The document introduces Salesforce Shield, which provides new services to help customers build trusted applications securely and fast. It describes the analytics and actions capabilities of Event Monitoring within Salesforce Shield. Event Monitoring allows customers to gain visibility into user actions, generate security policies from analytics, and automate real-time actions from those policies. An example is provided around limiting concurrent login sessions using Event Monitoring's analytics to understand login behaviors and its actions to enforce session constraints.
Salesforce Shield: How to Deliver a New Level of Trust and Security in the CloudDreamforce
As companies put more sensitive data into the cloud, the demands on security become more complex. Salesforce has always put trust and security as our #1 value. And as we continue to invest in our core trust platform, we also introduce Salesforce Shield - a new set of premium services for an additional level of compliance and security. Join us to get an overview of our new offering and how it can help you up your security and compliance game.
The Salesforce platform offers system as well as application level security capabilities for building robust and secure applications. Join us as we introduce the system-level security features of Salesforce, like authentication and authorization mechanisms that include various Single Sign-On and OAuth flows. We'll also cover declarative application-level security features, like user profiles, roles and permissions, and how an Organization Wide Security and record-sharing model enforces a finer level of access control over the data.
Did you inherit a cluttered org with no documentation? Are you trying to figure out why you have 500 fields on an object? Join this session and collaboratively learn from other customers about the most common traits of a messy implementation, and how you can untangle yours.
Event Monitoring: Use Powerful Insights to Improve Performance and SecurityDreamforce
Salesforce runs its business on Salesforce, but it supports its business using log data to the tune of three terabytes of data per day, per pod. Log data answers questions like who's logging in, who's downloading the customer list, which Visualforce pages are the slowest, which API versions you should upgrade, who's adopting Salesforce and how, and much, much more. Event Monitoring - part of Salesforce Shield is now generally available to provide insights into your org activity like never before. Join us to learn how you can use this built-in premium service to support your organization with powerful insights. Watch the video now: https://www.youtube.com/watch?v=QlESjd5aNDY
What Is Salesforce? | Salesforce Training - What Does Salesforce Do? | Salesf...Edureka!
This Edureka Salesforce Tutorial slides for beginners will take you through why Salesforce became popular, what is Salesforce, Salesforce products along with a Salesforce use case. This Salesforce tutorial video is ideal for beginners to learn what is Salesforce. You can read the blog here: https://goo.gl/rEHG4a
Salesforce Shield: How to Deliver a New Level of Trust and Security in the CloudDreamforce
As companies put more sensitive data into the cloud, the demands on security become more complex. Salesforce has always put trust and security as our #1 value. And as we continue to invest in our core trust platform, we also introduce Salesforce Shield - a new set of premium services for an additional level of compliance and security. Join us to get an overview of our new offering and how it can help you up your security and compliance game.
The Salesforce platform offers system as well as application level security capabilities for building robust and secure applications. Join us as we introduce the system-level security features of Salesforce, like authentication and authorization mechanisms that include various Single Sign-On and OAuth flows. We'll also cover declarative application-level security features, like user profiles, roles and permissions, and how an Organization Wide Security and record-sharing model enforces a finer level of access control over the data.
Did you inherit a cluttered org with no documentation? Are you trying to figure out why you have 500 fields on an object? Join this session and collaboratively learn from other customers about the most common traits of a messy implementation, and how you can untangle yours.
Event Monitoring: Use Powerful Insights to Improve Performance and SecurityDreamforce
Salesforce runs its business on Salesforce, but it supports its business using log data to the tune of three terabytes of data per day, per pod. Log data answers questions like who's logging in, who's downloading the customer list, which Visualforce pages are the slowest, which API versions you should upgrade, who's adopting Salesforce and how, and much, much more. Event Monitoring - part of Salesforce Shield is now generally available to provide insights into your org activity like never before. Join us to learn how you can use this built-in premium service to support your organization with powerful insights. Watch the video now: https://www.youtube.com/watch?v=QlESjd5aNDY
What Is Salesforce? | Salesforce Training - What Does Salesforce Do? | Salesf...Edureka!
This Edureka Salesforce Tutorial slides for beginners will take you through why Salesforce became popular, what is Salesforce, Salesforce products along with a Salesforce use case. This Salesforce tutorial video is ideal for beginners to learn what is Salesforce. You can read the blog here: https://goo.gl/rEHG4a
Salesforce Security Review Tips and TricksRyan Flood
Building on the Salesforce platform means having access to our world-class security team. Join us to hear from our resident security experts and learn how you can leverage important tools and resources to build a secure app. Understand the purpose and payoff of having your app reviewed and learn how to streamline the process. #DF17Partners
Join us as we provide an overview of how to integrate to Salesforce using the built-in tools, and look at integration on the different layers of Salesforce (User Interface, Data Logic, and Database). We'll be providing tips, best practices, and real-life examples.
