Varonis Debuts Trailblazing Features for Securing Salesforce

Learn More

✕
Skip navigation
  • Platform
    • Products
    • Overview
    • Data Protection
      • > DatAdvantageData audit & protection
      • > Automation EngineData remediation
      • > DataPrivilegeData access governance
      • > Data Transport EngineAutomated policy enforcement
    • Threat Detection & Response
      • > DatAlertData-centric UBA
      • > EdgePerimeter detections for DatAlert
      • > Varonis for Active DirectoryAnomaly detection & hardening
    • Privacy & Compliance
      • > Data Classification EngineSensitive data discovery
      • > Policy PackGDPR & CCPA discovery policies
      • > Federal Policy PackTop secret & CUI discovery policies
      • > Data Classification LabelsSensitive data labeling
      • > DatAnswersDSARs, e-Discovery, PII search
    • Cloud Security
      • > DatAdvantage CloudSaaS & IaaS Security
      • > Data Classification CloudSensitive data discovery
      • > Varonis for Microsoft 365Data-centric security for M365
      • > Varonis for SalesforceData-centric security for Salesforce
    • See all products
    •  
    • Learn more
    • How It Works
    • Integrations
    • Third-party Apps
    • Pricing
  • Solutions
    • By Industry
      • Finance
      • Healthcare
      • Federal Government
      • Education
      • Manufacturing
      • State & Local Government
    • By Use Case
      • Cloud Data Protection
      • Data Classification
      • Data Loss Prevention
      • Data Privacy & DSARs
      • Insider Risk Management
      • Ransomware Prevention
      • Zero Trust
    • By Technology
      • > Microsoft 365
      • > Windows File Shares
      • > Active Directory
      • > Google Drive
      • > Salesforce
      • > Nasuni
      • > UNIX/Linux
      • > Box
      • > Slack
      • > Okta
      • > GitHub
      • > NetApp
      See all integrations
  • Why Varonis?
    • Case Studies
    • Operational Plan
    • Industry Recognition
    • Customer Success
    • IR & Forensics Team
    • Measurable ROI
  • Company
    • About Varonis
    • Careers
    • Investor Relations
    • Press
    • Corporate Responsibility
    • Trust & Security
    • Brand
    • Contact Us
  • Partners
    • Partner Program
    • Partner Locator
    • Partner Portal
    • Service Providers
    • Technology Partners
  • Resources
    • Support
    • Resource Library
    • Blog
    • Free Security Courses
    • Product Training
    • SecurityFWD
    • Webinars
    • Events
  • Contact Us
    • Get support
    • +1 (877) 292-8767
  • Contact us
    • Get a demo
    • Get support
    • +1 (877) 292-8767

Inside Out Security

  • English
  • French
  • German
  • Portuguese - Brazil
  • Russian
Featured | Threat Research |

Clock for time it takes to read article 6 min read

Spoofing SaaS Vanity URLs for Social Engineering Attacks

Many SaaS applications offer what’s known as vanity URLs — customizable web addresses for landing pages, file-sharing links, etc. Vanity URLs allow you to create a personalized...
Tal Peleg
By Tal Peleg

Latest posts

Data Security |

November 18, 2021

How to Monitor Network Traffic: Effective Steps & Tips
David Harrington
By David Harrington
Threat Research |

November 17, 2021

No Time to REST: Check Your Jira Permissions for Leaks
Omri Marom
By Omri Marom
Data Security |

November 17, 2021

What is Role-Based Access Control (RBAC)?
Neeraj Kumar
By Neeraj Kumar
Data Security |

November 17, 2021

What is a Security Operations Center (SOC)?
David Harrington
By David Harrington
Data Security |

November 16, 2021

INVEST in America Act: Billion-Dollar Funding for Cybersecurity
Nathan Coppinger
By Nathan Coppinger
Data Security |

November 12, 2021

Threat Update 64 - Escaping Einstein's Wormhole
Kilian Englert
By Kilian Englert
Data Security |

November 5, 2021

Threat Update 63 - Moving To The Cloud Doesn't Mean You Don't Own The Data Risk
Kilian Englert
By Kilian Englert
Data Security |

November 5, 2021

Cloud Applications Put Your Data At Risk - Here's How To Regain Control
Yaki Faitelson
By Yaki Faitelson
PowerShell |

November 3, 2021

How to Install and Import Active Directory PowerShell Module
Jeff Brown
By Jeff Brown
Threat Research |

November 2, 2021

Einstein's Wormhole: Capturing Outlook & Google Calendars via Salesforce Guest User Bug
Nitay Bachrach
By Nitay Bachrach
Prev 4 5 6 7 8 Next
  • English
  • Deutsch
  • Français
  • Português - Brasil
  • Русский
  • Legal
  • |
  • Trust
  • Legal
  • |
  • Trust
© 2022
Varonis