SlideShare une entreprise Scribd logo
1  sur  42
Télécharger pour lire hors ligne
Introducing: Salesforce Shield
The fastest way to build trusted apps
​ 
Safe harbor statement under the Private Securities Litigation Reform Act of 1995:
This presentation may contain forward-looking statements that involve risks, uncertainties, and assumptions. If any such uncertainties
materialize or if any of the assumptions proves incorrect, the results of salesforce.com, inc. could differ materially from the results expressed or
implied by the forward-looking statements we make. All statements other than statements of historical fact could be deemed forward-looking,
including any projections of product or service availability, subscriber growth, earnings, revenues, or other financial items and any statements
regarding strategies or plans of management for future operations, statements of belief, any statements concerning new, planned, or upgraded
services or technology developments and customer contracts or use of our services.
The risks and uncertainties referred to above include – but are not limited to – risks associated with developing and delivering new functionality
for our service, new products and services, our new business model, our past operating losses, possible fluctuations in our operating results and
rate of growth, interruptions or delays in our Web hosting, breach of our security measures, the outcome of any litigation, risks associated with
completed and any possible mergers and acquisitions, the immature market in which we operate, our relatively limited operating history, our
ability to expand, retain, and motivate our employees and manage our growth, new releases of our service and successful customer
deployment, our limited history reselling non-salesforce.com products, and utilization and selling to larger enterprise customers. Further
information on potential factors that could affect the financial results of salesforce.com, inc. is included in our annual report on Form 10-K for
the most recent fiscal year and in our quarterly report on Form 10-Q for the most recent fiscal quarter. These documents and others containing
important disclosures are available on the SEC Filings section of the Investor Information section of our Web site.
Any unreleased services or features referenced in this or other presentations, press releases or public statements are not currently available and
may not be delivered on time or at all. Customers who purchase our services should make the purchase decisions based upon features that are
currently available. Salesforce.com, inc. assumes no obligation and does not intend to update these forward-looking statements.
Safe Harbor
SNA
Terminal
Mainframe LAN / WAN
Client
Server
LAN / WAN
Client
Server
Cloud
Mobile
Social
Data Science
Thousands customer
interactions
connected
thingsBillions TrillionsMillions
The app revolution is opening up a world of innovation for businesses
Apps are generating more customer data than ever before
Apps
Financial Data
Health Data
Location Data
90% of the world’s data created in the last 12 months
World’s Most Trusted Enterprise Cloud
Trust is our #1 value
Five Elements of Trust
Transparency
Always on availability
Performance at scale
Global data centers
Enterprise compliance
Q1 Transactions
211B+
Customers
150k
Apps
2M+
Salesforce Trust Services
Infrastructure Services
AnalyticsCommunityMarketingServiceSales Apps
Network Services
Application Services
Secure Data
Centers
Backup and
Disaster Recovery
47 Major Releases
HTTPS
Encryption
Penetration
Testing
Advanced
Threat Detection
Identity & Single
Sign On
Two Factor
Authentication
User Roles &
Permissions
Field & Row
Level Security
Secure
Firewalls
Real-time
replication
Password
Policies
Third Party
Certifications
IP Login
Restrictions
Customer
Audits
150,000+ customers 2,000,000+ apps
Sixteen years of innovation on the world’s most trusted cloud
Introducing: Salesforce Shield
Infrastructure Services
Network Services
Application Services
Secure Data
Centers
Backup and
Disaster Recovery
HTTPS
Encryption
Penetration
Testing
Advanced
Threat Detection
Identity & Single
Sign On
Two Factor
Authentication
User Roles &
Permissions
Field & Row
Level Security
Secure
Firewalls
Real-time
replication
Password
Policies
Third Party
Certifications
IP Login
Restrictions
Customer
Audits
Salesforce Shield
Platform
Encryption
Event
Monitoring
Field
Audit Trail
New services to help you build trusted apps fast
​ Monitor User Activity
​ Know who is accessing data from where
Optimize Performance
​ Troubleshoot application performance to improve
end user experience
​ Track Application Usage
​ Understand application usage to increase adoption
Gain Visibility Into User Actions with Event Monitoring
Retain Field History for Up to 10 Years with Field Audit Trail
​ Establish Data Retention Policies
​ Know the state and value of data at any time
Access Retained Data at Scale
​ Normalize on big data back-end for performance
​ Comply with Industry Regulations
​ Secure data archive with the highest trust standards
Encrypt Sensitive Data While Preserving Business Functionality
​ Seamlessly protect data at rest
​ Encrypt standard & custom fields, files & attachments
​ 
Natively integrated with key Salesforce features
​ E.g., Search, Chatter, Lookups work with encrypted data
​ Customer managed keys
​ Customer-driven encryption key lifecycle management
Salesforce Shield
New services to help you build trusted apps fast
EncryptAuditMonitor
Platform EncryptionField Audit TrailEvent Monitoring
Salesforce Shield
The Event Monitoring Story
Auditing, Analytics and Actions at a Glance
Audit Fields Login History Setup Audit Trail Field History
Tracking
Field Audit Trail Event Monitoring
Purpose Track who
created or last
modified a record
user and time
Track end-user
logins and login
attempts (e.g.
failures)
Track
Administrative
changes in setup
like escalation of
privileges or
creation of new
fields
Track state changes at the field level Analysis: Track a variety of
server interactions including
report exports, page views,
and document downloads
Action: Automate actionable security
policies such as limiting data export
or notifying on concurrent login
sessions
Example Adam Torman
modified the
Acme account
earlier today
Adam Torman
logged in using
Chrome v 42.0 on
Mac OSX
Permission set
Modify All Data
assigned to user
Adam Torman
Adam Torman changed the Case
status from Open to Closed
Adam Torman clicked on
Marc Benioff’s patient record
and downloaded the
customer list
Jari Salomaa was prevented from
logging into his iPad until he removed
a previous login session
Interface Record Detail UI
and API
Setup UI and API Setup UI and API Setup / Related List UI and API API (CSV download) + Wave
Integration
Setup UI
[Profile or
Sharing]
Permission
s Required
*Read/Query
requires sharing
access to parent
record
Manage User
permission
*View Setup and
Configuration
permission
Configure requires Customize
Application permission
*Read/Query requires sharing access
to parent record
*View Event Log Files
permission AND
* View Login Forensics
Author Apex
AND
Customize Application
Data
Retention
Policy
Life of the record
/ 18 Months
depending on org
inception date
6 months FIFO 6 months FIFO 20 fields for 18
months
60 fields for 10
years
Up to 30 days for Event Log
Files and 10 years for Login
Forensics
N/A
Pricing $0 $0 $0 $0 ** $add-on $0 - Login/Logout Event Log Files for 1 day
** $add-on - 29 log files for 30 days + Login Forensics + Transaction
Security
Online Audit Fields Login History Setup Audit Field History Field Audit Event Monitoring Transaction Security
What we are hearing from CISOs
​ 1. Visibility to user activity
​ Report on what users are doing and where policies are
needed
​ 2. Generate security policies
​ Generate real-time actions such as notifications and proactive
prevention
​ 3. Automate actions from policies
​ Fine-tune your application portfolio and business process
​ 4. Analyze, monitor results and audit
​ Fine-tune your security policies and provide audit trails for
auditors
Two halves of the same solution
​  Analytics
​  Actions
Policy
Generation
Event
Capture
Historical
Analytics
Real Time
Actions
Cycle of
SecurityHistorical
Logs
User
Segmentation
Real-time
Analytics
Audit
Event
Generation
Policy
Deployment
Policy
Design
Policy
Customization
​ Analytics ​ Actions
Policy Design