What Is Salesforce CRM? | Salesforce CRM Tutorial For Beginners | Salesforce ...Edureka!
This Salesforce CRM tutorial will take you through what is Salesforce CRM, benefits of Salesforce CRM, how CRM works, along with Salesforce CRM demo and use case. This Salesforce training slides is ideal for beginners to learn CRM.
Get a comprehensive guide about Salesforce and its benefits and understand how Salesforce helps you serve customers more efficiently, leading to better business.
Organisations using Salesforce will inevitably accumulate technical debt over time. It’s a costly side effect of growth, and to manage it successfully, these organisations need to not only remove their existing debt but also understand its causes and develop a plan to manage it in the future.
To find out more about the key areas you need to cover to carry out a successful technical debt assessment in the Salesforce platform watch our on-demand webinar:
https://www.whishworks.com/event/recording-performing-a-successful-technical-debt-assessment-in-salesforce/
Key topics
– What is technical debt
– Causes of technical debt in Salesforce
– Key areas to assess
– Common tools for diagnosis
– Technical debt assessment results & reporting
Join our webinar to learn best practices for maximizing user experience and productivity in Service Cloud. Learn from our Salesforce PM and UX service leads on how you as an #AwesomeAdmin can create engaging experiences for your agents and help them solve cases faster with pre-built apps and automation.
Salesforce Training For Beginners | Salesforce Tutorial | Salesforce Training...Edureka!
This Salesforce Training tutorial is all you need to learn about Salesforce. It is ideal for both beginners and professionals who want to understand the various Salesforce cloud services. Below are topics covered in this tutorial:
1. Why is Salesforce popular & in-demand?
2. Advantages: On-premise vs. Cloud
3. Where does Salesforce fit in the cloud model?
4. Various Salesforce Cloud Services
5. Salesforce architecture
6. Demo: Sales Cloud & Service Cloud
When building an enterprise solution or creating an app, data often comes from multiple systems, and business processes frequently cross application boundaries.
Salesforce offers a rich library of programmatic and point-and-click integration tools to customize business processes that span multiple application systems. In this webinar, we will survey the many integration options and technologies available in Salesforce, including newer API and integration features.
This webinar is the first in a series that will explore several ways to integrate systems and services with Salesforce.
Introduction to Salesforce | Salesforce Tutorial for Beginners | Salesforce T...Edureka!
( Salesforce Training: https://www.edureka.co/salesforce-administrator-and-developer-training)
This tutorial will give you an introduction to the Salesforce CRM and talk tell you how & why Salesforce has emerged as one of the leading cloud computing companies today.
This video covers the following topics:
1. Salesforce:- Need & Rise
2. Features Of Salesforce
3. Demo: Salesforce In Action
Manage Development in Your Org with Salesforce Governance FrameworkSalesforce Developers
As your team creates more apps in your Salesforce Org, you're faced with a new set of challenges: managing a well-designed org. Join us to learn about using the practices defined in the Salesforce Governance framework, and the set of tools available for managing issues such as security, coding standards, decisions over declarative verses Apex apps, design standards, overall Org strategy, and change control. By applying these best practices, your team can continue to grow your apps to meet the continuing challenges of your company.
Deep dive into Salesforce Connected AppDhanik Sahni
A connected app is a framework that enables an external application to integrate with Salesforce using APIs. Connected app uses standard protocols, such as SAML, OAuth, and OpenID Connect to authorize, authenticate, and provide single sign-on (SSO) for external apps.
Dreamforce 15 - Platform Encryption for DevelopersPeter Chittum
An overview of the new Salesforce Shield Encryption feature with a focus on developer strategies with SOQL, Apex, and point-and-click development features. Peter Chittum, Developer Evangelist, and Assaf Ben-Gur, Product Manager for the encryption feature break down the key features of platform encryption, how to enable the feature, and how it fits into the context of the whole suite of security tools that every Salesforce customer has in their environment. While platform encryption preserves much of the key business functionality of the platform, some features are currently limited. As such we discuss and suggest specific work-arounds to get the most out of encryption when you decide to enable it.
Helping Gamechangers Change the World - Introducing Salesforce1 for Nonprofits Salesforce.org
Each and every day, millions around the world work tirelessly to pickup where others have left off...
· Feeding and housing the poor
· Delivering care to those in need
· Conserving earth’s most precious resources
· Speaking up for those without a voice.
The Salesforce.com Foundation is honored that gamechangers at more than 22,000 nonprofits choose salesforce.com’s cloud, social and mobile technologies to help them deliver so many different solutions to improve communities around the world.
And that is why we are so excited to unveil Salesforce1 for Nonprofits – the most complete solution set in the nonprofit industry.
