<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=523033&amp;fmt=gif">

Security and Access Reviews for Salesforce

Secure and Manage your Salesforce Data

You may not traditionally think of Salesforce when you hear audit, but that is quickly changing. As pricing and price discounting become a larger focus for external auditors, and the General Data Privacy Regulation is enacted, Salesforce (SFDC) slides into the ever-changing scope of audit for public companies. Additionally, as companies leverage more of the Force.com platform to solve business issues and gaps, more and more of a company's financial information will come from SFDC. Existing rules around data security and customer privacy may already impact your business. Do you know who has access to your Salesforce data? Do you have sales people no longer on the payroll, but their login still can access to the platform and make changes?

The Fastpath Assure® Access Risk Monitor makes these security access reviews easy. Data imported via pre-configured APIs can be presented in scheduled reports and sent to constituents on a pre-defined basis. You can even add Segregation of Duties (SOD) or Sensitive Access (SA) reporting to create a multi-dimensional control process. With Fastpath Assure, you can simplify your compliance process, increasing your application access security and reducing your risk of error!

Fastpath's Identity Manager allows users to request new or modify existing application access changes with the security of an approval process, audit reports of requests and approvals, and all without the need for IT intervention.

Using Fastpath's Audit Trail functionality, companies can focus on the highest risk business objects and attributes to monitor changes. Leveraging the auditor designed templates included in the module, tracking critical changes is simple and straightforward with minimum impact to system performance. Audit Trail delivers detailed analysis allowing users to track changes to configurations and master data including the source of change, the user initiating the change, as well as before/after values. Specifically for Salesforce, users can detect Setup and Object changes down to the field level for all Standard and Custom objects in the connected Salesforce environment.

FEATURES

  • Quickly analyze security conflicts within and across profiles and permission sets
  • Analyze segregation of duties by user, organization, system, or object permission
  • Platform supports simple sign-off for mitigations
  • Automate security with report scheduling for delivery in many formats (Excel, PDF, etc.)
  • User friendly report customization
  • Visibility into SOD and SA risks during requests and approvals
  • Multi-level management approval structures
  • Assign emergency or temporary access
  • Assists in regulation compliance (SOX, HIPAA, FDA, etc)
  • Cross-platform analysis for security across multiple ERP, CRM, XRM, or HCM applications
  • Track critical setup and configuration changes made to Salesforce
  • Standard Audit Trail templates make implementation quick for immediate ROI
  • Review and sign off on any changes found in Audit Trail
  • Capture before and after values, including items that have been deleted

Ready for a customized product demo? Book a demo here.

FinancialForce access reviews  Critical Access

FinancialForce Cross Platform security  Cross-Platform

Make Your Audit & Compliance Programs Shine

Auditing your business is usually a major time consuming task using multiple separate applications. This webinar discusses how you can integrate your many tools and efficiently use them to save time, while correctly securing your company. Read More

Segregation of Duties - Video

SoD isn’t just for big companies. It’s an important control point for preventing errors, misstatements, and fraud in any size firm. Watch the video to explore the importance of segregation of duties and options available for implementing SoD in your ERP. Read More
RAPID INSTALL
AUDIT EXPERTS ON STAFF INCLUDING CIA, CISA, CPA & CRISC
SKILLFUL AND ATTENTIVE SERVICE & SUPPORT PROFESSIONALS
UNLIMITED USERS
How-To Risk Assessment Guide

Step-by-Step Risk Assessment Guide

If you're looking for a step-by-step plan to help you get started on an overall risk assessment, and a plan for correction, this paper is for you. Inside you will learn how to begin, and then execute on, developing your own risk assessment plan.

Download the Guide

Designing Oracle ERP Cloud Security

How-To Guide for Designing Oracle ERP Cloud Security

Building A Strong Security Architecture for Oracle ERP Cloud - Protect your company with this Step-by-Step approach. For companies looking to move to Oracle ERP Cloud, it is critical to include a strong application security design aimed to deter fraud, and ensure that transactions performed in the cloud are appropriate and authorized. Whether you're implementing or redesigning your Oracle project, follow this guide to achieve a secure Oracle ERP Cloud system and avoid the common pitfalls in the process.

Get the report here!

Use this Dynamics 365FO Matrix to Design Your Security Roles

Use this Dynamics 365FO Matrix to Design Your Security Roles


Building roles and implementing strong security in D365FO can be a daunting task, so we created a tool to assist in designing security roles for Dynamics 365 for Finance and Operations.

Get the Matrix!

Access Controls In SAP - The What And How Of SAP Security

Access Controls In SAP - The What And How Of SAP Security

Whether you know the importance of access controls or not, implementing and maintaining them can still be a difficult part of your SAP security plan. This eBook reviews what access controls are, how SAP handles them, how you should implement and maintain them, and even suggests some tools to make the process easier on you.

Download the Paper