Learn Ruby the Hard Way, which has been used by millions of students to learn the Ruby programming language.

Rob Sobers
Chief Marketing Officer

About David

David is a Certified Information Systems Security Professional (CISSP) and speaks on topics related to cybersecurity and technology. He speaks at industry conferences and has been quoted in The New York Times, USA Today, The Washington Post and more.

David Gibson
Senior VP of Strategic Programs

About Ryan

Ryan O’Boyle, GCIH, is the Sr. Manager of Cloud Architecture and Operations at Varonis. Ryan has an engineering background with experience in IT infrastructure, incident response, and data protection.


Ryan O'Boyle
Senior Manager, Cloud Architecture and Operations

Attendees will have three chances to win one of these amazing prizes.


iRobot Roomba

Apple Air Pods

Apple Air Pods

Ninja Grill

Ninja Grill

We had eight instances of Salesforce and it was a gaping black hole. I'd heard horror stories about Salesforce permissions and how literally hundreds can be applied in a manner of different ways, but I didn't realize how complicated our permission sets had grown.

Senior Cybersecurity Engineer, Real Estate Organization
Reduce your risk without taking any.
Request a demo