Devendra Sawant and Shraddha Salvi presented on various topics from the Salesforce Summer '20 release. Key points included:
1. The new Split List View feature allows users to see list view data and a selected record simultaneously. Dynamic Forms allow creating sub-sections on Lightning pages with visibility rules.
2. The Salesforce Optimizer tool is now an interactive app to analyze org performance. The new In-App Guidance Builder simplifies creating prompts and guidance for users.
3. Major Flow updates include running flows after record saves, triggering flows from platform events, simplified loop elements, bypassing permissions, and passing records from Lightning pages.
4. Additional topics
The document discusses Salesforce Shield which includes Platform Encryption, Event Monitoring, and Field Audit Trail. Platform Encryption allows customers to encrypt sensitive data at rest while maintaining application functionality. It encrypts data at the metadata layer in the database. Event Monitoring tracks various event types and performance metrics that can be downloaded and analyzed. Field Audit Trail tracks changes to fields with different data retention periods than standard field history tracking.
Microsoft Office 365 Advanced Threat Protection leverages our approach and our strengths to help customers be secure against advanced threats and recover quickly in the event they are attacked.
Protect their data
Detect compromised users
And gain the required visibility to respond to threats
This document provides an overview of Microsoft Azure security features, including:
- Shared responsibility model where Microsoft secures the platform and customers secure their data and applications
- Identity and access management, encryption of data at rest and in transit, network security controls, and logging/monitoring capabilities
- Security Center provides visibility into threats and advanced analytics to detect attacks
- Operations Management Suite allows collecting logs from Azure, on-premises, and other clouds to analyze security events
- Microsoft works with partners to provide additional virtual network appliances and security solutions to customers
This document summarizes a presentation about using Azure Active Directory (Azure AD) for identity governance.
The presentation discusses how Azure AD features like Privileged Identity Management, Terms of Use, Entitlement Management, and Access Reviews can help address four challenges: 1) too many users had privileged access, 2) a need to enforce non-disclosure agreements, 3) streamlining access to resources, and 4) gaining visibility on guest users. Each Azure AD feature is mapped to a specific challenge.
The presentation concludes that Azure AD identity governance features can help govern the identity lifecycle, govern access, secure privileged access, and meet compliance requirements. Resources are provided for further reading. Feedback is requested from attendees.
This is Microsoft Azure Information Protection which helps you out to protect your data being accessible to the unauthorized users. This is an overview for the AIP
Microsoft 365 provides holistic security across these four aspects of security.
By helping enterprise businesses secure corporate data and manage risk in today’s mobile-first, cloud-first world Microsoft 365 enables customers to digitally transform by unifying user productivity and enterprise security tools into a single suite that enables the modern workplace.
Identity & Access Mgmt
Secure identities to reach zero trust
Threat Protection
Help stop damaging attacks with integrated and automated security
Information Protection
Protect sensitive information anywhere it lives
Security Management
Strengthen your security posture with insights and guidance
The document discusses Salesforce Shield which includes Platform Encryption, Event Monitoring, and Field Audit Trail. Platform Encryption allows customers to encrypt sensitive data at rest while maintaining application functionality. It encrypts data at the metadata layer in the database. Event Monitoring tracks various event types and performance metrics that can be downloaded and analyzed. Field Audit Trail tracks changes to fields with different data retention periods than standard field history tracking.
Microsoft Office 365 Advanced Threat Protection leverages our approach and our strengths to help customers be secure against advanced threats and recover quickly in the event they are attacked.
Protect their data
Detect compromised users
And gain the required visibility to respond to threats
This document provides an overview of Microsoft Azure security features, including:
- Shared responsibility model where Microsoft secures the platform and customers secure their data and applications
- Identity and access management, encryption of data at rest and in transit, network security controls, and logging/monitoring capabilities
- Security Center provides visibility into threats and advanced analytics to detect attacks
- Operations Management Suite allows collecting logs from Azure, on-premises, and other clouds to analyze security events
- Microsoft works with partners to provide additional virtual network appliances and security solutions to customers
This document summarizes a presentation about using Azure Active Directory (Azure AD) for identity governance.
The presentation discusses how Azure AD features like Privileged Identity Management, Terms of Use, Entitlement Management, and Access Reviews can help address four challenges: 1) too many users had privileged access, 2) a need to enforce non-disclosure agreements, 3) streamlining access to resources, and 4) gaining visibility on guest users. Each Azure AD feature is mapped to a specific challenge.
The presentation concludes that Azure AD identity governance features can help govern the identity lifecycle, govern access, secure privileged access, and meet compliance requirements. Resources are provided for further reading. Feedback is requested from attendees.
This is Microsoft Azure Information Protection which helps you out to protect your data being accessible to the unauthorized users. This is an overview for the AIP
Microsoft 365 provides holistic security across these four aspects of security.
By helping enterprise businesses secure corporate data and manage risk in today’s mobile-first, cloud-first world Microsoft 365 enables customers to digitally transform by unifying user productivity and enterprise security tools into a single suite that enables the modern workplace.
Identity & Access Mgmt
Secure identities to reach zero trust
Threat Protection
Help stop damaging attacks with integrated and automated security
Information Protection
Protect sensitive information anywhere it lives
Security Management
Strengthen your security posture with insights and guidance
Get comprehensive protection across all your platforms and clouds
Protect your organization from threats across devices, identities, apps, data and clouds. Get unmatched visibility into your multiplatform environment that unifies Security Information and Event Management (SIEM) and Extended Detection and Response (XDR). Simplify your security stack with Azure Sentinel and Microsoft Defender.
The document discusses setting up security and access controls in Salesforce. It provides examples of how to configure profiles to control what users can see and modify. It also explains how to set up sharing rules to determine access to records at the object, field, and record level. Specific examples include allowing all sales teams to see accounts but only modify contacts for their own accounts, and making opportunities private except for amounts under $10,000. The document emphasizes defining user profiles and mapping them to object and field access levels based on business needs.
Securing sensitive data with Azure Key VaultTom Kerkhove
As a developer you often have to use & store a lot of sensitive data going from service credentials to connection strings or even encryption keys. But how do I store these in a secure way? How do I know who has access to them and how do I prevent people from copying them and abusing them? On the other hand, SaaS customers have no clue how you store their sensitive data and how they use it. How can they monitor that? How can they revoke your access easily?
