SlideShare a Scribd company logo
Platform Encryption
Enhanced Native Encryption in the App Cloud
​ Peter Chittum
​ Developer Evangelist
​ @pchittum
​ github.com/pchittum
​ 
​ Assaf Ben-Gur
​ Senior Product Manager
​ @assafbengur
​ 
Safe Harbor
Safe harbor statement under the Private Securities Litigation Reform Act of 1995:
This presentation may contain forward-looking statements that involve risks, uncertainties, and assumptions. If any such uncertainties materialize
or if any of the assumptions proves incorrect, the results of salesforce.com, inc. could differ materially from the results expressed or implied by
the forward-looking statements we make. All statements other than statements of historical fact could be deemed forward-looking, including any
projections of product or service availability, subscriber growth, earnings, revenues, or other financial items and any statements regarding
strategies or plans of management for future operations, statements of belief, any statements concerning new, planned, or upgraded services or
technology developments and customer contracts or use of our services.
The risks and uncertainties referred to above include – but are not limited to – risks associated with developing and delivering new functionality
for our service, new products and services, our new business model, our past operating losses, possible fluctuations in our operating results and
rate of growth, interruptions or delays in our Web hosting, breach of our security measures, the outcome of any litigation, risks associated with
completed and any possible mergers and acquisitions, the immature market in which we operate, our relatively limited operating history, our
ability to expand, retain, and motivate our employees and manage our growth, new releases of our service and successful customer deployment,
our limited history reselling non-salesforce.com products, and utilization and selling to larger enterprise customers. Further information on
potential factors that could affect the financial results of salesforce.com, inc. is included in our annual report on Form 10-K for the most recent
fiscal year and in our quarterly report on Form 10-Q for the most recent fiscal quarter. These documents and others containing important
disclosures are available on the SEC Filings section of the Investor Information section of our Web site.
Any unreleased services or features referenced in this or other presentations, press releases or public statements are not currently available and
may not be delivered on time or at all. Customers who purchase our services should make the purchase decisions based upon features that are
currently available. Salesforce.com, inc. assumes no obligation and does not intend to update these forward-looking statements.
Peter Chittum
Developer Evangelist
@pchittum
github.com/pchittum
Assaf Ben-Gur
Senior Product Manager
@assafbengur
Speakers
Agenda
▪  Overview of Platform Encryption
▪  Features and Architecture
▪  Managing Platform Encryption
▪  Developing in a Platform Encryption Environment

Recommended for you

Secure Salesforce: Org Access Controls
Secure Salesforce: Org Access ControlsSecure Salesforce: Org Access Controls
Secure Salesforce: Org Access Controls

If you've seen the news lately, you know you need strong security protections for your online systems. Join us as we teach you that access control features like IP range restrictions, identity confirmation, and two-factor authentication are absolutely critical to the protection of your Salesforce instance. Hear from Salesforce security engineers about how these protections work, threats they mitigate, and possible drawbacks. We'll also teach you some tricks to securely using Salesforce alongside these features.

df15devzonesalesforce developers
What’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & ComplianceWhat’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & Compliance

The Summer'15 Release of Salesforce is going live during the second week of June. Find out what's new in the Security and Compliance areas in the new release.

salesforcecomplianceauthentication
Salesforce Security Best Practices for Every Admin
Salesforce Security Best Practices for Every AdminSalesforce Security Best Practices for Every Admin
Salesforce Security Best Practices for Every Admin

In this presentation, we will discuss Salesforce Security Best Practices for Every Admin. Following these advanced Salesforce Security best practices will help us get most of the powerful and out-of-the-box Salesforce CRM system. Through it, Salesforce admins can easily leverage all of the platform’s features to safeguard their company and customers' data.

