SlideShare a Scribd company logo
Tokenized Sending
Partner Global Launch
​Steve Shellist
​Director, Platform Product Management
​sshellist@salesforce.com
What is Tokenized Sending?
What is required to implement?
What SFMC features are not supported?
How is it provisioned and configured?
How is it sold?
How is it supported?
Resources
FAQ
Agenda
What is Tokenized Sending?
Tokenized Sending Global Launch
Tokenized Sending is a method for protecting sensitive customer data by not storing this data in
the SFMC.
Customers can still...
● Send personalized messages
● Use Tracking and Reporting
● Create Journeys, Events, Activities
● Segment, filter, and make decisions on data in the SFMC.
Tokenized Sending
Account-wide implementation (Parent + Child BUs)
Must have a Marketing Cloud Edition
Currently in Early Adopter Program (EAP)
Generally Available (GA) Sept 30
Details
Government laws or regulations
Corporate security policies
Reacting to data breach events
Market Drivers
Overview
Sensitive data – any single piece or combination of data a customer deems Personally Identifiable
Information (PII) or Protected Health Information (PHI).
Token – a value that represents a single piece or collection of subscriber/contact attributes.
“In the clear” or “plain text” – Data that is comprehendible, pre encryption/tokenization and post
decryption/de-tokenization.
Buzzwords
Overview
Protection through all application layers
User Interface
Database
Files on disk
Masked Data
Encrypted DB
Tokenized
Sending
Encrypted Data Sending
Note: Masked Data, Encrypted Data Sending, and Tokenized Sending cannot be provisioned together in the same account.
Breach events
Tokenized Sending Encrypted Data Sending
(Field-level)
Masked Data
(Obfuscated)
Encrypted Database
Unauthorized user sees clear data in
the UI
Unauthorized user accesses data in
the DB
Unauthorized user gains access to
the Key
Unauthorized user exports clear data
Hard drive stolen
Note: Masked Data, Encrypted Data Sending, and Tokenized Sending cannot be provisioned together in the same account.
Data Extension Fields
Tokenized Sending
SubscriberKey EmailAddress MobileNumber FirstName PerfLang DOB State
111aaa234 2344@token.com 000000256 English
111bbb567 987@token.com 000005250 Spanish
111ccc890 21067@token.com 000000091 French
SubscriberKey EmailAddress MobileNumber FirstName PerfLang DOB State
111aaa234 joewalker@gmail.com 987-555-8888 Joe English 04/15/1990 CA
111bbb567 ashleyt@hotmail.com 407-333-1111 Ashley Spanish 04/15/1990 TX
111ccc890 esmith2@aol.com 650-222-9999 Evan French 01/09/1995 MI
Data in a clear state
Data is tokenized
Tokenized Sending
Sending email use case with a personalized message
6
4
5
3
2
1
SMS Inbound Message Handling
Mobile Originated (MO) message flow
Aggregator
SFMC
Inbound
Processing
Customer
MobileConnect
Processing
Subscriber sends a
message to a private
short/long code
No Token
Queue
Get
Token
API
Extract
automation
Customer
If we do not get a token,
MO is queued and files
are extracted for
customer to process.
(hourly, daily, tbd)
If clear phone number is
exchanged for a token,
MO is passed to MC for
processing. 15
4
2
3
5
What is required to implement?
Tokenized Sending Global Launch
Build a Resolve Token API for SFMC to resolve tokens at send time, per our API spec.
Build a Get Token API for SFMC to create tokens for inbound SMS (MO), per our API spec.
Handle up to 50 simultaneous connections.
Must be able to resolve up to 500 token per connection (request).
Monitoring their server and connection.
Test their APIs before sending, using our testing harness.
Customer responsibility
Integration
Must create tokens and maintain the token-to-contact relationship.
Must start with no data in the account or else data will need to be converted.
Must use an email token for Email messaging - formatted like an email address.
Must use a mobile token for SMS messaging - 15 characters alphanumeric.
Must have a private SMS long or short code. (MobileConnect)
Must store at least a subscriber key and an email token or mobile token, per subscriber.
Must be able to extract messages when we cannot get a token during the SMS MO flow.
Customer responsibility
Required Data
What SFMC features are not supported?
Tokenized Sending Global Launch
​
SF Integration / Connector, MobilePush, GroupConnect
Journey Builder Activities when decisioning criteria is not stored
Segmentation, Filtering, and Queries using criteria not stored
Sending Service-level Agreement (SLA)
Combined with Encrypted Data Sending (field-level encryption) and Obfuscation
***Existing accounts - require a data conversion
Not Supported
How is it Provisioned and Configured?
Tokenized Sending Global Launch
1. Order is completed by AE
2. Customer builds the Resolve Token API and Get Token API (SMS MO)
3. Account is provisioned and configured for Tokenized Sending
4. Customer whitelists stack IPs
5. Customer tests their APIs
6. Customer executes a test send
7. Customer begins production sending
Process
Account is configured/setup like any other new account
Data sources should use the same schema and field names as the customers data warehouse.
Business Rule enabled using correct Data and Quality details (Support task)
Endpoint and auth credentials for each API is configured in Manage (Support task)
Provisioning and account config
How is it Sold?
Tokenized Sending Global Launch
The “What if…” scenario
Most clouds have security methods to prevent malicious users from getting into their cloud.
Some clouds also have security methods to prevent their own users from accessing data.
Few clouds have the answer to, “What if a hacker or unauthorized user gets to the data?”
Tokenized Sending is SFMC’s answers to, the “What if…”
Positioning
INDUSTRIES:
FinServ
Healthcare
Goverment
APAC, EMEA, Canada
WHO:
CMO, CIO, CTO
Security, Legal, Developers, Marketers
Target Market
​Become the expert by asking questions.
​Don’t settle for, “that’s what security told me.”
​What are the underlying reasons for protecting data?
​What data needs to be protected?
​Dig into the use cases.
Conversation Tips
How is it Supported?
Tokenized Sending Global Launch
Typical Support Requests
Here are things you need to be conscious of when a customer contacts Support:
Before sending - Token APIs
● Connection issue
● Improperly constructed payload
● Reference the Resolve and Get Token API specs
Sending job errors (contact Support)
● Diagnosed like any other account
● Reference Tokenized Sending Support FAQ doc
Resources
Tokenized Sending Global Launch
Resolve Token API specification is used for resolving Email and Mobile Phone tokens at send
time.
​
Testing Harness is a service for customers to test their connection and validate the payload format
for their new Resolve Token API.
​
Get Token API specification is used for creating tokens when an SMS MO comes into the Platform
with a clear mobile phone number.
Resources
FAQ
Tokenized Sending Global Launch
Thank you
​Steve Shellist
​Director, Platform Product Management
​sshellist@salesforce.com