Watch the recording here - http://azug.be/2015-05-05---securing-sensitive-data-with-azure-key-vault
Azure Sentinel is Microsoft's cloud-native security information and event management (SIEM) and security orchestration, automation and response (SOAR) solution. It provides intelligent security analytics and threat detection across on-premises, cloud, and hybrid environments. Azure Sentinel collects data from various sources using connectors and agents, then analyzes the data using machine learning to detect threats and automate responses. It integrates with other Microsoft security solutions and allows threat hunting and visualization of security incidents.
The document provides an introduction to Microsoft 365 Defender, a suite of integrated security tools from Microsoft for protecting endpoints, Office 365 applications, identities, and cloud applications. It notes that while Microsoft makes these tools easy to deploy, properly configuring them to optimize operation and manage costs requires skill and effort. The document aims to provide basic, practical approaches to implementing Microsoft 365 Defender and suggestions for managing the tools to meet changing security requirements. Expert advice is solicited on transitioning to and optimizing the Microsoft 365 Defender suite.
This presentation was used for a session on the North American Collaboration Summit (NACS) 2019. The session explains what options are available to detect, classify and protect content using Azure Information Protection, when stored in SharePoint (on-premises/cloud).
This document provides an overview and agenda for an Aruba Networks workshop on enabling bring your own device (BYOD) programs using ClearPass Onboard for policy-based device onboarding and provisioning. The agenda covers planning a BYOD policy, configuring ClearPass Onboard settings like the certificate authority and network settings, the user experience of the onboarding lifecycle, and troubleshooting. It also discusses topics like detecting BYOD devices, building a BYOD policy, the onboarding workflow and architecture, integrating with mobile device management (MDM) systems, and deploying onboarding in different network configurations.
Enterprise Identity and Access Management Use CasesWSO2
The growth of enterprises result in heterogeneous environments with complex business demands. Some of the biggest identity and access management (IAM) challenges faced by these organizations include inconsistent password policies, excessive identities and directories, diverse and time-consuming auditing processes and an increasing need to stay on top of compliance regulations. Moreover, maintaining an enterprise LAN border is no longer viable as enterprises shift to cloud platforms and adopt SaaS and mobile apps that cross typical security domain boundaries.
Your productivity levels will go down if users can’t access the apps they need, the risk of breach when employees access apps outside of your enterprise will increase and you will face high maintenance costs for legacy systems. To avoid this, you need to implement a modern identity and access management solution that provides seamless user experiences, secures access for employees and partners, easily integrates legacy system as well as cloud and mobile apps, and manages employee data securely and efficiently.
Malithi and Pulasthi explored how to address these IAM challenges and adopt strategies that lead to efficient, secure and compliant IAM. They will discuss
The IAM challenges of complex heterogeneous enterprises
Common IAM use cases
Common patterns for IAM solutions
Cyberspace is the new battlefield:
We’re seeing attacks on civilians and organizations from nation states. Attacks are no longer just against governments or enterprise systems directly. We’re seeing attacks against private property—the mobile devices we carry around everyday, the laptop on our desks—and public infrastructure. What started a decade-and-a-half ago as a sense that there were some teenagers in the basement hacking their way has moved far beyond that. It has morphed into sophisticated international organized crime and, worse, sophisticated nation state attacks.
Personnel and resources are limited:
According to an annual survey of 620 IT professional across North America and Western Europe from ESG, 51% respondents claim their organization had a problem of shortage of cybersecurity skills—up from 23% in 2014.1 The security landscape is getting more complicated and the stakes are rising, but many enterprises don’t have the resources they need to meet their security needs.
Virtually anything can be corrupted:
The number of connected devices in 2018 is predict to top 11 billion – not including computers and phones. As we connect virtually everything, anything can be disrupted. Everything from the cloud to the edge needs to be considered and protected.2
Azure Role Based Access Control with an use case and explanation about various concepts like Global Administrators, Role Assignments, Account Administrators, Azure Roles, Custom Roles for both Azure AD and Azure Subscriptions
Security Best Practices for Serverless Applications - July 2017 AWS Online T...Amazon Web Services
Learning Objectives:
- Learn security best practices for AWS Lambda and Amazon API Gateway
- Understand how to use Amazon Cognito to build identity and authentication features into serverless applications
- Learn identity and access management best practices for serverless applications
Securely building and deploying serverless applications requires cloud-native security best practices. In this talk, you will learn how to use AWS Lambda permissions and how to easily set up authentication and authorization for Amazon API Gateway. We will also cover how you can use Amazon Cognito for end user authentication and authorization. You'll also learn how to securely store your application secrets with AWS. This talk also discusses how to implement identity and access management best practices.
Conditional access policies in Azure Active Directory control who has access to what resources and from where based on conditions. Policies consist of assignments determining scope, conditions regarding platforms/locations/apps, and controls for authentication and session behavior. Risk-based access can be configured to require multifactor authentication at certain risk levels. Policies grant or block access and optionally enforce device compliance, password strength, and other requirements. Admins create policies by defining these components and preview the access statements that will be implemented.
This document provides information about Microsoft's security practices for its cloud services. It discusses Microsoft's certifications and compliance with standards like ISO 27001, SOC 1, SOC 2, FedRAMP, PCI DSS Level 1, and others. It also summarizes Microsoft's approach to security development, operations, data protection, identity and access management, patching, malware protection, and more. The document is intended to help customers understand how Microsoft secures its cloud platform and builds security into every layer from the physical infrastructure to the software development process.
This document provides an overview of Azure Active Directory and its capabilities for identity and access management. It discusses key use cases such as providing secure access to applications, protecting access to resources from threats, automating user lifecycle management, and complying with regulations. It describes Azure AD features for conditional access, multi-factor authentication, application management, user provisioning, privileged identity management, and more. The document also compares Azure AD and Azure AD B2C and their suitability for business and consumer-facing applications respectively.
Detect, classify, and protect sensitive information across cloud services and on-premises environments. Microsoft's solutions can scan for sensitive data, classify it based on sensitivity levels, and apply protections like encryption, access restrictions, and policies. Administrators can monitor protection events, access, and sharing for control and to tune policies.