Salesforce1 for Nonprofits offers solutions for program management, community engagement, marketing communications and fundraising to empower nonprofits to run their organizations from their phones. It is built from the ground-up for the mobile and social era.
Learn more and register now for next week’s webinar to get a glimpse of the future of the nonprofit social change community.
Gamechangers, your time has come.
Salesforce Security Review Tips and TricksRyan Flood
Building on the Salesforce platform means having access to our world-class security team. Join us to hear from our resident security experts and learn how you can leverage important tools and resources to build a secure app. Understand the purpose and payoff of having your app reviewed and learn how to streamline the process. #DF17Partners
Join us as we provide an overview of how to integrate to Salesforce using the built-in tools, and look at integration on the different layers of Salesforce (User Interface, Data Logic, and Database). We'll be providing tips, best practices, and real-life examples.
What Is Salesforce CRM? | Salesforce CRM Tutorial For Beginners | Salesforce ...Edureka!
This Salesforce CRM tutorial will take you through what is Salesforce CRM, benefits of Salesforce CRM, how CRM works, along with Salesforce CRM demo and use case. This Salesforce training slides is ideal for beginners to learn CRM.
Get a comprehensive guide about Salesforce and its benefits and understand how Salesforce helps you serve customers more efficiently, leading to better business.
Organisations using Salesforce will inevitably accumulate technical debt over time. It’s a costly side effect of growth, and to manage it successfully, these organisations need to not only remove their existing debt but also understand its causes and develop a plan to manage it in the future.
To find out more about the key areas you need to cover to carry out a successful technical debt assessment in the Salesforce platform watch our on-demand webinar:
https://www.whishworks.com/event/recording-performing-a-successful-technical-debt-assessment-in-salesforce/
Key topics
– What is technical debt
– Causes of technical debt in Salesforce
– Key areas to assess
– Common tools for diagnosis
– Technical debt assessment results & reporting
Join our webinar to learn best practices for maximizing user experience and productivity in Service Cloud. Learn from our Salesforce PM and UX service leads on how you as an #AwesomeAdmin can create engaging experiences for your agents and help them solve cases faster with pre-built apps and automation.
Salesforce Training For Beginners | Salesforce Tutorial | Salesforce Training...Edureka!
This Salesforce Training tutorial is all you need to learn about Salesforce. It is ideal for both beginners and professionals who want to understand the various Salesforce cloud services. Below are topics covered in this tutorial:
1. Why is Salesforce popular & in-demand?
2. Advantages: On-premise vs. Cloud
3. Where does Salesforce fit in the cloud model?
4. Various Salesforce Cloud Services
5. Salesforce architecture
6. Demo: Sales Cloud & Service Cloud
When building an enterprise solution or creating an app, data often comes from multiple systems, and business processes frequently cross application boundaries.
Salesforce offers a rich library of programmatic and point-and-click integration tools to customize business processes that span multiple application systems. In this webinar, we will survey the many integration options and technologies available in Salesforce, including newer API and integration features.
This webinar is the first in a series that will explore several ways to integrate systems and services with Salesforce.
Introduction to Salesforce | Salesforce Tutorial for Beginners | Salesforce T...Edureka!
( Salesforce Training: https://www.edureka.co/salesforce-administrator-and-developer-training)
This tutorial will give you an introduction to the Salesforce CRM and talk tell you how & why Salesforce has emerged as one of the leading cloud computing companies today.
This video covers the following topics:
1. Salesforce:- Need & Rise
2. Features Of Salesforce
3. Demo: Salesforce In Action
Manage Development in Your Org with Salesforce Governance FrameworkSalesforce Developers
As your team creates more apps in your Salesforce Org, you're faced with a new set of challenges: managing a well-designed org. Join us to learn about using the practices defined in the Salesforce Governance framework, and the set of tools available for managing issues such as security, coding standards, decisions over declarative verses Apex apps, design standards, overall Org strategy, and change control. By applying these best practices, your team can continue to grow your apps to meet the continuing challenges of your company.
Deep dive into Salesforce Connected AppDhanik Sahni
A connected app is a framework that enables an external application to integrate with Salesforce using APIs. Connected app uses standard protocols, such as SAML, OAuth, and OpenID Connect to authorize, authenticate, and provide single sign-on (SSO) for external apps.
Dreamforce 15 - Platform Encryption for DevelopersPeter Chittum
An overview of the new Salesforce Shield Encryption feature with a focus on developer strategies with SOQL, Apex, and point-and-click development features. Peter Chittum, Developer Evangelist, and Assaf Ben-Gur, Product Manager for the encryption feature break down the key features of platform encryption, how to enable the feature, and how it fits into the context of the whole suite of security tools that every Salesforce customer has in their environment. While platform encryption preserves much of the key business functionality of the platform, some features are currently limited. As such we discuss and suggest specific work-arounds to get the most out of encryption when you decide to enable it.
