Skip to content

SpotMon

Monitor & investigate Salesforce user activity with ease

The turnkey solution for Salesforce Shield Event Monitoring

spotlight monitor

Key questions SpotMon answers

For Salesforce Owners

  • We noticed suspicious activity for this user. What did this user do?​
  • How did this user's behavior align with our thresholds and compare with their peers?​
  • An employee has given their notice. How do we track their activity more tightly?​​

For Risk Owners

  • Would we know if someone took or attempted to take our data? Could we prove it?
  • Do we have appropriate Detect & Response capabilities for our Salesforce instance?​
  • How would we investigate impact when a vulnerability is identified?

How SpotMon works

1. Establish normal baseline & tolerance levels
  • Establish the right tolerance levels for your business
  • Apply different tolerances to different user cohorts (e.g. Developer vs. Admin)
Tolerances
top violators 2
2. Monitor & identify potential suspicious user activity
  • Real-time alerts for highly unusual or suspicious activities
  • Daily summaries and comprehensive reporting over-time to identify trends or patterns
  • Add suspicious users to Watchlist and closely monitor
  • Look into specific user activities over time, helping identify patterns or confirm whether a data breach or policy violation occurred.
3. Investigate & inform action
  • Drill down into specific user actions, review timestamps, and cross-reference with other user activities or logs
  • Pinpoint the exact nature of suspicious activities
  • Better understand their intent and determine if further action is needed
Investigate - Screenshot crop

Why SpotMon

  • Provides a straightforward turnkey solution for monitoring and investigating Salesforce user activity
  • Built by Salesforce Shield experts
  • Designed for small and mid-market customers

Get a Demo

Schedule a personalized demo of SpotMon