This document discusses the importance of managing privileged accounts and outlines CyberArk's solution for privileged account security. It notes that privileged accounts exist across all IT systems and are the primary targets of attacks. The facts show that breaches are inevitable and nearly all involve stolen credentials. CyberArk's solution protects, detects, and responds to threats through an enterprise password vault, privileged session monitoring, and threat analytics. It enables control and visibility of privileged access across an organization's diverse IT environments and accounts.
The document provides an overview of securing identity infrastructure in Azure. It discusses five key steps:
1. Strengthening credentials by implementing strong authentication like multi-factor authentication and password policies.
2. Reducing the attack surface by blocking legacy authentication protocols and restricting access points.
3. Automating threat response with tools like Azure AD Identity Protection for automated risk detection and remediation.
4. Utilizing cloud intelligence by monitoring Azure AD logs, events, and health to detect anomalies and threats.
5. Enabling self-service options for users like self-service password reset and access reviews to balance security and productivity.
The document provides examples and recommendations for each step and references
The Salesforce platform offers system as well as application level security capabilities for building robust and secure applications. Join us as we introduce the system-level security features of Salesforce, like authentication and authorization mechanisms that include various Single Sign-On and OAuth flows. We'll also cover declarative application-level security features, like user profiles, roles and permissions, and how an Organization Wide Security and record-sharing model enforces a finer level of access control over the data.
How safe are your Lightning Components? Join us and learn about the foundations required for a secure application built on Lightning. We'll cover common misconceptions around field-level security, CRUD, content security policy (CSP), as well as other common mistakes with Lightning. You'll walk away with all the best practices for hardening your application and keeping your data secure.
Get comprehensive protection across all your platforms and clouds
Protect your organization from threats across devices, identities, apps, data and clouds. Get unmatched visibility into your multiplatform environment that unifies Security Information and Event Management (SIEM) and Extended Detection and Response (XDR). Simplify your security stack with Azure Sentinel and Microsoft Defender.
The document discusses setting up security and access controls in Salesforce. It provides examples of how to configure profiles to control what users can see and modify. It also explains how to set up sharing rules to determine access to records at the object, field, and record level. Specific examples include allowing all sales teams to see accounts but only modify contacts for their own accounts, and making opportunities private except for amounts under $10,000. The document emphasizes defining user profiles and mapping them to object and field access levels based on business needs.
Securing sensitive data with Azure Key VaultTom Kerkhove
As a developer you often have to use & store a lot of sensitive data going from service credentials to connection strings or even encryption keys. But how do I store these in a secure way? How do I know who has access to them and how do I prevent people from copying them and abusing them? On the other hand, SaaS customers have no clue how you store their sensitive data and how they use it. How can they monitor that? How can they revoke your access easily?
Watch the recording here - http://azug.be/2015-05-05---securing-sensitive-data-with-azure-key-vault
Azure Sentinel is Microsoft's cloud-native security information and event management (SIEM) and security orchestration, automation and response (SOAR) solution. It provides intelligent security analytics and threat detection across on-premises, cloud, and hybrid environments. Azure Sentinel collects data from various sources using connectors and agents, then analyzes the data using machine learning to detect threats and automate responses. It integrates with other Microsoft security solutions and allows threat hunting and visualization of security incidents.
The document provides an introduction to Microsoft 365 Defender, a suite of integrated security tools from Microsoft for protecting endpoints, Office 365 applications, identities, and cloud applications. It notes that while Microsoft makes these tools easy to deploy, properly configuring them to optimize operation and manage costs requires skill and effort. The document aims to provide basic, practical approaches to implementing Microsoft 365 Defender and suggestions for managing the tools to meet changing security requirements. Expert advice is solicited on transitioning to and optimizing the Microsoft 365 Defender suite.
This presentation was used for a session on the North American Collaboration Summit (NACS) 2019. The session explains what options are available to detect, classify and protect content using Azure Information Protection, when stored in SharePoint (on-premises/cloud).
This document provides an overview and agenda for an Aruba Networks workshop on enabling bring your own device (BYOD) programs using ClearPass Onboard for policy-based device onboarding and provisioning. The agenda covers planning a BYOD policy, configuring ClearPass Onboard settings like the certificate authority and network settings, the user experience of the onboarding lifecycle, and troubleshooting. It also discusses topics like detecting BYOD devices, building a BYOD policy, the onboarding workflow and architecture, integrating with mobile device management (MDM) systems, and deploying onboarding in different network configurations.
Enterprise Identity and Access Management Use CasesWSO2
The growth of enterprises result in heterogeneous environments with complex business demands. Some of the biggest identity and access management (IAM) challenges faced by these organizations include inconsistent password policies, excessive identities and directories, diverse and time-consuming auditing processes and an increasing need to stay on top of compliance regulations. Moreover, maintaining an enterprise LAN border is no longer viable as enterprises shift to cloud platforms and adopt SaaS and mobile apps that cross typical security domain boundaries.
Your productivity levels will go down if users can’t access the apps they need, the risk of breach when employees access apps outside of your enterprise will increase and you will face high maintenance costs for legacy systems. To avoid this, you need to implement a modern identity and access management solution that provides seamless user experiences, secures access for employees and partners, easily integrates legacy system as well as cloud and mobile apps, and manages employee data securely and efficiently.
Malithi and Pulasthi explored how to address these IAM challenges and adopt strategies that lead to efficient, secure and compliant IAM. They will discuss
The IAM challenges of complex heterogeneous enterprises
Common IAM use cases
Common patterns for IAM solutions
Cyberspace is the new battlefield:
We’re seeing attacks on civilians and organizations from nation states. Attacks are no longer just against governments or enterprise systems directly. We’re seeing attacks against private property—the mobile devices we carry around everyday, the laptop on our desks—and public infrastructure. What started a decade-and-a-half ago as a sense that there were some teenagers in the basement hacking their way has moved far beyond that. It has morphed into sophisticated international organized crime and, worse, sophisticated nation state attacks.