Helping Gamechangers Change the World - Introducing Salesforce1 for Nonprofits Salesforce.org
Each and every day, millions around the world work tirelessly to pickup where others have left off...
· Feeding and housing the poor
· Delivering care to those in need
· Conserving earth’s most precious resources
· Speaking up for those without a voice.
The Salesforce.com Foundation is honored that gamechangers at more than 22,000 nonprofits choose salesforce.com’s cloud, social and mobile technologies to help them deliver so many different solutions to improve communities around the world.
And that is why we are so excited to unveil Salesforce1 for Nonprofits – the most complete solution set in the nonprofit industry.
Salesforce1 for Nonprofits offers solutions for program management, community engagement, marketing communications and fundraising to empower nonprofits to run their organizations from their phones. It is built from the ground-up for the mobile and social era.
Learn more and register now for next week’s webinar to get a glimpse of the future of the nonprofit social change community.
Gamechangers, your time has come.
How Morgan Stanley is Using Apps to Transform the WorkplaceDreamforce
Join us to learn how IT can be the hero and help accelerate HR transformations. Learn how to create a seamless experience for employees on the front end, all completely integrated with your core HR systems on the back end. Join us to hear from Morgan Stanley on how they're building and deploying apps to better service, engage, and retain employees. Speakers: Brian Kelly, Morgan Stanley's Executive Director of HR IT and Ashvin Parmar, Capgemini's Business Information Management Principal
The integration of Salesforce CRM and the ExactTarget Marketing Cloud allows marketers to leverage their Salesforce CRM data to deliver relevant, personalized conversations to grow customer lifetime value. In this webinar you'll hear about the latest version of the integration and upcoming plans. Plus, hear from PHH Mortgage and how their email marketing efforts are growing with this new solution.
The explosion of enterprise apps has made managing access and identity difficult. To accelerate app adoption, users need a simple social identity solution, similar to the one consumers enjoy on social networks such as Facebook, and enterprises need a trusted, standards-based way to manage access to all of these apps. Salesforce Identity, announced recently at Dreamforce 2012, simplifies security management by delivering Identity and Access Management (IAM) services for Web and mobile apps with complete transparency and the trust of the Salesforce Platform. In this webinar, we'll give you all the details and then demo single sign-on, access management, and provisioning for your Web and mobile apps.
Interested in how Cloud Access Security Brokers are being deployed by organizations in several industries? Learn about how Cloud, Mobile, and Discovery solutions are used by Bitglass customers.
What’s new in summer’15 release - Security & ComplianceShesh Kondi
The Summer'15 Release of Salesforce is going live during the second week of June.
Find out what's new in the Security and Compliance areas in the new release.
Platform Events enables a new event-driven architecture for Salesforce focused on events and record changes, rather than full record processing. Join us to learn about Platform Events and what this will mean to the future of integration with Salesforce.
In this exclusive webinar, you'll learn about
- How Platform Events enable real-time integration
- Defining, publishing and subscribing to Platform Events in Salesforce
- How Platform Events work through live demonstrations
In a high-risk domain such as retail banking, investment banking protecting data is paramount, yet some data needs to be available for customer service purposes.Join us as we show you how to make that data available only for the duration of the interaction with the customers using CTI integration toolkit and Apex. You can apply this solution to various scenarios such as Public Sector and Banking, Healthcare.
Want to learn how to publish and distribute your Lightning Components? Join us to learn the steps for packaging Lighting Components and the process to list them on the Lightning Exchange for Components. In this session, we will discuss tips for packaging Components and best practices for managing versioning.
Indiana University: Our Path to Building an Enterprise JourneySalesforce.org
Presentation from Salesforce.org Higher Ed Summit 2017 by: Chris Tompkins of Indiana University
The ability to effectively engage and communicate with potential students is at the core of Higher Education Recruiting. As technologies and recruiting strategies continue to evolve, so does the need for robust functionality to dynamically email audiences based on continuous changes to their information. In a multi-campus University that must accommodate both undergraduate and graduate recruiting activities, a user must have the ability to leverage the appropriate admissions data in dynamic segmentation filters to capture targeted populations and ensure they travel down appropriate branching paths in a communication workflow. This session will review the design Indiana University has adopted to utilize the Marketing Cloud JourneyBuilder functionality to fully utilize the multi-campus admissions data held in an integrated Service Cloud CRM for automated drip communications workflows.
As a Salesforce Admin, you have four core responsibilities that you need to master to succeed and grow your career. In this session, we'll dive into the core responsibility of Security and the habits you need to build to successfully master it: review roles, profiles, and permissions sets; run Health Check; align with IT, and review login history. You'll learn how to develop each habit, with expert advice and key actionable takeaways for you to implement right away.