Policy EnforcementData Capture and
Management
Reporting and
Audit
Analytics For Event Monitoring
​ Support
​ Provide better, data-driven support for your end users
​ Audit
​ Track your user’s activities
​ Optimize
​ Fine-tune your application portfolio and business process
Actions For Event Monitoring
​ Customizable Apex Policies
​ Framework auto-generated policies
​ Define Real Time Actions
​ Notify, Block, Force 2FA, Session Chooser
​ Enforce Session Constraints
​ Control the number of active user sessions
An Example
Concurrent Log Sessions
Problem set: Concurrent Login Sessions
●  Users should not be logged in to
more than ‘n’ sessions
●  Limit the number of concurrent
sessions to reduce risk with malicious
activities
○  FedRamp requirement
●  Security policy should understand
who will be impacted and prompt the
user to remove previous sessions
that no longer apply
Policy
Generation
Event
Capture
Historical
Analytics
Real Time
Actions
Cycle of
SecurityHistorical
Logs
User
Segmentation
Real-time
Analytics
Audit
Event
Generation
Policy
Deployment
Policy
Design
Policy
Customization
​ Analytics ​ Actions
Policy Design
Policy EnforcementData Capture and
Management
Reporting and
Audit
Analyze current login behaviors using analytics
Track login trends and ask questions:
●  Who will be impacted if you create a policy based
on Profile, Role, User, etc…?
●  What integrations may break?
●  How are user’s logging in - S1 Mobile, Web
Browser, integrations?
Policy
Generation
Event
Capture
Historical
Analytics
Real Time
Actions
Cycle of
Security
Historical
Logs
User
Segmentatio
n
Real-time
Analytics
Audit
Event
Generation
Policy
Deployme
nt
Policy
Design
Policy
Customizatio
n
Determine criteria for policy
By Profile:
●  System Admin Profile >= 2
By Role:
●  East Coast Exec Role >=5
By User:
●  Adam Torman OR Jari Salomaa
>=1
By Time:
●  Saturday OR Sundays >=1
Policy
Generation
Event
Capture
Historical
Analytics
Real Time
Actions
Cycle of
Security
Historical
Logs
User
Segmentatio
n
Real-time
Analytics
Audit
Event
Generation
Policy
Deployme
nt
Policy
Design
Policy
Customizatio
n
Decide which actions to take Policy
Generation
Event
Capture
Historical
Analytics
Real Time
Actions
Cycle of
Security
Historical
Logs
User
Segmentatio
n
Real-time
Analytics
Audit
Event
Generation
Policy
Deployme
nt
Policy
Design
Policy
Customizatio
n
Determine actions to take:
●  None
●  Block
●  2FA
●  Session Chooser
Customize Apex policy and add criteria
Customize the policy
●  Apply custom criteria such as
Profiles, Roles, Users, etc…
●  Work closely with your developers to
customize it for your design
Policy
Generation
Event
Capture
Historical
Analytics
Real Time
Actions
Cycle of
Security
Historical
Logs
User
Segmentatio
n
Real-time
Analytics
Audit
Event
Generation
Policy
Deployme
nt
Policy
Design
Policy
Customizatio
n
Deploy policy
Deployment is as easy as selecting a
checkbox on the policy
Policy
Generation
Event
Capture
Historical
Analytics
Real Time
Actions
Cycle of
Security
Historical
Logs
User
Segmentatio
n
Real-time
Analytics
Audit
Event
Generation
Policy
Deployme
nt
Policy
Design
Policy
Customizatio
n
Real-time action policy enforcement
In real-time, users will be forced to take an action based on
the criteria you created
Policy
Generation
Event
Capture
Historical
Analytics
Real Time
Actions
Cycle of
Security
Historical
Logs
User
Segmentatio
n
Real-time
Analytics
Audit
Event
Generation
Policy
Deployme
nt
Policy
Design
Policy
Customizatio
n
Analyze policy enforcement and Audit
Track how many 2FA or session chooser screens were
selected.
Policy
Generation
Event
Capture
Historical
Analytics
Real Time
Actions
Cycle of
Security
Historical
Logs
User
Segmentatio
n
Real-time
Analytics
Audit
Event
Generation
Policy
Deployme
nt
Policy
Design
Policy
Customizatio
n
Salesforce Platform Encryption
Strongly encrypt data at rest while preserving critical business functionality
​ Encrypt data at rest when it is stored on the App Cloud
​ Encrypt Standard & Custom Fields, Files, & Attachments
​ Customers manage their encryption keys on the App Cloud platform
What Problems We Solve
Why It’s Unique
Salesforce Platform Encryption
Quickly and seamlessly protect sensitive data
Setup takes minutes – no extra hardware or software
Makes the App Cloud ‘encryption aware’
Salesforce1 Mobile-ready, natively
Salesforce Platform Encryption
​ Encryption Services
​ Standards based
encryption built natively into
the App Cloud Platform
​ AES encryption using
256bit keys
​ Layers seamlessly with
other App Cloud security
features
​ Key Management
​ Customer driven key
lifecycle management
​ Uses secure derived keys
that are never persisted in
the App Cloud
​ Hardware Security Module
based key management
infrastructure
​ FIPS 140-2 compliant
​ Policy Management
​ Customer control over
policy configuration
​ Select fields, files, and
attachments to be
encrypted
​ Encryption controlled with
metadata to take
complexity out of
deployments
​ App Cloud Integration
​ Preserve important
functionality like search and
business rules
​ Built-in capabilities to
iteratively add additional
feature support
​ Features and Functionality Overview
Architecture Overview
Encrypted Fields Encrypted Files
AES 256
DATA
Database File Storage
FFX
Database File Storage
FFX
Database File Storage
FFX
Database File Storage
FFX
Key Derivation Server
Embedded HSM
Key Derivation Server
Embedded HSM
Key Derivation Server
Embedded HSM
Key Derivation Server
Embedded HSM
​ Keys and Secrets
​ Master Secret Master Wrapping Key
​ Master Salt Tenant Wrapping Key
Keys and Secrets
Key Derivation Server RSA Key Pair
Hardware Security Modules
​ Key Management Components
Master HSM Key Derivation Server
Embedded HSM
​ Functions
​ Generates Per-Release Secrets and Keys
​ Encrypts Secrets and Keys for Secure Distribution
​ Air-gapped from Production Network
Functions
Unwraps Per-Release Secrets and Keys
Generates and Encrypts Tenant Secret
Performs Key Derivation
​ Generated once per release by
Salesforce Security Officer using
air-gapped Master HSM
​ Encrypted with the Master
Wrapping Key and stored in Key
Derivation Servers
​ Decryptable only by Key
Derivation Server’s Private Key
and the Master Wrapping Key
​ Org-specific secret generated,
managed, and rotated by
customers
​ Manage via Setup or SOAP API
​ Encrypted using the per-release
Tenant Wrapping Key and stored
in the database
​ Decryptable only by Key
Derivation Server’s Private Key
and Tenant Wrapping Key
​ Created by Key Derivation
Servers via Password Based Key
Derivation Function
​ Decrypts and combines Master
and Tenant Secrets and Master
Salt as input to PBKDF2 function
​ Output of KDF is an Org-specific
Data Encryption Key used to
encrypt customer field values and
files
​ Derived keys are cached on the
App Cloud platform
Master Secret / Master Salt Tenant Secret Data Encryption Key
Key Derivation
​ Creating Org-specific Data Encryption Keys
Deriving Data Encryption Keys
Standards Based Key
Derivation Function:
PBDKF2 HMAC with
SHA256
Runs 15,000
Iterations
Outputs 256 bit length
Data Encryption Key
Tenant
Secret 1
Password
Based Key
Derivation
Function
Data Encryption
Key 1
Data Encryption
Key 1
Cache
Master
Secret
Summer
‘15
Summer
‘15
Master
Salt
Key Derivation Server
Embedded HSM
Key Derivation Server
Embedded HSM
Key Derivation Server
Embedded HSM
Key Derivation Server
Embedded HSM
Customer Driven Key Lifecycle Derived Encryption
Keys Are Never
Persisted
Create, Manage, and
Rotate Keys
Declarative & API
Based Key
Management
Import and Export
Tenant Secrets on
Demand
Field Encryption Policies Customer Driven
Encryption Policies
Declarative or API
Policy Configuration
Supports Both
Standard and Custom
Fields
Natively Integrated
with the App Cloud
Features
Standard Field Encryption and Search
​  Standard Field Encryption
•  Account Name
•  Contact First/Middle/Last Name
•  Email
•  Phone
•  Home/Other Phone
•  Mobile
•  Fax
•  Mailing Street & City
•  Person Account fields
•  Case Subject, Description
•  Case Comments’ Body
Search Fields and Files
(via Desktop, Salesforce1 Mobile and SOSL)
Custom Field Encryption
Custom Field Types
•  Email
•  Phone
•  Text
•  Text Area
•  Text Area (Long)
•  URL
Enable with Metadata
Encrypt Existing Fields
Chatter Files and Attachments Encryption
Encrypt Content of Chatter Files
Preview Encrypted Files
File Content Search
Encrypt Attachments
Thank you