salesforce securityadmincustomer relationship management
Introducing: Salesforce Shield
New services to help you build trusted apps fast
Infrastructure Services
Network Services
Application Services
Secure Data
Centers
Backup and
Disaster Recovery
HTTPS
Encryption
Penetration
Testing
Advanced
Threat Detection
Identity & Single
Sign On
Two Factor
Authentication
User Roles &
Permissions
Field & Row
Level Security
Secure
Firewalls
Real-time
replication
Password
Policies
Third Party
Certifications
IP Login
Restrictions
Customer
Audits
Salesforce Shield
Platform
Encryption
Event
Monitoring
Field Audit
Trail
Encrypt Sensitive Data, Preserving Business
Functionality
Seamlessly protect data at rest
Encrypt standard & custom fields, files & attachments
​ 
Natively integrated with key Salesforce
features
E.g., Search, Validation Rules, Lookups work with
encrypted data
Customer managed keys
Customer-driven encryption key lifecycle management
Platform Encryption Use Cases
▪  Regulatory Compliance
▪  Unauthorized Access to Database
▪  Contractual Obligations
Platform Encryption is Not
▪  Sharing Model
▪  Object/Field Level Security
▪  Data Residency Solution
▪  Encryption for Other Non-Salesforce Data
▪  Protection against Social Engineering
trust.salesforce.com

Recommended for you

Single Sign-On and User Provisioning with Salesforce Identity
Single Sign-On and User Provisioning with Salesforce IdentitySingle Sign-On and User Provisioning with Salesforce Identity
Single Sign-On and User Provisioning with Salesforce Identity

When an employee or contractor is hired in an organization, admins need to grant them access to Salesforce and other applications. Employees need an easy way to launch these applications without having to remember their URLs or passwords. And, when the employee leaves the organization, their accounts need to be disabled across all the applications. Join us to learn how to implement Salesforce Identity features to simplify user lifecycle management, single sign-on (SSO) for your applications, and how customers are using it to solve their business problems.

salesforce.comsalesforcedevzone
Introduction to the Salesforce Security Model
Introduction to the Salesforce Security ModelIntroduction to the Salesforce Security Model
Introduction to the Salesforce Security Model

The Salesforce platform offers system as well as application level security capabilities for building robust and secure applications. Join us as we introduce the system-level security features of Salesforce, like authentication and authorization mechanisms that include various Single Sign-On and OAuth flows. We'll also cover declarative application-level security features, like user profiles, roles and permissions, and how an Organization Wide Security and record-sharing model enforces a finer level of access control over the data.

developersecuritysingle sign-on
2. 8 things that will make your business love your developers again
2. 8 things that will make your business love your developers again2. 8 things that will make your business love your developers again
2. 8 things that will make your business love your developers again

This document summarizes 7 things that will make businesses love their developers again when using the Force.com platform. It highlights how Force.com handles infrastructure concerns so developers can focus on building apps. It also provides examples of customizable objects and fields, real-time customization, security and sharing controls, social features, process automation, reporting and analytics, and an app marketplace for integration.

Encryption
Authentication & SSO
Two factor Auth
Profiles/Permissions
Sharing & FLS
Setup Audit Trail
Field History Tracking
Event Monitoring
Identity
Encryption
Platform Encryption Is Unique
▪  Quickly Seamlessly interact and protect sensitive data
▪  Setup takes minutes - No Software! No Hardware!
▪  Makes the App Cloud ‘encryption aware’ (metadata driven)
▪  Salesforce1 Mobile-ready, natively
Agenda
▪  Overview of Platform Encryption
▪  Features and Architecture
▪  Managing Platform Encryption
▪  Developing in a Platform Encryption Environment
Users

Recommended for you

Secure Salesforce: Secret Storage in Your Salesforce Instance
Secure Salesforce: Secret Storage in Your Salesforce InstanceSecure Salesforce: Secret Storage in Your Salesforce Instance
Secure Salesforce: Secret Storage in Your Salesforce Instance

Preparing to integrate? Join us to better understand how to store sensitive secrets on the Force.com Platform. Learn all the best practices for keeping your passwords, keys, and tokens secure. We will walk you through encrypted fields, protected custom settings, managed packages, and the brand new Named Credentials feature to provide you with all the knowledge you need to store a secret.

devzonesalesforcedreamforce
Integrating Active Directory With Salesforce Using Identity Connect
Integrating Active Directory With Salesforce Using Identity ConnectIntegrating Active Directory With Salesforce Using Identity Connect
Integrating Active Directory With Salesforce Using Identity Connect

With Active Directory being the system of record for user identities at many organizations, keeping users in sync with Salesforce is a challenge. Salesforce Identity Connect allows you to sync users from Active Directory into Salesforce, authenticate users into Salesforce using Active Directory credentials, and provide seamless Single Sign-on using Integrated Windows Authentication (IWA). Join us to learn about this new product offering from Salesforce.