Learn about the Essential Habits for Salesforce Admins series here: https://admin.salesforce.com/blog/2020/essential-habits-for-salesforce-admins-just-got-bigger-and-better
Boxcars and Cabooses: When One More XHR Is Too MuchPeter Chittum
RESTful APIs have simplified backend access providing clean URL-based resource representations using standard HTTP methods such as GET and POST. But growth in the number of these APIs can lead to inefficiencies: if an app needs to access many of these resources at once, performance can bog down and user experience can suffer, especially for mobile devices.
'Boxcarring' is the bundling together of multiple HTTP requests into a single request. For example, a client framework might abstract the transport layer and bundle multiple requests into a single call. On the server, a RESTful API must be surfaced to accept a POST to multiple resource representations in one request. This talk will demonstrate both client and server side examples of boxcar requests.
Vous souhaitez offrir quelque chose à vos collègues mais n'avez rien trouver d'original? Développez et offrez leur une extension qui leur facilitera le quotidien.
Dans cet atelier nous couvrirons les avantages et possibilités offertes ainsi que des exemples simples et pratiques qui améliorent le quotidien. Préparez vos idées!
GraphQL est un langage de requête flexible qui vous permet d'interagir de manière précise avec les données de Salesforce. Cela vous permet de demander uniquement les informations dont vous avez besoin, réduisant ainsi les requêtes inutiles et améliorant les performances de votre application Salesforce. C'est un outil utile pour les développeurs Salesforce pour personnaliser les intégrations et les interfaces utilisateur.
Utilisable via l'API ou directement depuis Lightning Web Component avec un "Wire" précis.
Durant cette session, on va vous montrer les différentes fonctions de la Tooling API avec des cas d'utilisations concrets.
Et vous présentera quelques requêtes SOQL en Tooling API utilisable au quotidien ( Dev ou Admin)
Nous accueillons Hassen Ati et Yassine Aarabat de MuleSoft qui vont nous présenter les usages de la plateforme Anypoint de MuleSoft. L’occasion pour vous de découvrir la puissance de cette plateforme et de poser vos questions aux experts.
Comme à chaque Release, nous organiserons une session de présentation des nouvelles features.
A l'occasion de la sortie de la Spring'22, les Community Groups de France se réuniront pour vous présenter les features à ne pas manquer.
Ce sera l'occasion de faire connaissance avec les différents groupes, et d'avoir un max d'informations sur les évolutions.
Les Scratchs Orgs ont été un grand pas vers un travail collaboratif en tâches parallèles sur un code source partagé.
D’autre part, plus récemment, la nouvelle fonctionnalité de tracking des Sandboxes a facilité les échanges de codes entre l’IDE local et une Sandbox en surveillant ce qui est modifié de part et d’autre, ce qui peut rendre jalouses certaines Scratch Orgs.
· Avantages et inconvénients des deux dispositifs
· Point de vue d'un développement avec le tracking activé sur les sandboxes
DNS, SMTP, SPF, DKIM, si vous êtes confrontés à des problèmes d'acheminent de vos emails avec Salesforce et que ces acronymes ne vous parlent pas, cet événement est fait pour vous !
Merci à Frédéric Grither pour la présentation.
In this talk, Azlam Abdulsalam and Ramzi Akremi will share their experiences in an ongoing Salesforce program how they build deploy and maintain 20+ unlocked packages through a highly optimised pipeline.
These are the slides of the Paris Salesforce Developer Group Meetup that took place on the 16th of September. The topic was Salesforce.com Summer '14 release.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
2. Safe harbor statement under the Private Securities Litigation Reform Act of 1995:
This presentation may contain forward-looking statements that involve risks, uncertainties, and assumptions. If any such uncertainties
materialize or if any of the assumptions proves incorrect, the results of salesforce.com, inc. could differ materially from the results expressed or
implied by the forward-looking statements we make. All statements other than statements of historical fact could be deemed forward-looking,
including any projections of product or service availability, subscriber growth, earnings, revenues, or other financial items and any statements
regarding strategies or plans of management for future operations, statements of belief, any statements concerning new, planned, or upgraded
services or technology developments and customer contracts or use of our services.
The risks and uncertainties referred to above include – but are not limited to – risks associated with developing and delivering new functionality
for our service, new products and services, our new business model, our past operating losses, possible fluctuations in our operating results and
rate of growth, interruptions or delays in our Web hosting, breach of our security measures, the outcome of any litigation, risks associated with
completed and any possible mergers and acquisitions, the immature market in which we operate, our relatively limited operating history, our
ability to expand, retain, and motivate our employees and manage our growth, new releases of our service and successful customer
deployment, our limited history reselling non-salesforce.com products, and utilization and selling to larger enterprise customers. Further
information on potential factors that could affect the financial results of salesforce.com, inc. is included in our annual report on Form 10-K for
the most recent fiscal year and in our quarterly report on Form 10-Q for the most recent fiscal quarter. These documents and others containing
important disclosures are available on the SEC Filings section of the Investor Information section of our Web site.