Contenu connexe

Tendances

Salesforce and SAP Integration with Informatica Cloud
Salesforce and SAP Integration with Informatica CloudSalesforce and SAP Integration with Informatica Cloud
Salesforce and SAP Integration with Informatica CloudDarren Cunningham
 
Salesforce.com Overview
Salesforce.com OverviewSalesforce.com Overview
Salesforce.com OverviewEdureka!
 
Introduction to Salesforce Platform - Basic
Introduction to Salesforce Platform - BasicIntroduction to Salesforce Platform - Basic
Introduction to Salesforce Platform - Basicsanskriti agarwal
 
Champion Productivity with Service Cloud
Champion Productivity with Service CloudChampion Productivity with Service Cloud
Champion Productivity with Service CloudSalesforce Admins
 
Introduction to Salesforce | Salesforce Tutorial for Beginners | Salesforce T...
Introduction to Salesforce | Salesforce Tutorial for Beginners | Salesforce T...Introduction to Salesforce | Salesforce Tutorial for Beginners | Salesforce T...
Introduction to Salesforce | Salesforce Tutorial for Beginners | Salesforce T...Edureka!
 
Introducing the Salesforce platform
Introducing the Salesforce platformIntroducing the Salesforce platform
Introducing the Salesforce platformJohn Stevenson
 
Salesforce Service Cloud - An overview
Salesforce Service Cloud - An overviewSalesforce Service Cloud - An overview
Salesforce Service Cloud - An overviewAjay Balakrishnan
 
Salesforce complete overview
Salesforce complete overviewSalesforce complete overview
Salesforce complete overviewNitesh Mishra ☁
 
What Is Salesforce CRM? | Salesforce CRM Tutorial For Beginners | Salesforce ...
What Is Salesforce CRM? | Salesforce CRM Tutorial For Beginners | Salesforce ...What Is Salesforce CRM? | Salesforce CRM Tutorial For Beginners | Salesforce ...
What Is Salesforce CRM? | Salesforce CRM Tutorial For Beginners | Salesforce ...Edureka!
 
Salesforce Service cloud 3 presentation
Salesforce Service cloud 3 presentation Salesforce Service cloud 3 presentation
Salesforce Service cloud 3 presentation missmeryl
 
Security and Your Salesforce Org
Security and Your Salesforce OrgSecurity and Your Salesforce Org
Security and Your Salesforce OrgSalesforce Admins
 
Tackling Salesforce Technical Debt
Tackling Salesforce Technical DebtTackling Salesforce Technical Debt
Tackling Salesforce Technical Debtpanayaofficial
 
What Is Salesforce? | Salesforce Training - What Does Salesforce Do? | Salesf...
What Is Salesforce? | Salesforce Training - What Does Salesforce Do? | Salesf...What Is Salesforce? | Salesforce Training - What Does Salesforce Do? | Salesf...
What Is Salesforce? | Salesforce Training - What Does Salesforce Do? | Salesf...Edureka!
 
Performing a successful technical debt assessment in Salesforce
Performing a successful technical debt assessment in SalesforcePerforming a successful technical debt assessment in Salesforce
Performing a successful technical debt assessment in SalesforceCoforge (Erstwhile WHISHWORKS)
 
Salesforce Training For Beginners | Salesforce Tutorial | Salesforce Training...
Salesforce Training For Beginners | Salesforce Tutorial | Salesforce Training...Salesforce Training For Beginners | Salesforce Tutorial | Salesforce Training...
Salesforce Training For Beginners | Salesforce Tutorial | Salesforce Training...Edureka!
 
Salesforce.com overview (1)
Salesforce.com   overview (1)Salesforce.com   overview (1)
Salesforce.com overview (1)Luan Minh
 
Salesforce Presentation
Salesforce PresentationSalesforce Presentation
Salesforce PresentationChetna Purohit
 

Tendances (20)

Salesforce and SAP Integration with Informatica Cloud
Salesforce and SAP Integration with Informatica CloudSalesforce and SAP Integration with Informatica Cloud
Salesforce and SAP Integration with Informatica Cloud
 
Salesforce.com Overview
Salesforce.com OverviewSalesforce.com Overview
Salesforce.com Overview
 
Introduction to Salesforce Platform - Basic
Introduction to Salesforce Platform - BasicIntroduction to Salesforce Platform - Basic
Introduction to Salesforce Platform - Basic
 
Champion Productivity with Service Cloud
Champion Productivity with Service CloudChampion Productivity with Service Cloud
Champion Productivity with Service Cloud
 
Introduction to Salesforce | Salesforce Tutorial for Beginners | Salesforce T...
Introduction to Salesforce | Salesforce Tutorial for Beginners | Salesforce T...Introduction to Salesforce | Salesforce Tutorial for Beginners | Salesforce T...
Introduction to Salesforce | Salesforce Tutorial for Beginners | Salesforce T...
 