Personnel and resources are limited:
According to an annual survey of 620 IT professional across North America and Western Europe from ESG, 51% respondents claim their organization had a problem of shortage of cybersecurity skills—up from 23% in 2014.1 The security landscape is getting more complicated and the stakes are rising, but many enterprises don’t have the resources they need to meet their security needs.
Virtually anything can be corrupted:
The number of connected devices in 2018 is predict to top 11 billion – not including computers and phones. As we connect virtually everything, anything can be disrupted. Everything from the cloud to the edge needs to be considered and protected.2
Azure Role Based Access Control with an use case and explanation about various concepts like Global Administrators, Role Assignments, Account Administrators, Azure Roles, Custom Roles for both Azure AD and Azure Subscriptions
Security Best Practices for Serverless Applications - July 2017 AWS Online T...Amazon Web Services
Learning Objectives:
- Learn security best practices for AWS Lambda and Amazon API Gateway
- Understand how to use Amazon Cognito to build identity and authentication features into serverless applications
- Learn identity and access management best practices for serverless applications
Securely building and deploying serverless applications requires cloud-native security best practices. In this talk, you will learn how to use AWS Lambda permissions and how to easily set up authentication and authorization for Amazon API Gateway. We will also cover how you can use Amazon Cognito for end user authentication and authorization. You'll also learn how to securely store your application secrets with AWS. This talk also discusses how to implement identity and access management best practices.
Conditional access policies in Azure Active Directory control who has access to what resources and from where based on conditions. Policies consist of assignments determining scope, conditions regarding platforms/locations/apps, and controls for authentication and session behavior. Risk-based access can be configured to require multifactor authentication at certain risk levels. Policies grant or block access and optionally enforce device compliance, password strength, and other requirements. Admins create policies by defining these components and preview the access statements that will be implemented.
This document provides information about Microsoft's security practices for its cloud services. It discusses Microsoft's certifications and compliance with standards like ISO 27001, SOC 1, SOC 2, FedRAMP, PCI DSS Level 1, and others. It also summarizes Microsoft's approach to security development, operations, data protection, identity and access management, patching, malware protection, and more. The document is intended to help customers understand how Microsoft secures its cloud platform and builds security into every layer from the physical infrastructure to the software development process.
This document provides an overview of Azure Active Directory and its capabilities for identity and access management. It discusses key use cases such as providing secure access to applications, protecting access to resources from threats, automating user lifecycle management, and complying with regulations. It describes Azure AD features for conditional access, multi-factor authentication, application management, user provisioning, privileged identity management, and more. The document also compares Azure AD and Azure AD B2C and their suitability for business and consumer-facing applications respectively.
Detect, classify, and protect sensitive information across cloud services and on-premises environments. Microsoft's solutions can scan for sensitive data, classify it based on sensitivity levels, and apply protections like encryption, access restrictions, and policies. Administrators can monitor protection events, access, and sharing for control and to tune policies.
This document discusses the importance of managing privileged accounts and outlines CyberArk's solution for privileged account security. It notes that privileged accounts exist across all IT systems and are the primary targets of attacks. The facts show that breaches are inevitable and nearly all involve stolen credentials. CyberArk's solution protects, detects, and responds to threats through an enterprise password vault, privileged session monitoring, and threat analytics. It enables control and visibility of privileged access across an organization's diverse IT environments and accounts.
The document provides an overview of securing identity infrastructure in Azure. It discusses five key steps:
1. Strengthening credentials by implementing strong authentication like multi-factor authentication and password policies.
2. Reducing the attack surface by blocking legacy authentication protocols and restricting access points.
3. Automating threat response with tools like Azure AD Identity Protection for automated risk detection and remediation.
4. Utilizing cloud intelligence by monitoring Azure AD logs, events, and health to detect anomalies and threats.
5. Enabling self-service options for users like self-service password reset and access reviews to balance security and productivity.
The document provides examples and recommendations for each step and references
The Salesforce platform offers system as well as application level security capabilities for building robust and secure applications. Join us as we introduce the system-level security features of Salesforce, like authentication and authorization mechanisms that include various Single Sign-On and OAuth flows. We'll also cover declarative application-level security features, like user profiles, roles and permissions, and how an Organization Wide Security and record-sharing model enforces a finer level of access control over the data.
How safe are your Lightning Components? Join us and learn about the foundations required for a secure application built on Lightning. We'll cover common misconceptions around field-level security, CRUD, content security policy (CSP), as well as other common mistakes with Lightning. You'll walk away with all the best practices for hardening your application and keeping your data secure.
Many Apex developers ignore security, particularly when doing consulting projects. But security is not difficult if you consider it when designing your code. Join us to learn some simple design patterns to help ensure your code respects configured security settings, and some more sophisticated architectures you can use when your requirements call on you to override configured security settings.
Overview of Salesforce Platform Encryption solution with specific discussion of developer use of the feature. Overview of the Salesforce Shield compliance toolset features with special focus on encrypting data at rest, natively on Salesforce App Cloud, and strategies developers can use to make the most of this feature.
Are your business partners asking to be able to create their own applications? Are you asked to share development environments with other teams? Join us to learn considerations and best practices for making shared development in a single org a success. We'll cover process management, development methodology, release processes, and apps life cycle maintenance.
Manage Development in Your Org with Salesforce Governance FrameworkSalesforce Developers
As your team creates more apps in your Salesforce Org, you're faced with a new set of challenges: managing a well-designed org. Join us to learn about using the practices defined in the Salesforce Governance framework, and the set of tools available for managing issues such as security, coding standards, decisions over declarative verses Apex apps, design standards, overall Org strategy, and change control. By applying these best practices, your team can continue to grow your apps to meet the continuing challenges of your company.
Three example use cases for custom REST and SOAP interfaces on the Force.com platform are given: 1) Allowing multiple external parties to log leads without duplicates, 2) Exposing a complex business process, and 3) Allowing a mobile app to interact with complex data models. The benefits of custom interfaces are listed as transaction safety, lower latency, and exposing only necessary business logic and data. Caveats include tools not understanding custom interfaces and the need to write and test code. Best practices discussed include conscious API design, considering the user experience, working with platform capabilities, and thorough testing.