Any unreleased services or features referenced in this or other presentations, press releases or public statements are not currently available and
may not be delivered on time or at all. Customers who purchase our services should make the purchase decisions based upon features that are
currently available. Salesforce.com, inc. assumes no obligation and does not intend to update these forward-looking statements.
Safe Harbor
3. SNA
Terminal
Mainframe LAN / WAN
Client
Server
LAN / WAN
Client
Server
Cloud
Mobile
Social
Data Science
Thousands customer
interactions
connected
thingsBillions TrillionsMillions
The app revolution is opening up a world of innovation for businesses
4. Apps are generating more customer data than ever before
Apps
Financial Data
Health Data
Location Data
90% of the world’s data created in the last 12 months
5. World’s Most Trusted Enterprise Cloud
Trust is our #1 value
Five Elements of Trust
Transparency
Always on availability
Performance at scale
Global data centers
Enterprise compliance
Q1 Transactions
211B+
Customers
150k
Apps
2M+
6. Salesforce Trust Services
Infrastructure Services
AnalyticsCommunityMarketingServiceSales Apps
Network Services
Application Services
Secure Data
Centers
Backup and
Disaster Recovery
47 Major Releases
HTTPS
Encryption
Penetration
Testing
Advanced
Threat Detection
Identity & Single
Sign On
Two Factor
Authentication
User Roles &
Permissions
Field & Row
Level Security
Secure
Firewalls
Real-time
replication
Password
Policies
Third Party
Certifications
IP Login
Restrictions
Customer
Audits
150,000+ customers 2,000,000+ apps
Sixteen years of innovation on the world’s most trusted cloud
7. Introducing: Salesforce Shield
Infrastructure Services
Network Services
Application Services
Secure Data
Centers
Backup and
Disaster Recovery
HTTPS
Encryption
Penetration
Testing
Advanced
Threat Detection
Identity & Single
Sign On
Two Factor
Authentication
User Roles &
Permissions
Field & Row
Level Security
Secure
Firewalls
Real-time
replication
Password
Policies
Third Party
Certifications
IP Login
Restrictions
Customer
Audits
Salesforce Shield
Platform
Encryption
Event
Monitoring
Field
Audit Trail
New services to help you build trusted apps fast
8. Monitor User Activity
Know who is accessing data from where
Optimize Performance
Troubleshoot application performance to improve
end user experience
Track Application Usage
Understand application usage to increase adoption
Gain Visibility Into User Actions with Event Monitoring
9. Retain Field History for Up to 10 Years with Field Audit Trail
Establish Data Retention Policies
Know the state and value of data at any time
Access Retained Data at Scale
Normalize on big data back-end for performance
Comply with Industry Regulations
Secure data archive with the highest trust standards
10. Encrypt Sensitive Data While Preserving Business Functionality
Seamlessly protect data at rest
Encrypt standard & custom fields, files & attachments
Natively integrated with key Salesforce features
E.g., Search, Chatter, Lookups work with encrypted data
Customer managed keys
Customer-driven encryption key lifecycle management
11. Salesforce Shield
New services to help you build trusted apps fast
EncryptAuditMonitor
Platform EncryptionField Audit TrailEvent Monitoring
13. Auditing, Analytics and Actions at a Glance
Audit Fields Login History Setup Audit Trail Field History
Tracking
Field Audit Trail Event Monitoring
Purpose Track who
created or last
modified a record
user and time
Track end-user
logins and login
attempts (e.g.