Salesforce
SalesforceSalesforce
Salesforce
 
Introducing the Salesforce platform
Introducing the Salesforce platformIntroducing the Salesforce platform
Introducing the Salesforce platform
 
Salesforce Service Cloud - An overview
Salesforce Service Cloud - An overviewSalesforce Service Cloud - An overview
Salesforce Service Cloud - An overview
 
Salesforce complete overview
Salesforce complete overviewSalesforce complete overview
Salesforce complete overview
 
Architect day 20181128 - Afternoon Session
Architect day 20181128 - Afternoon SessionArchitect day 20181128 - Afternoon Session
Architect day 20181128 - Afternoon Session
 
What Is Salesforce CRM? | Salesforce CRM Tutorial For Beginners | Salesforce ...
What Is Salesforce CRM? | Salesforce CRM Tutorial For Beginners | Salesforce ...What Is Salesforce CRM? | Salesforce CRM Tutorial For Beginners | Salesforce ...
What Is Salesforce CRM? | Salesforce CRM Tutorial For Beginners | Salesforce ...
 
Salesforce overview
Salesforce overviewSalesforce overview
Salesforce overview
 
Salesforce Service cloud 3 presentation
Salesforce Service cloud 3 presentation Salesforce Service cloud 3 presentation
Salesforce Service cloud 3 presentation
 
Security and Your Salesforce Org
Security and Your Salesforce OrgSecurity and Your Salesforce Org
Security and Your Salesforce Org
 
Tackling Salesforce Technical Debt
Tackling Salesforce Technical DebtTackling Salesforce Technical Debt
Tackling Salesforce Technical Debt
 
What Is Salesforce? | Salesforce Training - What Does Salesforce Do? | Salesf...
What Is Salesforce? | Salesforce Training - What Does Salesforce Do? | Salesf...What Is Salesforce? | Salesforce Training - What Does Salesforce Do? | Salesf...
What Is Salesforce? | Salesforce Training - What Does Salesforce Do? | Salesf...
 
Performing a successful technical debt assessment in Salesforce
Performing a successful technical debt assessment in SalesforcePerforming a successful technical debt assessment in Salesforce
Performing a successful technical debt assessment in Salesforce
 
Salesforce Training For Beginners | Salesforce Tutorial | Salesforce Training...
Salesforce Training For Beginners | Salesforce Tutorial | Salesforce Training...Salesforce Training For Beginners | Salesforce Tutorial | Salesforce Training...
Salesforce Training For Beginners | Salesforce Tutorial | Salesforce Training...
 
Salesforce.com overview (1)
Salesforce.com   overview (1)Salesforce.com   overview (1)
Salesforce.com overview (1)
 
Salesforce Presentation
Salesforce PresentationSalesforce Presentation
Salesforce Presentation
 

En vedette

Dreamforce 15 - Platform Encryption for Developers
Dreamforce 15 - Platform Encryption for DevelopersDreamforce 15 - Platform Encryption for Developers
Dreamforce 15 - Platform Encryption for DevelopersPeter Chittum
 
Helping Gamechangers Change the World - Introducing Salesforce1 for Nonprofits
Helping Gamechangers Change the World - Introducing Salesforce1 for Nonprofits Helping Gamechangers Change the World - Introducing Salesforce1 for Nonprofits
Helping Gamechangers Change the World - Introducing Salesforce1 for Nonprofits Salesforce.org
 
How Morgan Stanley is Using Apps to Transform the Workplace
How Morgan Stanley is Using Apps to Transform the WorkplaceHow Morgan Stanley is Using Apps to Transform the Workplace
How Morgan Stanley is Using Apps to Transform the WorkplaceDreamforce
 
Introducing the Next Version of ExactTarget Salesforce Integration
Introducing the Next Version of ExactTarget Salesforce IntegrationIntroducing the Next Version of ExactTarget Salesforce Integration
Introducing the Next Version of ExactTarget Salesforce IntegrationSalesforce Marketing Cloud
 
Salesforce Identity: Identity Management Made Easy
Salesforce Identity: Identity Management Made EasySalesforce Identity: Identity Management Made Easy
Salesforce Identity: Identity Management Made EasySalesforce Developers
 
Ebook- Introducing Wave Analytics Cloud
Ebook- Introducing Wave Analytics CloudEbook- Introducing Wave Analytics Cloud
Ebook- Introducing Wave Analytics CloudMisha Williams
 
CASBs: Real World Use Cases
CASBs: Real World Use CasesCASBs: Real World Use Cases
CASBs: Real World Use CasesBitglass
 
Sales force turning opportunity into profit
Sales force turning opportunity into profitSales force turning opportunity into profit
Sales force turning opportunity into profitCecilie Burleson
 

En vedette (9)

Dreamforce 15 - Platform Encryption for Developers
Dreamforce 15 - Platform Encryption for DevelopersDreamforce 15 - Platform Encryption for Developers
Dreamforce 15 - Platform Encryption for Developers
 
Helping Gamechangers Change the World - Introducing Salesforce1 for Nonprofits
Helping Gamechangers Change the World - Introducing Salesforce1 for Nonprofits Helping Gamechangers Change the World - Introducing Salesforce1 for Nonprofits
Helping Gamechangers Change the World - Introducing Salesforce1 for Nonprofits
 
How Morgan Stanley is Using Apps to Transform the Workplace
How Morgan Stanley is Using Apps to Transform the WorkplaceHow Morgan Stanley is Using Apps to Transform the Workplace
How Morgan Stanley is Using Apps to Transform the Workplace
 
Introducing the Next Version of ExactTarget Salesforce Integration
Introducing the Next Version of ExactTarget Salesforce IntegrationIntroducing the Next Version of ExactTarget Salesforce Integration
Introducing the Next Version of ExactTarget Salesforce Integration
 
Salesforce Identity: Identity Management Made Easy
Salesforce Identity: Identity Management Made EasySalesforce Identity: Identity Management Made Easy
Salesforce Identity: Identity Management Made Easy
 
Introducing Salesforce Identity
Introducing Salesforce IdentityIntroducing Salesforce Identity
Introducing Salesforce Identity
 
Ebook- Introducing Wave Analytics Cloud
Ebook- Introducing Wave Analytics CloudEbook- Introducing Wave Analytics Cloud
Ebook- Introducing Wave Analytics Cloud
 
CASBs: Real World Use Cases
CASBs: Real World Use CasesCASBs: Real World Use Cases
CASBs: Real World Use Cases
 
Sales force turning opportunity into profit
Sales force turning opportunity into profitSales force turning opportunity into profit
Sales force turning opportunity into profit
 

Similaire à Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15

What’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & ComplianceWhat’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & ComplianceShesh Kondi
 
What’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & ComplianceWhat’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & ComplianceShesh Kondi
 
Event Monitoring: Use Powerful Insights to Improve Performance and Security
Event Monitoring: Use Powerful Insights to Improve Performance and SecurityEvent Monitoring: Use Powerful Insights to Improve Performance and Security
Event Monitoring: Use Powerful Insights to Improve Performance and SecurityDreamforce
 