More Related Content

Similar to Marketing Cloud - Partner Office Hour (September 1, 2015)

Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Robert Crane
 
Communication Compliance in Microsoft 365
Communication Compliance in Microsoft 365Communication Compliance in Microsoft 365
Communication Compliance in Microsoft 365
Joanne Klein
 
Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossAS
Roger CARHUATOCTO
 
MavMLM_Brochure_English
MavMLM_Brochure_EnglishMavMLM_Brochure_English
MavMLM_Brochure_English
adam webb
 
Logincat MFA and SSO
Logincat  MFA and SSOLogincat  MFA and SSO
Logincat MFA and SSO
Rohit Kapoor
 
Smart sms
Smart sms Smart sms
Data security and compliancy in Office 365
Data security and compliancy in Office 365Data security and compliancy in Office 365
Data security and compliancy in Office 365
Microsoft TechNet - Belgium and Luxembourg
 
Salesforce New Jersey User Group - Security Awareness
Salesforce New Jersey User Group - Security Awareness Salesforce New Jersey User Group - Security Awareness
Salesforce New Jersey User Group - Security Awareness
InternetCreations
 
Symantec SSL Explained
Symantec SSL ExplainedSymantec SSL Explained
Symantec SSL Explained
Symantec Website Security
 
Secure Your Salesforce Org with Two-Factor Authentication
Secure Your Salesforce Org with Two-Factor AuthenticationSecure Your Salesforce Org with Two-Factor Authentication
Secure Your Salesforce Org with Two-Factor Authentication
Salesforce Admins
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-Practices
Octogence
 