failures)
Track
Administrative
changes in setup
like escalation of
privileges or
creation of new
fields
Track state changes at the field level Analysis: Track a variety of
server interactions including
report exports, page views,
and document downloads
Action: Automate actionable security
policies such as limiting data export
or notifying on concurrent login
sessions
Example Adam Torman
modified the
Acme account
earlier today
Adam Torman
logged in using
Chrome v 42.0 on
Mac OSX
Permission set
Modify All Data
assigned to user
Adam Torman
Adam Torman changed the Case
status from Open to Closed
Adam Torman clicked on
Marc Benioff’s patient record
and downloaded the
customer list
Jari Salomaa was prevented from
logging into his iPad until he removed
a previous login session
Interface Record Detail UI
and API
Setup UI and API Setup UI and API Setup / Related List UI and API API (CSV download) + Wave
Integration
Setup UI
[Profile or
Sharing]
Permission
s Required
*Read/Query
requires sharing
access to parent
record
Manage User
permission
*View Setup and
Configuration
permission
Configure requires Customize
Application permission
*Read/Query requires sharing access
to parent record
*View Event Log Files
permission AND
* View Login Forensics
Author Apex
AND
Customize Application
Data
Retention
Policy
Life of the record
/ 18 Months
depending on org
inception date
6 months FIFO 6 months FIFO 20 fields for 18
months
60 fields for 10
years
Up to 30 days for Event Log
Files and 10 years for Login
Forensics
N/A
Pricing $0 $0 $0 $0 ** $add-on $0 - Login/Logout Event Log Files for 1 day
** $add-on - 29 log files for 30 days + Login Forensics + Transaction
Security
Online Audit Fields Login History Setup Audit Field History Field Audit Event Monitoring Transaction Security
14. What we are hearing from CISOs
1. Visibility to user activity
Report on what users are doing and where policies are
needed
2. Generate security policies
Generate real-time actions such as notifications and proactive
prevention
3. Automate actions from policies
Fine-tune your application portfolio and business process
4. Analyze, monitor results and audit
Fine-tune your security policies and provide audit trails for
auditors
15. Two halves of the same solution
Analytics
Actions
17. Analytics For Event Monitoring
Support
Provide better, data-driven support for your end users
Audit
Track your user’s activities
Optimize
Fine-tune your application portfolio and business process
18. Actions For Event Monitoring
Customizable Apex Policies
Framework auto-generated policies
Define Real Time Actions
Notify, Block, Force 2FA, Session Chooser
Enforce Session Constraints
Control the number of active user sessions
20. Problem set: Concurrent Login Sessions
● Users should not be logged in to
more than ‘n’ sessions
● Limit the number of concurrent
sessions to reduce risk with malicious
activities
○ FedRamp requirement
● Security policy should understand
who will be impacted and prompt the
user to remove previous sessions
that no longer apply
22. Analyze current login behaviors using analytics
Track login trends and ask questions:
● Who will be impacted if you create a policy based
on Profile, Role, User, etc…?
● What integrations may break?
● How are user’s logging in - S1 Mobile, Web
Browser, integrations?
Policy
Generation
Event
Capture
Historical
Analytics
Real Time
Actions
Cycle of
Security
Historical
Logs
User
Segmentatio
n
Real-time
Analytics
Audit
Event
Generation
Policy
Deployme
nt
Policy
Design
Policy
Customizatio
n
23. Determine criteria for policy
By Profile:
● System Admin Profile >= 2
By Role:
● East Coast Exec Role >=5
By User:
● Adam Torman OR Jari Salomaa
>=1
By Time:
● Saturday OR Sundays >=1
Policy
Generation
Event
Capture
Historical
Analytics
Real Time
Actions
Cycle of
Security
Historical
Logs
User
Segmentatio
n
Real-time
Analytics
Audit
Event
Generation
Policy
Deployme
nt
Policy
Design
Policy
Customizatio
n
24. Decide which actions to take Policy
Generation
Event
Capture
Historical
Analytics
Real Time
Actions
Cycle of
Security
Historical
Logs
User
Segmentatio
n
Real-time
Analytics
Audit
Event
Generation
Policy
Deployme
nt
Policy
Design
Policy
Customizatio
n
Determine actions to take:
● None
● Block
● 2FA
● Session Chooser
25. Customize Apex policy and add criteria
Customize the policy
● Apply custom criteria such as
Profiles, Roles, Users, etc…
● Work closely with your developers to
customize it for your design
Policy
Generation
Event
Capture
Historical
Analytics
Real Time
Actions
Cycle of
Security
Historical
Logs
User
Segmentatio
n
Real-time
Analytics
Audit
Event
Generation
Policy
Deployme
nt
Policy
Design
Policy
Customizatio
n
26. Deploy policy
Deployment is as easy as selecting a
checkbox on the policy
Policy
Generation
Event
Capture
Historical
Analytics
Real Time
Actions
Cycle of
Security
Historical
Logs
User
Segmentatio
n
Real-time
Analytics
Audit
Event
Generation
Policy
Deployme
nt
Policy
Design
Policy
Customizatio
n
27. Real-time action policy enforcement
In real-time, users will be forced to take an action based on
the criteria you created
Policy
Generation
Event
Capture
Historical
Analytics
Real Time
Actions
Cycle of
Security
Historical
Logs
User
Segmentatio
n
Real-time
Analytics
Audit
Event
Generation
Policy
Deployme
nt
Policy
Design
Policy
Customizatio
n
28. Analyze policy enforcement and Audit
Track how many 2FA or session chooser screens were
selected.