2. 8 things that will make your business love your developers again
2. 8 things that will make your business love your developers again2. 8 things that will make your business love your developers again
2. 8 things that will make your business love your developers againEuroCloud
 
CCT London 2013 Theatre Intro to Apex
CCT London 2013 Theatre Intro to ApexCCT London 2013 Theatre Intro to Apex
CCT London 2013 Theatre Intro to ApexPeter Chittum
 
Real Time Integration with Salesforce Platform Events
Real Time Integration with Salesforce Platform EventsReal Time Integration with Salesforce Platform Events
Real Time Integration with Salesforce Platform EventsSalesforce Developers
 
Get Started with the Lightning Platform
Get Started with the Lightning PlatformGet Started with the Lightning Platform
Get Started with the Lightning PlatformDeveloper Force
 
Build and Package Lightning Components for Lightning Exchange
Build and Package Lightning Components for Lightning ExchangeBuild and Package Lightning Components for Lightning Exchange
Build and Package Lightning Components for Lightning ExchangeSalesforce Developers
 
Indiana University: Our Path to Building an Enterprise Journey
Indiana University: Our Path to Building an Enterprise JourneyIndiana University: Our Path to Building an Enterprise Journey
Indiana University: Our Path to Building an Enterprise JourneySalesforce.org
 
Essential Habits for Salesforce Admins: Security
Essential Habits for Salesforce Admins: SecurityEssential Habits for Salesforce Admins: Security
Essential Habits for Salesforce Admins: SecuritySalesforce Admins
 
Boxcars and Cabooses: When One More XHR Is Too Much
Boxcars and Cabooses: When One More XHR Is Too MuchBoxcars and Cabooses: When One More XHR Is Too Much
Boxcars and Cabooses: When One More XHR Is Too MuchPeter Chittum
 
Next-Generation Native Apps
Next-Generation Native AppsNext-Generation Native Apps
Next-Generation Native Appsdreamforce2006
 
Enterprise IoT: Data in Context
Enterprise IoT: Data in ContextEnterprise IoT: Data in Context
Enterprise IoT: Data in ContextPat Patterson
 
Crash Course in Salesforce Service and Support
Crash Course in Salesforce Service and SupportCrash Course in Salesforce Service and Support
Crash Course in Salesforce Service and Supportdreamforce2006
 
Around the World in 100 Days a Global Deployment Case Study
Around the World in 100 Days a Global Deployment Case StudyAround the World in 100 Days a Global Deployment Case Study
Around the World in 100 Days a Global Deployment Case Studydreamforce2006
 
ISV Monthly Tech Enablement (August 2017)
ISV Monthly Tech Enablement (August 2017)ISV Monthly Tech Enablement (August 2017)
ISV Monthly Tech Enablement (August 2017)Salesforce Partners
 
Platform session 1 Innovation on the salesforce platform - speed vs control
Platform session 1 Innovation on the salesforce platform - speed vs controlPlatform session 1 Innovation on the salesforce platform - speed vs control
Platform session 1 Innovation on the salesforce platform - speed vs controlSalesforce - Sweden, Denmark, Norway
 
Df15 top 10 things an admin should know-0914
Df15   top 10 things an admin should know-0914Df15   top 10 things an admin should know-0914
Df15 top 10 things an admin should know-0914Shahid Husain
 
Developers guide to the Salesforce1 Platform
Developers guide to the Salesforce1 PlatformDevelopers guide to the Salesforce1 Platform
Developers guide to the Salesforce1 PlatformJohn Stevenson
 

Similaire à Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15 (20)

What’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & ComplianceWhat’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & Compliance
 
What’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & ComplianceWhat’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & Compliance
 
Event Monitoring: Use Powerful Insights to Improve Performance and Security
Event Monitoring: Use Powerful Insights to Improve Performance and SecurityEvent Monitoring: Use Powerful Insights to Improve Performance and Security
Event Monitoring: Use Powerful Insights to Improve Performance and Security
 
2. 8 things that will make your business love your developers again
2. 8 things that will make your business love your developers again2. 8 things that will make your business love your developers again
2. 8 things that will make your business love your developers again
 
CCT London 2013 Theatre Intro to Apex
CCT London 2013 Theatre Intro to ApexCCT London 2013 Theatre Intro to Apex
CCT London 2013 Theatre Intro to Apex
 
Real Time Integration with Salesforce Platform Events
Real Time Integration with Salesforce Platform EventsReal Time Integration with Salesforce Platform Events
Real Time Integration with Salesforce Platform Events
 
Just-In-Time Sharing Using Apex
Just-In-Time Sharing Using ApexJust-In-Time Sharing Using Apex
Just-In-Time Sharing Using Apex
 
Get Started with the Lightning Platform
Get Started with the Lightning PlatformGet Started with the Lightning Platform
Get Started with the Lightning Platform
 
Build and Package Lightning Components for Lightning Exchange
Build and Package Lightning Components for Lightning ExchangeBuild and Package Lightning Components for Lightning Exchange
Build and Package Lightning Components for Lightning Exchange
 
Indiana University: Our Path to Building an Enterprise Journey
Indiana University: Our Path to Building an Enterprise JourneyIndiana University: Our Path to Building an Enterprise Journey
Indiana University: Our Path to Building an Enterprise Journey
 
Essential Habits for Salesforce Admins: Security
Essential Habits for Salesforce Admins: SecurityEssential Habits for Salesforce Admins: Security
Essential Habits for Salesforce Admins: Security
 
Boxcars and Cabooses: When One More XHR Is Too Much
Boxcars and Cabooses: When One More XHR Is Too MuchBoxcars and Cabooses: When One More XHR Is Too Much
Boxcars and Cabooses: When One More XHR Is Too Much
 
Next-Generation Native Apps
Next-Generation Native AppsNext-Generation Native Apps
Next-Generation Native Apps
 
Enterprise IoT: Data in Context
Enterprise IoT: Data in ContextEnterprise IoT: Data in Context
Enterprise IoT: Data in Context
 
Crash Course in Salesforce Service and Support
Crash Course in Salesforce Service and SupportCrash Course in Salesforce Service and Support
Crash Course in Salesforce Service and Support
 
Around the World in 100 Days a Global Deployment Case Study
Around the World in 100 Days a Global Deployment Case StudyAround the World in 100 Days a Global Deployment Case Study
Around the World in 100 Days a Global Deployment Case Study
 
ISV Monthly Tech Enablement (August 2017)
ISV Monthly Tech Enablement (August 2017)ISV Monthly Tech Enablement (August 2017)
ISV Monthly Tech Enablement (August 2017)
 
Platform session 1 Innovation on the salesforce platform - speed vs control
Platform session 1 Innovation on the salesforce platform - speed vs controlPlatform session 1 Innovation on the salesforce platform - speed vs control
Platform session 1 Innovation on the salesforce platform - speed vs control
 
Df15 top 10 things an admin should know-0914
Df15   top 10 things an admin should know-0914Df15   top 10 things an admin should know-0914
Df15 top 10 things an admin should know-0914
 
Developers guide to the Salesforce1 Platform
Developers guide to the Salesforce1 PlatformDevelopers guide to the Salesforce1 Platform
Developers guide to the Salesforce1 Platform
 

