Author: Beverly Nevalga, Associate Director of Content Marketing, AppOmni
-
ServiceNow Security Handbook
Get a solid understanding of ServiceNow’s unique SaaS security risks and learn how to effectively mitigate them with this Security Handbook.
-
Salesforce Security Handbook
Get a solid understanding of Salesforce’s unique SaaS security risks and learn how to effectively mitigate them with this Product Guide.
-
Identity Threat Detection and Response (ITDR)
Identity Threat Detection and Response (ITDR) refers to a cybersecurity approach focused on identifying, detecting, and mitigating threats targeting identity and access…
-
SaaS Attack
An attack vector is a means for exploiting a computer system that places it, its network, and the sensitive information it contains…
-
Automatic computer system change monitoring and security gap detection system
A system and method for monitoring changes to a computer system and detecting security gaps. The system includes a change monitor, a…
-
Classification management
A system and method for managing classification of data. The system includes a classification engine, a classification repository, and a classification interface.…
-
Classification management
A system and method for managing classification of data. The system includes a classification engine, a classification repository, and a classification interface.…
-
Remediation of detected configuration violations
A system and method for remediating detected configuration violations. The system includes a configuration monitor, a violation detector, and a remediation engine.…
-
Dynamic Evaluation of Data Store Access Permissions
A system and method for dynamically evaluating data store access permissions. The system includes a data store, an access controller, and a…
-
Event Stream-Based Threat Detection
A system and method for detecting threats in an event stream. The system includes an event stream processor, a threat detector, and…


