• How do you know if someone else may be logging in as you? What if one of your employees was tricked
    into revealing their login information?

  • Humans are the weakest link in cybersecurity,
    contributing to at least 95% of all secuirty incidents.

  • How would you know if someone else
    is logging into Salesforce.com as you?

  • Who is logged in right now,
    and where are they logging in from?

How do you monitor your Salesforce.com logins?

For enterprises currently using the Salesforce.com or Force.com platform, you understand that Salesforce.com offers many layers of security that protect your data and limit access to your data.  However most corporate security breaches are not due to technical loopholes in software and architecture, they are due to human vulnerabilities.  For example, a hacker tricks someone into revealing their username and password and then they login remotely, undetected.  Today’s popular Intrusion Detection and Prevention Software only works at the network and host level and do not include login location analysis. We provide login location information with mapping, rules and alerts to prevent fraudulent logins.

Intrusion Detection with Login Locator for Salesforce.com

As a Systems Administrator or Information Security Officer, how do you know where your users are logging in from?  Are you alerted if they login from a foreign country or from two locations geographically distant from each other?  Do you currently monitor or take action on failed login attempts?

Idaho Palm Software offers Intrusion Detection with Login Locator(IDLL) in the Salesforce.com AppExchange to combat this vulnerability.  IDLL takes information from the Salesforce.com platform’s login history table and obtains IP location information to provide administrators an actual location for each login.

Screenshot

 

Now Available

Free Trial / Purchase

 

Demo Video

 

Did you Know?

Fortune Magazine

Most companies believe they'll be hacked in 2015, poll shows 

A common refrain among security professionals goes like this. There are two kinds of companies in the world: those that know they’ve been hacked, and those that have been hacked and don’t yet know it.  More.

CNBC

Top 5 cybersecurity risks for 2015

From identity theft and fraud to corporate hacking attacks, cybersecurity has never been more important for businesses, organizations and governments.  More.