4. Forensic Investigation Techniques By Neil Hare Brown.pptx
4. Forensic Investigation Techniques By Neil Hare Brown.pptx4. Forensic Investigation Techniques By Neil Hare Brown.pptx
4. Forensic Investigation Techniques By Neil Hare Brown.pptx
AMIRHAMZA18953
 
Salesforce MFA roll-out & Spring ’22 key new features (2022-01-26)
Salesforce MFA roll-out & Spring ’22 key new features (2022-01-26)Salesforce MFA roll-out & Spring ’22 key new features (2022-01-26)
Salesforce MFA roll-out & Spring ’22 key new features (2022-01-26)
Giuseppe Cardace
 
What’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & ComplianceWhat’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & Compliance
Shesh Kondi
 
What’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & ComplianceWhat’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & Compliance
Shesh Kondi
 
Seven Ways to Reduce Your 2009 IT Burden
Seven Ways to Reduce Your 2009 IT BurdenSeven Ways to Reduce Your 2009 IT Burden
Seven Ways to Reduce Your 2009 IT Burden
webhostingguy
 
Seven Ways to Reduce Your 2009 IT Burden
Seven Ways to Reduce Your 2009 IT BurdenSeven Ways to Reduce Your 2009 IT Burden
Seven Ways to Reduce Your 2009 IT Burden
webhostingguy
 
Seven Ways to Reduce Your 2009 IT Burden
Seven Ways to Reduce Your 2009 IT BurdenSeven Ways to Reduce Your 2009 IT Burden
Seven Ways to Reduce Your 2009 IT Burden
webhostingguy
 
What Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdfWhat Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdf
Host It Smart
 
SCB 2013 DLP, công nghệ, và phương pháp triển khai
SCB 2013  DLP, công nghệ, và phương pháp triển khaiSCB 2013  DLP, công nghệ, và phương pháp triển khai
SCB 2013 DLP, công nghệ, và phương pháp triển khai
Security Bootcamp
 

Similar to Marketing Cloud - Partner Office Hour (September 1, 2015) (20)

Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
 
Communication Compliance in Microsoft 365
Communication Compliance in Microsoft 365Communication Compliance in Microsoft 365
Communication Compliance in Microsoft 365
 
Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossAS
 
MavMLM_Brochure_English
MavMLM_Brochure_EnglishMavMLM_Brochure_English
MavMLM_Brochure_English
 
Logincat MFA and SSO
Logincat  MFA and SSOLogincat  MFA and SSO
Logincat MFA and SSO
 
Smart sms
Smart sms Smart sms
Smart sms
 
Data security and compliancy in Office 365
Data security and compliancy in Office 365Data security and compliancy in Office 365
Data security and compliancy in Office 365
 
Salesforce New Jersey User Group - Security Awareness
Salesforce New Jersey User Group - Security Awareness Salesforce New Jersey User Group - Security Awareness
Salesforce New Jersey User Group - Security Awareness
 
Symantec SSL Explained
Symantec SSL ExplainedSymantec SSL Explained
Symantec SSL Explained
 
Secure Your Salesforce Org with Two-Factor Authentication
Secure Your Salesforce Org with Two-Factor AuthenticationSecure Your Salesforce Org with Two-Factor Authentication
Secure Your Salesforce Org with Two-Factor Authentication
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-Practices
 
4. Forensic Investigation Techniques By Neil Hare Brown.pptx
4. Forensic Investigation Techniques By Neil Hare Brown.pptx4. Forensic Investigation Techniques By Neil Hare Brown.pptx
4. Forensic Investigation Techniques By Neil Hare Brown.pptx
 
Salesforce MFA roll-out & Spring ’22 key new features (2022-01-26)
Salesforce MFA roll-out & Spring ’22 key new features (2022-01-26)Salesforce MFA roll-out & Spring ’22 key new features (2022-01-26)
Salesforce MFA roll-out & Spring ’22 key new features (2022-01-26)
 
What’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & ComplianceWhat’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & Compliance
 
What’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & ComplianceWhat’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & Compliance
 