This document discusses implementing data governance around packaged apps in Salesforce. It outlines how Salesforce can act as either a data repository or data feed depending on an organization's needs. It also discusses the differences between managed and unmanaged packages and the various tools in the Salesforce data toolbox that can be used for data governance, such as validation rules, workflows, and Apex triggers. The presentation concludes with a demonstration of the "Data Governator" app and some solutions for improving data governance with that app.
Dreamforce 15 - Platform Encryption for DevelopersPeter Chittum
An overview of the new Salesforce Shield Encryption feature with a focus on developer strategies with SOQL, Apex, and point-and-click development features. Peter Chittum, Developer Evangelist, and Assaf Ben-Gur, Product Manager for the encryption feature break down the key features of platform encryption, how to enable the feature, and how it fits into the context of the whole suite of security tools that every Salesforce customer has in their environment. While platform encryption preserves much of the key business functionality of the platform, some features are currently limited. As such we discuss and suggest specific work-arounds to get the most out of encryption when you decide to enable it.
Webinar: Cut that Clutter! Maintain a Clean Org and Improve ProductivitySalesforce Admins
If you have hundreds of custom fields on an object, 20+ installed packages and more page layouts than you know what to do with, it’s time to clean your org. #AwesomeAdmin Kelly Bentubo has done just that and will share what it takes to make your org the lean, mean, data-crushing machine you have always envisioned. In this session, we will walk you through identifying problem data types, migrating data, and how to handle the complete process of change management as you clean up your org.
When building apps for the Salesforce AppExchange, having a well-designed API around your application will draw in the developer audience and make your app more successful. Join us as step-by-step, we'll explore the principles of good API design, including security, ease of use, integration, and adaptability. We'll also give examples of API documentation and specific Force.com guidelines for APIs.
Dreamforce 2017: Salesforce DX - an Admin's PerspectiveMike White
The Salesforce DX tool-set dramatically improves the development process for programmatic creation on the Salesforce platform but admins can use these same tools to streamline the declarative creation process as well.
These slides were part of the Dreamforce 2017 admin track presentation titled "Salesforce DX - an Admin's Perspective" given on November 7, 2017.
How to Launch Your AppExchange App at DreamforceCodeScience
There's never been a better time to leverage the momentum of Dreamforce to launch your AppExchange product. Take advantage of the world's largest enterprise conference. Here's what you need to know.
When building apps for the Salesforce AppExchange, having a well-designed API around your application will draw in the developer audience and make your app more successful. Join us as step-by-step, we'll explore the principles of good API design, including security, ease of use, integration, and adaptability. We'll also give examples of API documentation and specific Force.com guidelines for APIs.
Salesforce Security Review Tips and TricksRyan Flood
1) The document provides tips and tricks for passing Salesforce's security review process for apps on the AppExchange.
2) It discusses the importance of security for maintaining customer trust, and outlines Salesforce's security review process including development best practices, security testing tools, and requirements for submission.
3) Developers are advised to utilize security training modules, documentation, scanning tools, and office hours for assistance in developing securely and preparing for the security review.
What’s new in summer’15 release - Security & ComplianceShesh Kondi
The Summer'15 Release of Salesforce is going live during the second week of June.
Find out what's new in the Security and Compliance areas in the new release.
We’re excited to share some new resources to help you become a security-minded Admin! We will show you a sneak peek of our new security homepage on trust.salesforce.com, tips on how to become a Trust Trailblazer with our new security badges and trail.
Secure Development on the Salesforce Platform - Part 3Mark Adcock
This webinar covers key topics and best practices on how to securely connect your applications with Salesforce. We will demonstrate Salesforce recommended solutions to securely handle secrets within your application and help you prevent data leaks
You will also learn how to set up a Salesforce Connected App to handle authentication and access control when integrating with Salesforce.
Similar to Salesforce shield & summer 20 release (20)
Graspan: A Big Data System for Big Code AnalysisAftab Hussain
We built a disk-based parallel graph system, Graspan, that uses a novel edge-pair centric computation model to compute dynamic transitive closures on very large program graphs.
We implement context-sensitive pointer/alias and dataflow analyses on Graspan. An evaluation of these analyses on large codebases such as Linux shows that their Graspan implementations scale to millions of lines of code and are much simpler than their original implementations.
These analyses were used to augment the existing checkers; these augmented checkers found 132 new NULL pointer bugs and 1308 unnecessary NULL tests in Linux 4.4.0-rc5, PostgreSQL 8.3.9, and Apache httpd 2.2.18.
- Accepted in ASPLOS ‘17, Xi’an, China.
- Featured in the tutorial, Systemized Program Analyses: A Big Data Perspective on Static Analysis Scalability, ASPLOS ‘17.
- Invited for presentation at SoCal PLS ‘16.
- Invited for poster presentation at PLDI SRC ‘16.
E-commerce Development Services- Hornet DynamicsHornet Dynamics
For any business hoping to succeed in the digital age, having a strong online presence is crucial. We offer Ecommerce Development Services that are customized according to your business requirements and client preferences, enabling you to create a dynamic, safe, and user-friendly online store.
Artificia Intellicence and XPath Extension FunctionsOctavian Nadolu
The purpose of this presentation is to provide an overview of how you can use AI from XSLT, XQuery, Schematron, or XML Refactoring operations, the potential benefits of using AI, and some of the challenges we face.
Mobile App Development Company In Noida | Drona InfotechDrona Infotech
Drona Infotech is a premier mobile app development company in Noida, providing cutting-edge solutions for businesses.
Visit Us For : https://www.dronainfotech.com/mobile-application-development/
What is Master Data Management by PiLog Groupaymanquadri279
PiLog Group's Master Data Record Manager (MDRM) is a sophisticated enterprise solution designed to ensure data accuracy, consistency, and governance across various business functions. MDRM integrates advanced data management technologies to cleanse, classify, and standardize master data, thereby enhancing data quality and operational efficiency.
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Crescat
Crescat is industry-trusted event management software, built by event professionals for event professionals. Founded in 2017, we have three key products tailored for the live event industry.
Crescat Event for concert promoters and event agencies. Crescat Venue for music venues, conference centers, wedding venues, concert halls and more. And Crescat Festival for festivals, conferences and complex events.
With a wide range of popular features such as event scheduling, shift management, volunteer and crew coordination, artist booking and much more, Crescat is designed for customisation and ease-of-use.