Plus de Paris Salesforce Developer Group

La Tooling API, est-ce pour moi ? Bien sûr, viens voir pourquoi !
La Tooling API, est-ce pour moi ? Bien sûr, viens voir pourquoi !La Tooling API, est-ce pour moi ? Bien sûr, viens voir pourquoi !
La Tooling API, est-ce pour moi ? Bien sûr, viens voir pourquoi !Paris Salesforce Developer Group
 
Scratch orgs...vous pensiez en avoir terminé avec les sandboxes ?
Scratch orgs...vous pensiez en avoir terminé avec les sandboxes ?Scratch orgs...vous pensiez en avoir terminé avec les sandboxes ?
Scratch orgs...vous pensiez en avoir terminé avec les sandboxes ?Paris Salesforce Developer Group
 
Mon Expérience avec le Certified Technical Architect Review Board
 Mon Expérience avec le Certified Technical Architect Review Board Mon Expérience avec le Certified Technical Architect Review Board
Mon Expérience avec le Certified Technical Architect Review BoardParis Salesforce Developer Group
 
DX@Scale: Optimizing Salesforce Development and Deployment for large scale pr...
DX@Scale: Optimizing Salesforce Development and Deployment for large scale pr...DX@Scale: Optimizing Salesforce Development and Deployment for large scale pr...
DX@Scale: Optimizing Salesforce Development and Deployment for large scale pr...Paris Salesforce Developer Group
 
Pratiques administration avancées et techniques de développement
Pratiques administration avancées et techniques de développementPratiques administration avancées et techniques de développement
Pratiques administration avancées et techniques de développementParis Salesforce Developer Group
 
Versionning et travail en équipe avec Salesforce - 27/11/2014
Versionning et travail en équipe avec Salesforce - 27/11/2014Versionning et travail en équipe avec Salesforce - 27/11/2014
Versionning et travail en équipe avec Salesforce - 27/11/2014Paris Salesforce Developer Group
 
Paris Salesforce Developer Group - 16 09 2014 - Summer '14
Paris Salesforce Developer Group - 16 09 2014 - Summer '14Paris Salesforce Developer Group - 16 09 2014 - Summer '14
Paris Salesforce Developer Group - 16 09 2014 - Summer '14Paris Salesforce Developer Group
 

Plus de Paris Salesforce Developer Group (19)

Pour Noël, devenez chrome extensioniste!
Pour Noël, devenez chrome extensioniste!Pour Noël, devenez chrome extensioniste!
Pour Noël, devenez chrome extensioniste!
 
GraphQL (la nouvelle API de référence de Salesforce ?!)
GraphQL (la nouvelle API de référence de Salesforce ?!)GraphQL (la nouvelle API de référence de Salesforce ?!)
GraphQL (la nouvelle API de référence de Salesforce ?!)
 
La Tooling API, est-ce pour moi ? Bien sûr, viens voir pourquoi !
La Tooling API, est-ce pour moi ? Bien sûr, viens voir pourquoi !La Tooling API, est-ce pour moi ? Bien sûr, viens voir pourquoi !
La Tooling API, est-ce pour moi ? Bien sûr, viens voir pourquoi !
 
Introduction à la plateforme Anypoint de MuleSoft
Introduction à la plateforme Anypoint de MuleSoftIntroduction à la plateforme Anypoint de MuleSoft
Introduction à la plateforme Anypoint de MuleSoft
 
Release spring '22 - Community Groups français
Release spring '22 - Community Groups françaisRelease spring '22 - Community Groups français
Release spring '22 - Community Groups français
 
Scratch orgs...vous pensiez en avoir terminé avec les sandboxes ?
Scratch orgs...vous pensiez en avoir terminé avec les sandboxes ?Scratch orgs...vous pensiez en avoir terminé avec les sandboxes ?
Scratch orgs...vous pensiez en avoir terminé avec les sandboxes ?
 
Mon Expérience avec le Certified Technical Architect Review Board
 Mon Expérience avec le Certified Technical Architect Review Board Mon Expérience avec le Certified Technical Architect Review Board
Mon Expérience avec le Certified Technical Architect Review Board
 
Mieux acheminer les emails avec salesforce
Mieux acheminer les emails avec salesforceMieux acheminer les emails avec salesforce
Mieux acheminer les emails avec salesforce
 
DX@Scale: Optimizing Salesforce Development and Deployment for large scale pr...
DX@Scale: Optimizing Salesforce Development and Deployment for large scale pr...DX@Scale: Optimizing Salesforce Development and Deployment for large scale pr...
DX@Scale: Optimizing Salesforce Development and Deployment for large scale pr...
 
Dreamforce Global Gathering
Dreamforce Global GatheringDreamforce Global Gathering
Dreamforce Global Gathering
 
Getting started with Salesforce DX
Getting started with Salesforce DXGetting started with Salesforce DX
Getting started with Salesforce DX
 
Pratiques administration avancées et techniques de développement
Pratiques administration avancées et techniques de développementPratiques administration avancées et techniques de développement
Pratiques administration avancées et techniques de développement
 
Sensibilisation à la Sécurité Salesforce
Sensibilisation à la Sécurité SalesforceSensibilisation à la Sécurité Salesforce
Sensibilisation à la Sécurité Salesforce
 
Salesforce Performance hacks - Client Side
Salesforce Performance hacks - Client SideSalesforce Performance hacks - Client Side
Salesforce Performance hacks - Client Side
 
Meetup 06/2015 - @testsetup
Meetup 06/2015 - @testsetupMeetup 06/2015 - @testsetup
Meetup 06/2015 - @testsetup
 
Meetup Custom Metadata - 1st Part
Meetup Custom Metadata - 1st PartMeetup Custom Metadata - 1st Part
Meetup Custom Metadata - 1st Part
 
Lightning week - Paris DUG
Lightning week - Paris DUGLightning week - Paris DUG
Lightning week - Paris DUG
 
Versionning et travail en équipe avec Salesforce - 27/11/2014
Versionning et travail en équipe avec Salesforce - 27/11/2014Versionning et travail en équipe avec Salesforce - 27/11/2014
Versionning et travail en équipe avec Salesforce - 27/11/2014
 
Paris Salesforce Developer Group - 16 09 2014 - Summer '14
Paris Salesforce Developer Group - 16 09 2014 - Summer '14Paris Salesforce Developer Group - 16 09 2014 - Summer '14
Paris Salesforce Developer Group - 16 09 2014 - Summer '14
 

Dernier

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Dernier (20)

