Skip to content

SpotMon

Identify Bad Actors in Salesforce

Get real-time alerts of suspicious activity

spotlight spotmon

Key questions SpotMon answers for...

Salesforce Owners

  • A disgruntled employee has given their notice – how do we track their activity more tightly?​​
  • How do we get notified of suspicious activity? And what exactly did that user do?
  • How did this user's behavior align with our thresholds and compare with their peers?​

Risk Owners

  • Would we know if someone took or attempted to take our data? Could we prove it?
  • Do we have appropriate Detect & Response capabilities for our Salesforce instance?​
  • How would we investigate impact when a vulnerability is identified?

How SpotMon works

1. Automatically generated tolerance levels
Tolerance levels are auto generated based on your company's user behavior
spotlight adjust tolerances 3
spotlight spotmon
2. Monitor suspicious user activity
Get real-time alerts for highly unusual or suspicious activities

 

3. Investigate & take action
Pinpoint the exact nature of suspicious activities
spotlight investigate (3)

Why SpotMon

  • 60% of data breaches are from internal users

  • SpotMon is a turnkey solution for Salesforce Event Monitoring and investigating Salesforce user activity

  • Built by Salesforce Shield experts

  • Purpose built for small and mid-market customers

Get a Free Trial