Policy
Generation
Event
Capture
Historical
Analytics
Real Time
Actions
Cycle of
Security
Historical
Logs
User
Segmentatio
n
Real-time
Analytics
Audit
Event
Generation
Policy
Deployme
nt
Policy
Design
Policy
Customizatio
n
30. Encrypt data at rest when it is stored on the App Cloud
Encrypt Standard & Custom Fields, Files, & Attachments
Customers manage their encryption keys on the App Cloud platform
What Problems We Solve
31. Why It’s Unique
Salesforce Platform Encryption
Quickly and seamlessly protect sensitive data
Setup takes minutes – no extra hardware or software
Makes the App Cloud ‘encryption aware’
Salesforce1 Mobile-ready, natively
32. Salesforce Platform Encryption
Encryption Services
Standards based
encryption built natively into
the App Cloud Platform
AES encryption using
256bit keys
Layers seamlessly with
other App Cloud security
features
Key Management
Customer driven key
lifecycle management
Uses secure derived keys
that are never persisted in
the App Cloud
Hardware Security Module
based key management
infrastructure
FIPS 140-2 compliant
Policy Management
Customer control over
policy configuration
Select fields, files, and
attachments to be
encrypted
Encryption controlled with
metadata to take
complexity out of
deployments
App Cloud Integration
Preserve important
functionality like search and
business rules
Built-in capabilities to
iteratively add additional
feature support
Features and Functionality Overview
33. Architecture Overview
Encrypted Fields Encrypted Files
AES 256
DATA
Database File Storage
FFX
Database File Storage
FFX
Database File Storage
FFX
Database File Storage
FFX
Key Derivation Server
Embedded HSM
Key Derivation Server
Embedded HSM
Key Derivation Server
Embedded HSM
Key Derivation Server
Embedded HSM
34. Keys and Secrets
Master Secret Master Wrapping Key
Master Salt Tenant Wrapping Key
Keys and Secrets
Key Derivation Server RSA Key Pair
Hardware Security Modules
Key Management Components
Master HSM Key Derivation Server
Embedded HSM
Functions
Generates Per-Release Secrets and Keys
Encrypts Secrets and Keys for Secure Distribution
Air-gapped from Production Network
Functions
Unwraps Per-Release Secrets and Keys
Generates and Encrypts Tenant Secret
Performs Key Derivation
35. Generated once per release by
Salesforce Security Officer using
air-gapped Master HSM
Encrypted with the Master
Wrapping Key and stored in Key
Derivation Servers
Decryptable only by Key
Derivation Server’s Private Key
and the Master Wrapping Key
Org-specific secret generated,
managed, and rotated by
customers
Manage via Setup or SOAP API
Encrypted using the per-release
Tenant Wrapping Key and stored
in the database
Decryptable only by Key
Derivation Server’s Private Key
and Tenant Wrapping Key
Created by Key Derivation
Servers via Password Based Key
Derivation Function
Decrypts and combines Master
and Tenant Secrets and Master
Salt as input to PBKDF2 function
Output of KDF is an Org-specific
Data Encryption Key used to
encrypt customer field values and
files
Derived keys are cached on the
App Cloud platform
Master Secret / Master Salt Tenant Secret Data Encryption Key
Key Derivation
Creating Org-specific Data Encryption Keys
36. Deriving Data Encryption Keys
Standards Based Key
Derivation Function:
PBDKF2 HMAC with
SHA256
Runs 15,000
Iterations
Outputs 256 bit length
Data Encryption Key
Tenant
Secret 1
Password
Based Key
Derivation
Function
Data Encryption
Key 1
Data Encryption
Key 1
Cache
Master
Secret
Summer
‘15
Summer
‘15
Master
Salt
Key Derivation Server
Embedded HSM
Key Derivation Server
Embedded HSM
Key Derivation Server
Embedded HSM
Key Derivation Server
Embedded HSM
37. Customer Driven Key Lifecycle Derived Encryption
Keys Are Never
Persisted
Create, Manage, and
Rotate Keys
Declarative & API
Based Key
Management
Import and Export
Tenant Secrets on
Demand
38. Field Encryption Policies Customer Driven
Encryption Policies
Declarative or API
Policy Configuration
Supports Both
Standard and Custom
Fields
Natively Integrated
with the App Cloud
Features
39. Standard Field Encryption and Search
Standard Field Encryption
• Account Name
• Contact First/Middle/Last Name
• Email
• Phone
• Home/Other Phone
• Mobile
• Fax
• Mailing Street & City
• Person Account fields
• Case Subject, Description
• Case Comments’ Body
Search Fields and Files
(via Desktop, Salesforce1 Mobile and SOSL)
40. Custom Field Encryption
Custom Field Types
• Email
• Phone
• Text
• Text Area
• Text Area (Long)
• URL
Enable with Metadata
Encrypt Existing Fields
41. Chatter Files and Attachments Encryption
Encrypt Content of Chatter Files
Preview Encrypted Files
File Content Search
Encrypt Attachments