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15

  • 1. Introducing: Salesforce Shield The fastest way to build trusted apps ​ 
  • 2. Safe harbor statement under the Private Securities Litigation Reform Act of 1995: This presentation may contain forward-looking statements that involve risks, uncertainties, and assumptions. If any such uncertainties materialize or if any of the assumptions proves incorrect, the results of salesforce.com, inc. could differ materially from the results expressed or implied by the forward-looking statements we make. All statements other than statements of historical fact could be deemed forward-looking, including any projections of product or service availability, subscriber growth, earnings, revenues, or other financial items and any statements regarding strategies or plans of management for future operations, statements of belief, any statements concerning new, planned, or upgraded services or technology developments and customer contracts or use of our services. The risks and uncertainties referred to above include – but are not limited to – risks associated with developing and delivering new functionality for our service, new products and services, our new business model, our past operating losses, possible fluctuations in our operating results and rate of growth, interruptions or delays in our Web hosting, breach of our security measures, the outcome of any litigation, risks associated with completed and any possible mergers and acquisitions, the immature market in which we operate, our relatively limited operating history, our ability to expand, retain, and motivate our employees and manage our growth, new releases of our service and successful customer deployment, our limited history reselling non-salesforce.com products, and utilization and selling to larger enterprise customers. Further information on potential factors that could affect the financial results of salesforce.com, inc. is included in our annual report on Form 10-K for the most recent fiscal year and in our quarterly report on Form 10-Q for the most recent fiscal quarter. These documents and others containing important disclosures are available on the SEC Filings section of the Investor Information section of our Web site. Any unreleased services or features referenced in this or other presentations, press releases or public statements are not currently available and may not be delivered on time or at all. Customers who purchase our services should make the purchase decisions based upon features that are currently available. Salesforce.com, inc. assumes no obligation and does not intend to update these forward-looking statements. Safe Harbor
  • 3. SNA Terminal Mainframe LAN / WAN Client Server LAN / WAN Client Server Cloud Mobile Social Data Science Thousands customer interactions connected thingsBillions TrillionsMillions The app revolution is opening up a world of innovation for businesses
  • 4. Apps are generating more customer data than ever before Apps Financial Data Health Data Location Data 90% of the world’s data created in the last 12 months
  • 5. World’s Most Trusted Enterprise Cloud Trust is our #1 value Five Elements of Trust Transparency Always on availability Performance at scale Global data centers Enterprise compliance Q1 Transactions 211B+ Customers 150k Apps 2M+
  • 6. Salesforce Trust Services Infrastructure Services AnalyticsCommunityMarketingServiceSales Apps Network Services Application Services Secure Data Centers Backup and Disaster Recovery 47 Major Releases HTTPS Encryption Penetration Testing Advanced Threat Detection Identity & Single Sign On Two Factor Authentication User Roles & Permissions Field & Row Level Security Secure Firewalls Real-time replication Password Policies Third Party Certifications IP Login Restrictions Customer Audits 150,000+ customers 2,000,000+ apps Sixteen years of innovation on the world’s most trusted cloud
  • 7. Introducing: Salesforce Shield Infrastructure Services Network Services Application Services Secure Data Centers Backup and Disaster Recovery HTTPS Encryption Penetration Testing Advanced Threat Detection Identity & Single Sign On Two Factor Authentication User Roles & Permissions Field & Row Level Security Secure Firewalls Real-time replication Password Policies Third Party Certifications IP Login Restrictions Customer Audits Salesforce Shield Platform Encryption Event Monitoring Field Audit Trail New services to help you build trusted apps fast
  • 8. ​ Monitor User Activity ​ Know who is accessing data from where Optimize Performance ​ Troubleshoot application performance to improve end user experience ​ Track Application Usage ​ Understand application usage to increase adoption Gain Visibility Into User Actions with Event Monitoring
  • 9. Retain Field History for Up to 10 Years with Field Audit Trail ​ Establish Data Retention Policies ​ Know the state and value of data at any time Access Retained Data at Scale ​ Normalize on big data back-end for performance ​ Comply with Industry Regulations ​ Secure data archive with the highest trust standards
  • 10. Encrypt Sensitive Data While Preserving Business Functionality ​ Seamlessly protect data at rest ​ Encrypt standard & custom fields, files & attachments ​  Natively integrated with key Salesforce features ​ E.g., Search, Chatter, Lookups work with encrypted data ​ Customer managed keys ​ Customer-driven encryption key lifecycle management
  • 11. Salesforce Shield New services to help you build trusted apps fast EncryptAuditMonitor Platform EncryptionField Audit TrailEvent Monitoring
  • 12. Salesforce Shield The Event Monitoring Story
  • 13. Auditing, Analytics and Actions at a Glance Audit Fields Login History Setup Audit Trail Field History Tracking Field Audit Trail Event Monitoring Purpose Track who created or last modified a record user and time Track end-user logins and login attempts (e.g. failures) Track Administrative changes in setup like escalation of privileges or creation of new fields Track state changes at the field level Analysis: Track a variety of server interactions including report exports, page views, and document downloads Action: Automate actionable security policies such as limiting data export or notifying on concurrent login sessions Example Adam Torman modified the Acme account earlier today Adam Torman logged in using Chrome v 42.0 on Mac OSX Permission set Modify All Data assigned to user Adam Torman Adam Torman changed the Case status from Open to Closed Adam Torman clicked on Marc Benioff’s patient record and downloaded the customer list Jari Salomaa was prevented from logging into his iPad until he removed a previous login session Interface Record Detail UI and API Setup UI and API Setup UI and API Setup / Related List UI and API API (CSV download) + Wave Integration Setup UI [Profile or Sharing] Permission s Required *Read/Query requires sharing access to parent record Manage User permission *View Setup and Configuration permission Configure requires Customize Application permission *Read/Query requires sharing access to parent record *View Event Log Files permission AND * View Login Forensics Author Apex AND Customize Application Data Retention Policy Life of the record / 18 Months depending on org inception date 6 months FIFO 6 months FIFO 20 fields for 18 months 60 fields for 10 years Up to 30 days for Event Log Files and 10 years for Login Forensics N/A Pricing $0 $0 $0 $0 ** $add-on $0 - Login/Logout Event Log Files for 1 day ** $add-on - 29 log files for 30 days + Login Forensics + Transaction Security Online Audit Fields Login History Setup Audit Field History Field Audit Event Monitoring Transaction Security
  • 14. What we are hearing from CISOs ​ 1. Visibility to user activity ​ Report on what users are doing and where policies are needed ​ 2. Generate security policies ​ Generate real-time actions such as notifications and proactive prevention ​ 3. Automate actions from policies ​ Fine-tune your application portfolio and business process ​ 4. Analyze, monitor results and audit ​ Fine-tune your security policies and provide audit trails for auditors