Seven Ways to Reduce Your 2009 IT Burden
Seven Ways to Reduce Your 2009 IT BurdenSeven Ways to Reduce Your 2009 IT Burden
Seven Ways to Reduce Your 2009 IT Burden
 
Seven Ways to Reduce Your 2009 IT Burden
Seven Ways to Reduce Your 2009 IT BurdenSeven Ways to Reduce Your 2009 IT Burden
Seven Ways to Reduce Your 2009 IT Burden
 
Seven Ways to Reduce Your 2009 IT Burden
Seven Ways to Reduce Your 2009 IT BurdenSeven Ways to Reduce Your 2009 IT Burden
Seven Ways to Reduce Your 2009 IT Burden
 
What Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdfWhat Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdf
 
SCB 2013 DLP, công nghệ, và phương pháp triển khai
SCB 2013  DLP, công nghệ, và phương pháp triển khaiSCB 2013  DLP, công nghệ, và phương pháp triển khai
SCB 2013 DLP, công nghệ, và phương pháp triển khai
 

More from Salesforce Partners

ISV Monthly Tech Enablement (August 2017)
ISV Monthly Tech Enablement (August 2017)ISV Monthly Tech Enablement (August 2017)
ISV Monthly Tech Enablement (August 2017)
Salesforce Partners
 
Partner Roadmap Webinar (August 3, 2017)
Partner Roadmap Webinar (August 3, 2017)Partner Roadmap Webinar (August 3, 2017)
Partner Roadmap Webinar (August 3, 2017)
Salesforce Partners
 
Lightning Now for Consulting Partners
Lightning Now for Consulting PartnersLightning Now for Consulting Partners
Lightning Now for Consulting Partners
Salesforce Partners
 
ISV Monthly Tech Enablement (July 2017)
ISV Monthly Tech Enablement (July 2017)ISV Monthly Tech Enablement (July 2017)
ISV Monthly Tech Enablement (July 2017)
Salesforce Partners
 
Salesforce University - Guide to Certification Paths
Salesforce University - Guide to Certification PathsSalesforce University - Guide to Certification Paths
Salesforce University - Guide to Certification Paths
Salesforce Partners
 
Salesforce Proficiency Pack for Administrators
Salesforce Proficiency Pack for AdministratorsSalesforce Proficiency Pack for Administrators
Salesforce Proficiency Pack for Administrators
Salesforce Partners
 
Partner Roadmap Webinar (July 6, 2017)
Partner Roadmap Webinar (July 6, 2017)Partner Roadmap Webinar (July 6, 2017)
Partner Roadmap Webinar (July 6, 2017)
Salesforce Partners
 
Environment Hub Fundamentals (Salesforce Partners)
Environment Hub Fundamentals (Salesforce Partners)Environment Hub Fundamentals (Salesforce Partners)
Environment Hub Fundamentals (Salesforce Partners)
Salesforce Partners
 
Demo Environment Best Practices (Salesforce Partners)
Demo Environment Best Practices (Salesforce Partners)Demo Environment Best Practices (Salesforce Partners)
Demo Environment Best Practices (Salesforce Partners)
Salesforce Partners
 
Choosing the Right Demo Environment (Salesforce Partners)
Choosing the Right Demo Environment (Salesforce Partners)Choosing the Right Demo Environment (Salesforce Partners)
Choosing the Right Demo Environment (Salesforce Partners)
Salesforce Partners
 
Salesforce Sales Professional Exam Prep
Salesforce Sales Professional Exam PrepSalesforce Sales Professional Exam Prep
Salesforce Sales Professional Exam Prep
Salesforce Partners
 
Einstein Analytics for Partners
Einstein Analytics for PartnersEinstein Analytics for Partners
Einstein Analytics for Partners
Salesforce Partners
 
Sales Cloud Lightning Migration Best Practices
Sales Cloud Lightning Migration Best PracticesSales Cloud Lightning Migration Best Practices
Sales Cloud Lightning Migration Best Practices
Salesforce Partners
 
AppExchange Tech Enablement June 2017
AppExchange Tech Enablement June 2017AppExchange Tech Enablement June 2017
AppExchange Tech Enablement June 2017
Salesforce Partners
 