Over 125,000 events have been planned in Crescat and with hundreds of customers of all shapes and sizes, from boutique event agencies through to international concert promoters, Crescat is rigged for success. What's more, we highly value feedback from our users and we are constantly improving our software with updates, new features and improvements.
If you plan events, run a venue or produce festivals and you're looking for ways to make your life easier, then we have a solution for you. Try our software for free or schedule a no-obligation demo with one of our product specialists today at crescat.io
8 Best Automated Android App Testing Tool and Framework in 2024.pdfkalichargn70th171
Regarding mobile operating systems, two major players dominate our thoughts: Android and iPhone. With Android leading the market, software development companies are focused on delivering apps compatible with this OS. Ensuring an app's functionality across various Android devices, OS versions, and hardware specifications is critical, making Android app testing essential.
Zoom is a comprehensive platform designed to connect individuals and teams efficiently. With its user-friendly interface and powerful features, Zoom has become a go-to solution for virtual communication and collaboration. It offers a range of tools, including virtual meetings, team chat, VoIP phone systems, online whiteboards, and AI companions, to streamline workflows and enhance productivity.
Measures in SQL (SIGMOD 2024, Santiago, Chile)Julian Hyde
SQL has attained widespread adoption, but Business Intelligence tools still use their own higher level languages based upon a multidimensional paradigm. Composable calculations are what is missing from SQL, and we propose a new kind of column, called a measure, that attaches a calculation to a table. Like regular tables, tables with measures are composable and closed when used in queries.
SQL-with-measures has the power, conciseness and reusability of multidimensional languages but retains SQL semantics. Measure invocations can be expanded in place to simple, clear SQL.
To define the evaluation semantics for measures, we introduce context-sensitive expressions (a way to evaluate multidimensional expressions that is consistent with existing SQL semantics), a concept called evaluation context, and several operations for setting and modifying the evaluation context.
A talk at SIGMOD, June 9–15, 2024, Santiago, Chile
Authors: Julian Hyde (Google) and John Fremlin (Google)
https://doi.org/10.1145/3626246.3653374
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesQuickdice ERP
Explore the seamless transition to e-invoicing with this comprehensive guide tailored for Saudi Arabian businesses. Navigate the process effortlessly with step-by-step instructions designed to streamline implementation and enhance efficiency.
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeAftab Hussain
Understanding variable roles in code has been found to be helpful by students
in learning programming -- could variable roles help deep neural models in
performing coding tasks? We do an exploratory study.
- These are slides of the talk given at InteNSE'23: The 1st International Workshop on Interpretability and Robustness in Neural Software Engineering, co-located with the 45th International Conference on Software Engineering, ICSE 2023, Melbourne Australia
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j
Dr. Jesús Barrasa, Head of Solutions Architecture for EMEA, Neo4j
Découvrez les dernières innovations de Neo4j, et notamment les dernières intégrations cloud et les améliorations produits qui font de Neo4j un choix essentiel pour les développeurs qui créent des applications avec des données interconnectées et de l’IA générative.
Software Engineering, Software Consulting, Tech Lead, Spring Boot, Spring Cloud, Spring Core, Spring JDBC, Spring Transaction, Spring MVC, OpenShift Cloud Platform, Kafka, REST, SOAP, LLD & HLD.
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...XfilesPro
Wondering how X-Sign gained popularity in a quick time span? This eSign functionality of XfilesPro DocuPrime has many advancements to offer for Salesforce users. Explore them now!
Do you want Software for your Business? Visit Deuglo
Deuglo has top Software Developers in India. They are experts in software development and help design and create custom Software solutions.
Deuglo follows seven steps methods for delivering their services to their customers. They called it the Software development life cycle process (SDLC).
Requirement — Collecting the Requirements is the first Phase in the SSLC process.
Feasibility Study — after completing the requirement process they move to the design phase.
Design — in this phase, they start designing the software.
Coding — when designing is completed, the developers start coding for the software.
Testing — in this phase when the coding of the software is done the testing team will start testing.
Installation — after completion of testing, the application opens to the live server and launches!
Maintenance — after completing the software development, customers start using the software.
1. Devendra Sawant
Fremont Salesforce User Group Lead
Senior Salesforce Engineer, Guardant Health Inc.
Salesforce Shield Platform Encryption & Summer'20 Release
Features
Salesforce Consultant, Pinterest Inc.
Shraddha Salvi
2. This presentation may contain forward-looking statements that involve risks, uncertainties, and assumptions. If any such uncertainties materialize or if any of the
assumptions proves incorrect, the results of salesforce.com, inc. could differ materially from the results expressed or implied by the forward-looking statements we
make. All statements other than statements of historical fact could be deemed forward-looking, including any projections of product or service availability, subscriber
growth, earnings, revenues, or other financial items and any statements regarding strategies or plans of management for futur e operations, statements of belief, any
statements concerning new, planned, or upgraded services or technology developments and customer contracts or use of our services.
The risks and uncertainties referred to above include – but are not limited to – risks associated with developing and delivering new functionality for our service, new
products and services, our new business model, our past operating losses, possible fluctuations in our operating results and rate of growth, interruptions or delays
in our Web hosting, breach of our security measures, the outcome of any litigation, risks associated with completed and any possible mergers and acquisitions, the
immature market in which we operate, our relatively limited operating history, our ability to expand, retain, and motivate our employees and manage our growth,
new releases of our service and successful customer deployment, our limited history reselling non-salesforce.com products, and utilization and selling to larger
enterprise customers. Further information on potential factors that could affect the financial results of salesforce.com, inc. is included in our annual report on Form
10-K for the most recent fiscal year and in our quarterly report on Form 10-Q for the most recent fiscal quarter. These documents and others containing important
disclosures are available on the SEC Filings section of the Investor Information section of our Web site.
Any unreleased services or features referenced in this or other presentations, press releases or public statements are not currently available and may not be
delivered on time or at all. Customers who purchase our services should make the purchase decisions based upon features that are currently available.
Salesforce.com, inc. assumes no obligation and does not intend to update these forward-looking statements.