  • 15. Two halves of the same solution ​  Analytics ​  Actions
  • 17. Analytics For Event Monitoring ​ Support ​ Provide better, data-driven support for your end users ​ Audit ​ Track your user’s activities ​ Optimize ​ Fine-tune your application portfolio and business process
  • 18. Actions For Event Monitoring ​ Customizable Apex Policies ​ Framework auto-generated policies ​ Define Real Time Actions ​ Notify, Block, Force 2FA, Session Chooser ​ Enforce Session Constraints ​ Control the number of active user sessions
  • 20. Problem set: Concurrent Login Sessions ●  Users should not be logged in to more than ‘n’ sessions ●  Limit the number of concurrent sessions to reduce risk with malicious activities ○  FedRamp requirement ●  Security policy should understand who will be impacted and prompt the user to remove previous sessions that no longer apply
  • 22. Analyze current login behaviors using analytics Track login trends and ask questions: ●  Who will be impacted if you create a policy based on Profile, Role, User, etc…? ●  What integrations may break? ●  How are user’s logging in - S1 Mobile, Web Browser, integrations? Policy Generation Event Capture Historical Analytics Real Time Actions Cycle of Security Historical Logs User Segmentatio n Real-time Analytics Audit Event Generation Policy Deployme nt Policy Design Policy Customizatio n
  • 23. Determine criteria for policy By Profile: ●  System Admin Profile >= 2 By Role: ●  East Coast Exec Role >=5 By User: ●  Adam Torman OR Jari Salomaa >=1 By Time: ●  Saturday OR Sundays >=1 Policy Generation Event Capture Historical Analytics Real Time Actions Cycle of Security Historical Logs User Segmentatio n Real-time Analytics Audit Event Generation Policy Deployme nt Policy Design Policy Customizatio n
  • 24. Decide which actions to take Policy Generation Event Capture Historical Analytics Real Time Actions Cycle of Security Historical Logs User Segmentatio n Real-time Analytics Audit Event Generation Policy Deployme nt Policy Design Policy Customizatio n Determine actions to take: ●  None ●  Block ●  2FA ●  Session Chooser
  • 25. Customize Apex policy and add criteria Customize the policy ●  Apply custom criteria such as Profiles, Roles, Users, etc… ●  Work closely with your developers to customize it for your design Policy Generation Event Capture Historical Analytics Real Time Actions Cycle of Security Historical Logs User Segmentatio n Real-time Analytics Audit Event Generation Policy Deployme nt Policy Design Policy Customizatio n
  • 26. Deploy policy Deployment is as easy as selecting a checkbox on the policy Policy Generation Event Capture Historical Analytics Real Time Actions Cycle of Security Historical Logs User Segmentatio n Real-time Analytics Audit Event Generation Policy Deployme nt Policy Design Policy Customizatio n
  • 27. Real-time action policy enforcement In real-time, users will be forced to take an action based on the criteria you created Policy Generation Event Capture Historical Analytics Real Time Actions Cycle of Security Historical Logs User Segmentatio n Real-time Analytics Audit Event Generation Policy Deployme nt Policy Design Policy Customizatio n
  • 28. Analyze policy enforcement and Audit Track how many 2FA or session chooser screens were selected. Policy Generation Event Capture Historical Analytics Real Time Actions Cycle of Security Historical Logs User Segmentatio n Real-time Analytics Audit Event Generation Policy Deployme nt Policy Design Policy Customizatio n
  • 29. Salesforce Platform Encryption Strongly encrypt data at rest while preserving critical business functionality
  • 30. ​ Encrypt data at rest when it is stored on the App Cloud ​ Encrypt Standard & Custom Fields, Files, & Attachments ​ Customers manage their encryption keys on the App Cloud platform What Problems We Solve
  • 31. Why It’s Unique Salesforce Platform Encryption Quickly and seamlessly protect sensitive data Setup takes minutes – no extra hardware or software Makes the App Cloud ‘encryption aware’ Salesforce1 Mobile-ready, natively
  • 32. Salesforce Platform Encryption ​ Encryption Services ​ Standards based encryption built natively into the App Cloud Platform ​ AES encryption using 256bit keys ​ Layers seamlessly with other App Cloud security features ​ Key Management ​ Customer driven key lifecycle management ​ Uses secure derived keys that are never persisted in the App Cloud ​ Hardware Security Module based key management infrastructure ​ FIPS 140-2 compliant ​ Policy Management ​ Customer control over policy configuration ​ Select fields, files, and attachments to be encrypted ​ Encryption controlled with metadata to take complexity out of deployments ​ App Cloud Integration ​ Preserve important functionality like search and business rules ​ Built-in capabilities to iteratively add additional feature support ​ Features and Functionality Overview
  • 33. Architecture Overview Encrypted Fields Encrypted Files AES 256 DATA Database File Storage FFX Database File Storage FFX Database File Storage FFX Database File Storage FFX Key Derivation Server Embedded HSM Key Derivation Server Embedded HSM Key Derivation Server Embedded HSM Key Derivation Server Embedded HSM
  • 34. ​ Keys and Secrets ​ Master Secret Master Wrapping Key ​ Master Salt Tenant Wrapping Key Keys and Secrets Key Derivation Server RSA Key Pair Hardware Security Modules ​ Key Management Components Master HSM Key Derivation Server Embedded HSM ​ Functions ​ Generates Per-Release Secrets and Keys ​ Encrypts Secrets and Keys for Secure Distribution ​ Air-gapped from Production Network Functions Unwraps Per-Release Secrets and Keys Generates and Encrypts Tenant Secret Performs Key Derivation
  • 35. ​ Generated once per release by Salesforce Security Officer using air-gapped Master HSM ​ Encrypted with the Master Wrapping Key and stored in Key Derivation Servers ​ Decryptable only by Key Derivation Server’s Private Key and the Master Wrapping Key ​ Org-specific secret generated, managed, and rotated by customers ​ Manage via Setup or SOAP API ​ Encrypted using the per-release Tenant Wrapping Key and stored in the database ​ Decryptable only by Key Derivation Server’s Private Key and Tenant Wrapping Key ​ Created by Key Derivation Servers via Password Based Key Derivation Function ​ Decrypts and combines Master and Tenant Secrets and Master Salt as input to PBKDF2 function ​ Output of KDF is an Org-specific Data Encryption Key used to encrypt customer field values and files ​ Derived keys are cached on the App Cloud platform Master Secret / Master Salt Tenant Secret Data Encryption Key Key Derivation ​ Creating Org-specific Data Encryption Keys
  • 36. Deriving Data Encryption Keys Standards Based Key Derivation Function: PBDKF2 HMAC with SHA256 Runs 15,000 Iterations Outputs 256 bit length Data Encryption Key Tenant Secret 1 Password Based Key Derivation Function Data Encryption Key 1 Data Encryption Key 1 Cache Master Secret Summer ‘15 Summer ‘15 Master Salt Key Derivation Server Embedded HSM Key Derivation Server Embedded HSM Key Derivation Server Embedded HSM Key Derivation Server Embedded HSM
  • 37. Customer Driven Key Lifecycle Derived Encryption Keys Are Never Persisted Create, Manage, and Rotate Keys Declarative & API Based Key Management Import and Export Tenant Secrets on Demand
  • 38. Field Encryption Policies Customer Driven Encryption Policies Declarative or API Policy Configuration Supports Both Standard and Custom Fields Natively Integrated with the App Cloud Features
  • 39. Standard Field Encryption and Search ​  Standard Field Encryption •  Account Name •  Contact First/Middle/Last Name •  Email •  Phone •  Home/Other Phone •  Mobile •  Fax •  Mailing Street & City •  Person Account fields •  Case Subject, Description •  Case Comments’ Body Search Fields and Files (via Desktop, Salesforce1 Mobile and SOSL)
  • 40. Custom Field Encryption Custom Field Types •  Email •  Phone •  Text •  Text Area •  Text Area (Long) •  URL Enable with Metadata Encrypt Existing Fields
  • 41. Chatter Files and Attachments Encryption Encrypt Content of Chatter Files Preview Encrypted Files File Content Search Encrypt Attachments