Roadmap Webinar Summer '17 (June 1, 2017)
Roadmap Webinar Summer '17 (June 1, 2017)Roadmap Webinar Summer '17 (June 1, 2017)
Roadmap Webinar Summer '17 (June 1, 2017)
Salesforce Partners
 
FSL Implementation Guidance Part 1 (May 10, 2017)
FSL Implementation Guidance Part 1 (May 10, 2017)FSL Implementation Guidance Part 1 (May 10, 2017)
FSL Implementation Guidance Part 1 (May 10, 2017)
Salesforce Partners
 
AMP Fall & Winter '17 Packages
AMP Fall & Winter '17 Packages AMP Fall & Winter '17 Packages
AMP Fall & Winter '17 Packages
Salesforce Partners
 
ISV Monthly Tech Enablement (May 18, 2017)
ISV Monthly Tech Enablement (May 18, 2017)ISV Monthly Tech Enablement (May 18, 2017)
ISV Monthly Tech Enablement (May 18, 2017)
Salesforce Partners
 
Sales Cloud Lightning Migration Best Practices (May 12, 2017)
Sales Cloud Lightning Migration Best Practices (May 12, 2017)Sales Cloud Lightning Migration Best Practices (May 12, 2017)
Sales Cloud Lightning Migration Best Practices (May 12, 2017)
Salesforce Partners
 
FSL Implementation Guidance Part 1
FSL Implementation Guidance Part 1FSL Implementation Guidance Part 1
FSL Implementation Guidance Part 1
Salesforce Partners
 

More from Salesforce Partners (20)

ISV Monthly Tech Enablement (August 2017)
ISV Monthly Tech Enablement (August 2017)ISV Monthly Tech Enablement (August 2017)
ISV Monthly Tech Enablement (August 2017)
 
Partner Roadmap Webinar (August 3, 2017)
Partner Roadmap Webinar (August 3, 2017)Partner Roadmap Webinar (August 3, 2017)
Partner Roadmap Webinar (August 3, 2017)
 
Lightning Now for Consulting Partners
Lightning Now for Consulting PartnersLightning Now for Consulting Partners
Lightning Now for Consulting Partners
 
ISV Monthly Tech Enablement (July 2017)
ISV Monthly Tech Enablement (July 2017)ISV Monthly Tech Enablement (July 2017)
ISV Monthly Tech Enablement (July 2017)
 
Salesforce University - Guide to Certification Paths
Salesforce University - Guide to Certification PathsSalesforce University - Guide to Certification Paths
Salesforce University - Guide to Certification Paths
 
Salesforce Proficiency Pack for Administrators
Salesforce Proficiency Pack for AdministratorsSalesforce Proficiency Pack for Administrators
Salesforce Proficiency Pack for Administrators
 
Partner Roadmap Webinar (July 6, 2017)
Partner Roadmap Webinar (July 6, 2017)Partner Roadmap Webinar (July 6, 2017)
Partner Roadmap Webinar (July 6, 2017)
 
Environment Hub Fundamentals (Salesforce Partners)
Environment Hub Fundamentals (Salesforce Partners)Environment Hub Fundamentals (Salesforce Partners)
Environment Hub Fundamentals (Salesforce Partners)
 
Demo Environment Best Practices (Salesforce Partners)
Demo Environment Best Practices (Salesforce Partners)Demo Environment Best Practices (Salesforce Partners)
Demo Environment Best Practices (Salesforce Partners)
 
Choosing the Right Demo Environment (Salesforce Partners)
Choosing the Right Demo Environment (Salesforce Partners)Choosing the Right Demo Environment (Salesforce Partners)
Choosing the Right Demo Environment (Salesforce Partners)
 
Salesforce Sales Professional Exam Prep
Salesforce Sales Professional Exam PrepSalesforce Sales Professional Exam Prep
Salesforce Sales Professional Exam Prep
 
Einstein Analytics for Partners
Einstein Analytics for PartnersEinstein Analytics for Partners
Einstein Analytics for Partners
 
Sales Cloud Lightning Migration Best Practices
Sales Cloud Lightning Migration Best PracticesSales Cloud Lightning Migration Best Practices
Sales Cloud Lightning Migration Best Practices
 