JDF18 - Connecting the customer success platform
JDF18 - Connecting the customer success platformJDF18 - Connecting the customer success platform
JDF18 - Connecting the customer success platform

Presented these slides at Jaipur Dev Fest #JDF18 on 28 July 2018 to the developer community with the intent to list all the integration options and solutions with use cases.

salesforceintegrationarchitecture
Encrypt at Rest: Fields
Name:
Darla Hood
Name:
aI90xi60csICOdk
Encryption
Service
Darla Hood
***********
Encrypt at Rest: Files
Lorem
ipsum
dolor
Encryption
Service
Xvier0c
9ghcru
cjf4x21f
fdqbBLorem
ipsum
dolor
Granular Control: Fields
▪  Individual Custom Fields
–  Text
–  Text Area
–  Text Area (Long)
–  Email
–  Phone
–  URL
–  Selected Standard Fields
▪  Enabled with flag
Granular Control: Files
▪  Files enabled separately
–  Attachments
–  Chatter
–  Files
–  Libraries
▪  All or none

Recommended for you

Navi Mumbai Salesforce DUG meetup on integration
Navi Mumbai Salesforce DUG meetup on integrationNavi Mumbai Salesforce DUG meetup on integration
Navi Mumbai Salesforce DUG meetup on integration

This document provides an overview of how to integrate applications with the Salesforce platform using various APIs and frameworks. It discusses authentication methods like OAuth and endpoints for accessing data and functionality like the REST, SOAP, and Bulk APIs. It also covers using Canvas to embed third-party apps, calling external APIs from Apex, and exposing Apex code via endpoints.

salesforceintegration testingsalesforce.com
Secure Salesforce: External App Integrations
Secure Salesforce: External App IntegrationsSecure Salesforce: External App Integrations
Secure Salesforce: External App Integrations

Salesforce is an open and easily extensible platform. However, sometimes it's hard to figure out the best, most secure way to build these integrations. Join us as we help you build secure integrations with Salesforce by understanding the platform authentication and authorization constructs like profile permissions and OAuth scopes. We will demonstrate the importance of leveraging Salesforce security features like mutual SSL, IP range restrictions, and Connected Apps.

salesforce.comsalesforce developersdf15
Introducing Salesforce Identity
Introducing Salesforce IdentityIntroducing Salesforce Identity
Introducing Salesforce Identity

Salesforce Identity provides single sign-on, identity, and access management through a centralized cloud platform that allows users to securely login once to access all their apps, automates user provisioning and management across applications, and offers open standards-based integration with enterprise directories and applications. The platform offers extensibility, reporting, analytics, and the ability to run custom identity services.

Encryption Key
▪  Master Secret (Salesforce)
–  Rotated each release
–  Stored in the Key Derivation Servers
▪  Tenant Secret (Customer)
–  Can be Rotated once per day in Prod
–  Stored encrypted in DB
▪  Data Encryption Key
–  Derived from Secrets
–  Stored in cache, never persisted
Features and Support
▪  Feature License Required
▪  Available to evaluate in Developer Edition orgs
▪  Support for
–  Search
–  Workflow Rules
–  Validation Rules
–  Apex and VF Pages
–  And A LOT MORE...
Architecture & Encryption Process Flow
Customer driven key lifecycle
management
FIPS140-2 Hardware Security
Module based key management
infrastructure
AES encryption using 256bit keys
in CBC mode and random IV
Uses PBDKF2 HMAC with
SHA256 deriving secure 256-bit
keys that are never persisted in
Salesforce
Data encryption and decryption
actions are transparent
Agenda
▪  Overview of Platform Encryption
▪  Features and Architecture
▪  Managing Platform Encryption
▪  Developing in a Platform Encryption Environment