Forward-Looking Statement
Statement under the Private Securities Litigation Reform Act of 1995
4. Why Should We encrypt Org data?
• Evaluation of public cloud services
• Protecting against data loss due to unauthorized database access
• Industry, Regulatory requirements: Personally identifiable information (PII), and
Protected Health Information (PHI)
• Additional layer of Compliance and governance
5. Salesforce Shield - Trio of Security Tools
Platform Encryption
Scramble Information
Data Encryption using Keys
Encrypted Data at Rest
Event Monitoring
Granular details of User activities as
events such as Login, Logouts,
Lightning, VF page loads, API calls,
Export Reports, Apex executions etc.
Field Audit Trail
Policy to retain archived field history
data up to 10 years
Support 60 fields
6. Classic Encryption vs Shield Platform
EncryptionFeature CLASSIC ENCRYPTION PLATFORM ENCRYPTION
Pricing Included in base user license Additional fee applies
Encryption at Rest
Encryption Algorithm 128-bit Advanced Encryption Standard (AES) 256-bit Advanced Encryption Standard (AES)
Masking
Encrypted Custom Fields
Dedicated custom field type, limited to 175
characters
Encrypt Standard Fields
Search (UI, Partial Search, Lookups,
Certain SOSL Queries)
Available in Workflow Rules and
Workflow Field Updates
Available in Approval Process Entry
Criteria and Approval Step Criteria
Encrypted Attachments, Files, and
Content
7. Platform Encryption..
FOR UNAUTHORIZED
USERS AND NOT FOR
USERS PART OF YOUR ORG
SUPPORT TO STANDARD
FIELDS, CUSTOM FIELDS
AND FILES
BRING YOUR OWN KEY
(BYOK)
DATA IS NOT MASKED FOR
AUTHORIZED (INTERNAL)
USERS
8. Probabilistic Encryption
• Default Encryption Scheme
• Most secure version
• Example, FirstName = ‘Andrew’ → If the FirstName field is encrypted with
probabilistic encryption, each instance of the value ‘Andrew’ represents a different
cipher text
• Does not support Filter functionality
9. Deterministic (Filter-Preserving) Encryption
• Example, FirstName = ‘Andrew’ → If
the FirstName field is encrypted with
Deterministic encryption, each
instance of the value ‘Andrew’
represents a same cipher text
• Retains the benefits of filtering
data
• Minimial encryption strength
• Case-Sensitive
• Case-Insensitive
14. Destroy Key and then
check the older data
(Don’t test this in
Production)
15. Encryption Considerations
• How newly created records can be encrypted?
• If we create a new field and create a record then the value will be encrypted with the keys
How existing records can be encrypted?
• If we update an existing record, even if without changing any values from UI and pressing
the Save button, the values will be encrypted.
• By loading .csv file through a data loader, existing records can be encrypted.
• But, for those updates, we will see Last Modified By and Last Modified Date changes.
• Contact Salesforce support
16. Continued..
Reports, Dashboards and List Views
Report charts and dashboard components that
display encrypted field values might be cached
unencrypted
You can’t sort records in list views by fields that
contain encrypted Compound Fields
Compound Fields
This query does not work: Select Id from Contact
Where Name = ‘James Root'
But this query does work: Select Id from Contact
Where FirstName = ‘James’ And LastName
=‘Root' Case-insensitive deterministic encryption
supports compound fields.
17. Continued..
• SOQL LIKE and STARTS WITH Statements
• Deterministic encryption only supports exact, case-sensitive matches. Comparison operators that return
partial matches aren’t supported. For example, LIKE and STARTS WITH statements aren’t supported.
• SOQL Group By Statements
• You can use most of the SOQL statements with deterministic encryption. One exception is GROUP BY,
which isn’t supported, even though you can group report results by row or column.
• SOQL ORDER BY Statements
• Because deterministic encryption doesn’t maintain the sort order of encrypted data in the database,
ORDER BY isn’t supported
18. Encryption Best Practices
1
Encrypt only where
necessary
2
Create a strategy
early for backing up
and archiving keys
and data
3
Read the Shield
Platform
Encryption
considerations and
understand their
implications on
your organization
4
Analyze and test
AppExchange apps
before deploying
them
5
Use out-of-the-box
security tools
6
Grant the Manage
Encryption Keys
user permission to
authorized users
only
7
Encrypt your data
using the most
current key
22. Split List View
• This feature gives the Salesforce standard List View layout a real
boost, allowing users to see their list view data, as well as a
selected record. If you have previously worked with the Console
view, this gives a very similar feel. Once Summer ’20 has been
deployed, users will see an extra option in the “Display As” field,
and can turn this on at will.
23. Dynamic Forms
• Dynamic Forms give you the ability
to create sub-sections of page layouts,
placing them where ever you like on a
lightning page. This gives you the ability
to combine with visibility rules,
allowing you to hide fields dependent
on field values, which opens up
massive possibilities. This feature is
Non-GA Preview, which means you
have to request it from Salesforce, and
is not supported the same way as your
other products.
24. Salesforce Optimizer App
• The Salesforce Optimizer was a tool
that was released over 3 years ago to
help give Admins an insight into the
performance and general health of
their Org. This used to be in the form of
a PDF download, but with the Summer
’20 release, an interactive App has
been created.
26. New In-App Guidance Builder
• In-App Guidance has been a major
feature in the last few Salesforce
Releases, it gives you the chance to
build helpful prompts and onboarding
sequences for your users. Helping them
to perform a task, or navigate the
Salesforce interface. Check out tutorial
27. New In-App Guidance Builder…
When it comes to testing and
monitoring prompts:
• Preview your prompt for a quick
look to check formatting and the
link
• Test your prompt by logging in as a
specific user
• Track metrics for views and clicks
right from the setup page
28. Major Flow Updates 1.1
• Trigger a Flow to Run After a Record Is
Saved
• Previously, a record-triggered flow
could only run before the record was
saved, and the flow could only make
updates to that new or updated record.
After-save record-triggered flows can
access other records, perform actions,
and use more types of flow elements.
These flows can even replace most
workflow rules and record-change
processes that are built in Process Builder.
29. Major Flow Updates 1.1 …
• Record-Triggered Flow Considerations
• These considerations apply to record-triggered flows that make before-save updates.