AppExchange Tech Enablement June 2017
AppExchange Tech Enablement June 2017AppExchange Tech Enablement June 2017
AppExchange Tech Enablement June 2017
 
Roadmap Webinar Summer '17 (June 1, 2017)
Roadmap Webinar Summer '17 (June 1, 2017)Roadmap Webinar Summer '17 (June 1, 2017)
Roadmap Webinar Summer '17 (June 1, 2017)
 
FSL Implementation Guidance Part 1 (May 10, 2017)
FSL Implementation Guidance Part 1 (May 10, 2017)FSL Implementation Guidance Part 1 (May 10, 2017)
FSL Implementation Guidance Part 1 (May 10, 2017)
 
AMP Fall & Winter '17 Packages
AMP Fall & Winter '17 Packages AMP Fall & Winter '17 Packages
AMP Fall & Winter '17 Packages
 
ISV Monthly Tech Enablement (May 18, 2017)
ISV Monthly Tech Enablement (May 18, 2017)ISV Monthly Tech Enablement (May 18, 2017)
ISV Monthly Tech Enablement (May 18, 2017)
 
Sales Cloud Lightning Migration Best Practices (May 12, 2017)
Sales Cloud Lightning Migration Best Practices (May 12, 2017)Sales Cloud Lightning Migration Best Practices (May 12, 2017)
Sales Cloud Lightning Migration Best Practices (May 12, 2017)
 
FSL Implementation Guidance Part 1
FSL Implementation Guidance Part 1FSL Implementation Guidance Part 1
FSL Implementation Guidance Part 1
 

Recently uploaded

AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 

Recently uploaded (20)

AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 

Marketing Cloud - Partner Office Hour (September 1, 2015)

  • 1. Tokenized Sending Partner Global Launch ​Steve Shellist ​Director, Platform Product Management ​sshellist@salesforce.com
  • 2. What is Tokenized Sending? What is required to implement? What SFMC features are not supported? How is it provisioned and configured? How is it sold? How is it supported? Resources FAQ Agenda
  • 3. What is Tokenized Sending? Tokenized Sending Global Launch
  • 4. Tokenized Sending is a method for protecting sensitive customer data by not storing this data in the SFMC. Customers can still... ● Send personalized messages ● Use Tracking and Reporting ● Create Journeys, Events, Activities ● Segment, filter, and make decisions on data in the SFMC. Tokenized Sending
  • 5. Account-wide implementation (Parent + Child BUs) Must have a Marketing Cloud Edition Currently in Early Adopter Program (EAP) Generally Available (GA) Sept 30 Details
  • 6. Government laws or regulations Corporate security policies Reacting to data breach events Market Drivers Overview
  • 7. Sensitive data – any single piece or combination of data a customer deems Personally Identifiable Information (PII) or Protected Health Information (PHI). Token – a value that represents a single piece or collection of subscriber/contact attributes. “In the clear” or “plain text” – Data that is comprehendible, pre encryption/tokenization and post decryption/de-tokenization. Buzzwords Overview
  • 8. Protection through all application layers User Interface Database Files on disk Masked Data Encrypted DB Tokenized Sending Encrypted Data Sending Note: Masked Data, Encrypted Data Sending, and Tokenized Sending cannot be provisioned together in the same account.
  • 9. Breach events Tokenized Sending Encrypted Data Sending (Field-level) Masked Data (Obfuscated) Encrypted Database Unauthorized user sees clear data in the UI Unauthorized user accesses data in the DB Unauthorized user gains access to the Key Unauthorized user exports clear data Hard drive stolen Note: Masked Data, Encrypted Data Sending, and Tokenized Sending cannot be provisioned together in the same account.
  • 10. Data Extension Fields Tokenized Sending SubscriberKey EmailAddress MobileNumber FirstName PerfLang DOB State 111aaa234 2344@token.com 000000256 English 111bbb567 987@token.com 000005250 Spanish 111ccc890 21067@token.com 000000091 French SubscriberKey EmailAddress MobileNumber FirstName PerfLang DOB State 111aaa234 joewalker@gmail.com 987-555-8888 Joe English 04/15/1990 CA 111bbb567 ashleyt@hotmail.com 407-333-1111 Ashley Spanish 04/15/1990 TX 111ccc890 esmith2@aol.com 650-222-9999 Evan French 01/09/1995 MI Data in a clear state Data is tokenized
  • 11. Tokenized Sending Sending email use case with a personalized message 6 4 5 3 2 1
  • 12. SMS Inbound Message Handling Mobile Originated (MO) message flow Aggregator SFMC Inbound Processing Customer MobileConnect Processing Subscriber sends a message to a private short/long code No Token Queue Get Token API Extract automation Customer If we do not get a token, MO is queued and files are extracted for customer to process. (hourly, daily, tbd) If clear phone number is exchanged for a token, MO is passed to MC for processing. 15 4 2 3 5
  • 13. What is required to implement? Tokenized Sending Global Launch
  • 14. Build a Resolve Token API for SFMC to resolve tokens at send time, per our API spec. Build a Get Token API for SFMC to create tokens for inbound SMS (MO), per our API spec. Handle up to 50 simultaneous connections. Must be able to resolve up to 500 token per connection (request). Monitoring their server and connection. Test their APIs before sending, using our testing harness. Customer responsibility Integration
  • 15. Must create tokens and maintain the token-to-contact relationship. Must start with no data in the account or else data will need to be converted. Must use an email token for Email messaging - formatted like an email address. Must use a mobile token for SMS messaging - 15 characters alphanumeric. Must have a private SMS long or short code. (MobileConnect) Must store at least a subscriber key and an email token or mobile token, per subscriber. Must be able to extract messages when we cannot get a token during the SMS MO flow. Customer responsibility Required Data
  • 16. What SFMC features are not supported? Tokenized Sending Global Launch
  • 17. ​ SF Integration / Connector, MobilePush, GroupConnect Journey Builder Activities when decisioning criteria is not stored Segmentation, Filtering, and Queries using criteria not stored Sending Service-level Agreement (SLA) Combined with Encrypted Data Sending (field-level encryption) and Obfuscation ***Existing accounts - require a data conversion Not Supported
  • 18. How is it Provisioned and Configured? Tokenized Sending Global Launch
  • 19. 1. Order is completed by AE 2. Customer builds the Resolve Token API and Get Token API (SMS MO) 3. Account is provisioned and configured for Tokenized Sending 4. Customer whitelists stack IPs 5. Customer tests their APIs 6. Customer executes a test send 7. Customer begins production sending Process
  • 20. Account is configured/setup like any other new account Data sources should use the same schema and field names as the customers data warehouse. Business Rule enabled using correct Data and Quality details (Support task) Endpoint and auth credentials for each API is configured in Manage (Support task) Provisioning and account config
  • 21. How is it Sold? Tokenized Sending Global Launch
  • 22. The “What if…” scenario Most clouds have security methods to prevent malicious users from getting into their cloud. Some clouds also have security methods to prevent their own users from accessing data. Few clouds have the answer to, “What if a hacker or unauthorized user gets to the data?” Tokenized Sending is SFMC’s answers to, the “What if…” Positioning
  • 23. INDUSTRIES: FinServ Healthcare Goverment APAC, EMEA, Canada WHO: CMO, CIO, CTO Security, Legal, Developers, Marketers Target Market
  • 24. ​Become the expert by asking questions. ​Don’t settle for, “that’s what security told me.” ​What are the underlying reasons for protecting data? ​What data needs to be protected? ​Dig into the use cases. Conversation Tips
  • 25. How is it Supported? Tokenized Sending Global Launch
  • 26. Typical Support Requests Here are things you need to be conscious of when a customer contacts Support: Before sending - Token APIs ● Connection issue ● Improperly constructed payload ● Reference the Resolve and Get Token API specs Sending job errors (contact Support) ● Diagnosed like any other account ● Reference Tokenized Sending Support FAQ doc
  • 28. Resolve Token API specification is used for resolving Email and Mobile Phone tokens at send time. ​ Testing Harness is a service for customers to test their connection and validate the payload format for their new Resolve Token API. ​ Get Token API specification is used for creating tokens when an SMS MO comes into the Platform with a clear mobile phone number. Resources
  • 30. Thank you ​Steve Shellist ​Director, Platform Product Management ​sshellist@salesforce.com