• The flow can’t perform actions other than updating the triggering record’s field values.
• The flow can’t update values in records that are related to the triggering record.
• Only these elements are supported: Assignment, Decision, Get Records, and Loop.
• The View All Data permission is required to activate an autolaunched flow that has a
trigger.
• If an object has multiple active flows that make before-save updates, we can't guarantee
the order in which those flows are executed.
• Changing only the record owner doesn't launch record-triggered flows.
30. Major Flow Updates 1.2
• Trigger a Flow to Run When a
Platform Event Message Is Received
• Previously, platform event–driven
automation required you to use
Process Builder and Flow Builder.
Unlike event processes, platform
event–triggered flows don’t require an
associated Salesforce object and can
access all available records.
31. Major Flow Updates
1.3
• Create Flows with the Enhanced New Flow Window and Start
Element
• You now see the options to create a record-, schedule-, or platform
event–triggered flow upon clicking New Flow in Setup
32. Major Flow Updates 1.4
• Configure Loop Elements Without
Creating Loop Variables
• When you add a Loop element to a
flow, we create the loop variable for
you. The loop variable temporarily
stores the current item as the flow
iterates over the collection variable's
items.
33. Major Flow Updates 1.5
• Run Flows That Bypass User
Permissions
• Allow guest users to create or edit
records they don’t have direct access to
by setting your flow to run in system
context without sharing. Flows running
with this setting ignore object-level
security, field-level security, org-wide
default settings, role hierarchies,
sharing rules, manual sharing, teams,
and territories.
34. Major Flow Updates 1.6
Debug More Flows Faster
When you debug an autolaunched flow that saves changes to
the database such as create records, you don’t have to revert
those changes manually anymore. In Flow Builder, use rollback
mode and let it save you the hassle.
When you debug a schedule-triggered flow that runs for a
batch of records, Flow Builder uses the oldest record that
matches the filter conditions.
The Lookup component makes it easy to set values for record
variables.
To use rollback mode when you debug an autolaunched flow,
click Enable rollback mode.
35. Major Flow Updates 1.7
• Pass In the Record When
Launching a Flow from a
Lightning Page or a Quick Action
• Each quick action automatically
passes the record into the flow’s
record variable named “recordId”.
In Lightning App Builder, a simple
checkbox lets the Lightning page
pass the record into a record
variable in the flow.
36. Analyze Screenflow usage
• How: From the App Launcher, enter report,
click Reports, and then Public Folders. Find and
select Sample Flow Report: Screen Flow.
• Flow Interview Logs tracks information about a
given instance of a flow – which we call an
“interview”.
• Flow Interview Log Entries tracks information
about each screen within an interview.
• Tracks how often users navigate backwards in a
flow, which screen users spend the most time on,
and how often errors occur for a given flow or
which flows have been paused for long enough
that you’d consider them abandoned.
37. Attach .csv Files to Report Subscriptions (Beta)
• Now, subscribers will see a new
option on the report subscription page
which will let them request a .csv file.
The file can hold up to 15,000 rows and
30 columns. Subscribers can quickly
begin working with the data as soon as
the email hits their inbox. In Setup,
from Reports and Dashboards Settings,
select Let users attach reports as files
to report subscription emails in
Lightning Experience, and save your
changes.
38. Minimum Access Profile
Sometimes there is a specific business
need, such as integration with another
system, to allow a user to have minimal
access to your Salesforce instance.
With the new Minimum Access Profile,
you can assign permission sets and
increase their access aligned with the
business need. This can save a lot of
time because admins no longer need to
clone a profile and then spend time
removing specific permissions; they can
start from this profile and then add the
desired permissions on top.
39. Release Updates Setup Page
• The Release Updates page allows
you to easily gather all you need to
prepare your org for any significant
Salesforce updates, whether it’s a
major release, patch release, or urgent
bug fix rollout.
• When you drill down into a specific
Release Update, there are three main
sections: “What’s changing?”, “Who is
affected?” and “How does this impact
my org?”
40. Open Hyperlinks in Formula Fields Correctly (Update,
Enforced)
• If you have formula fields that contain a HYPERLINK function, Lightning Experience
ignores the target value when attempting to open the link. This update ensures that the
target value for hyperlinks is honored, whether it’s explicitly configured or set by
default. This update was first made available in Winter ’19 and is enforced in Summer
’20.
From Setup, enter Critical Updates in the Quick Find box.
Then select Critical Updates. For Lightning Experience Honors
Target Values for Hyperlinks in Formula Fields, click
Acknowledge.
41. Create Flow Screen Components That Work for
Multiple Objects (Beta)
• Now developers can create reusable screen
components that use the generic sObject and
sObject[] data types. They can build one
component that works for multiple objects,
rather than one component for each individual
object. For example, they can build a data table
component that works with any collection of
records, from accounts and contacts to custom
objects.
• Previously, the example component was tied
to one object, such as Account, Contact, or
myCustomObject__c. But now developers
create one component, and the Flow Builder
admin chooses the object each time they use
that component.
42. Critical Update App New Version
• We are slowly seeing all “Classic”
style layouts removed from Lightning,
and with Summer ’20 we see the old
“Critical Updates” page replaced with
“Release Updates”. This provides a lot
more information about each update
that needs to be updated in Salesforce,
giving you more comfort in when it will
be released, and what steps need to be
taken.
46. Aura Components in the ui Namespace Are Being
Deprecated
• When: Salesforce plans to end
support for Aura components in the ui
namespace on May 1, 2021. You can
continue to use these components
beyond May 1, 2021, but we won’t
accept support cases for them after
that date.
• Please refer to the list of the
components being deprecated here.
49. Quiz
• Consider adding a short video that users can follow while learning how to complete a task
in the app that you want to remain on screen. Which type of prompt would you use -
Floating or Docked?
• Changing only the record owner would launch record-triggered flows - True/False
• When you run a flow in system mode without sharing, a limited set of actions and
operations still run in user mode. True/False
• Which are the two standard objects offered from Salesforce which can be used for tracking
screen flow usage?
• You still have to use a Get Records element to get other details from the record, like the
owner ID or associated revenue while passing the record ID on Quick Action Lightning
page. True/False