Recommended for you

Summer '15: User Provisioning for Connected Apps
Summer '15: User Provisioning for Connected AppsSummer '15: User Provisioning for Connected Apps
Summer '15: User Provisioning for Connected Apps

Description: With the Summer '15 release, you will be able to automatically create, update, and delete user accounts on services such as Google and Box, based on changes to user accounts in your Salesforce organization or Active Directory service. This feature also provides a centralized view of all user accounts across your applications and services. Learn how you can automate user account management across third-party applications and services! What you will learn: How user events, such as creating a user or assigning a permission set, can trigger corresponding updates in third-party services How automatic de-provisioning of third-party user accounts can improve security while saving you time and money How Salesforce Identity Connect can capture events in Active Directory and apply user provisioning updates to Salesforce that in turn can trigger updates to an external application How approval processes, auditing, and reporting help you manage user accounts effectively Intended audience Existing or prospective Salesforce Platform admins and developers ISV partners who want to package this feature to automate user creation and deletion in their applications running outside the Salesforce platform.

user provisioningsalesforce identity connectsalesforce platform
Managing the Role Hierarchy at Enterprise Scale
Managing the Role Hierarchy at Enterprise ScaleManaging the Role Hierarchy at Enterprise Scale
Managing the Role Hierarchy at Enterprise Scale

Managing large role hierarchies at enterprise scale presents challenges. Regular maintenance is needed to optimize performance as roles and data grow. Best practices include setting minimum role defaults, regularly deleting unused roles via API, and following guidance for major sharing changes to avoid performance issues. Symantec reduced their roles by 30,000 through analyzing sharing rules and portal roles with no users assigned. Periodic reviews help ensure a scalable and efficient security model.

Salesforce Identity: Don't Treat Your Customers Like Your Employees
Salesforce Identity: Don't Treat Your Customers Like Your EmployeesSalesforce Identity: Don't Treat Your Customers Like Your Employees
Salesforce Identity: Don't Treat Your Customers Like Your Employees

Looking to expand your Sales, Service, and Marketing efforts into customer touchpoints on the web? Join us to learn how Salesforce Identity can help you recognize and delight your customer across all channels. You'll learn how to use Salesforce Identity to provide social sign-on, branded user registration, single sign-on across third-party web properties, and achieve a single view of your customer. Leave ready to transform your business!

df15devzonesalesforce
Demo
▪  Managing Encryption
–  Select Fields/Files
–  Audit Encrypted Fields
–  Rotate Your Key
–  The TenantSecret sObject
The Tenant Secret sObject
​ String descText = UserInfo.getName() + ' new secret via Lightning';
​ TenantSecret newSecret = new TenantSecret(Description=descText);
​ insert newSecret;
​ 1
​ 2
​ 3
​ 4
​ 5
​ 6
Agenda
▪  Overview of Platform Encryption
▪  Features and Architecture
▪  Managing Platform Encryption
▪  Developing in a Platform Encryption Environment
Building Apps with Platform Encryption
​  SOQL Where Clauses/Filters
​  SOQL Order By/Sorting
​  Formula Fields
​  SOSL Search
​  Sort in Apex
​  Workflow/Apex Trigger
​  Instead of… ​  Use this feature…

Recommended for you

Integrating The Cloud - How to integrate Salesforce
Integrating The Cloud  - How to integrate SalesforceIntegrating The Cloud  - How to integrate Salesforce
Integrating The Cloud - How to integrate Salesforce

In this presentation Roy Gilad display the diffrent ways to create integration with and using Salesforce.

salesforceintegrationsalesforce.com
Integrating Active Directory with Salesforce
Integrating Active Directory with SalesforceIntegrating Active Directory with Salesforce
Integrating Active Directory with Salesforce

Most organizations use Microsoft Active Directory as a system of record for their users. Join us to learn how you can easily integrate Salesforce with Active Directory to synchronize users and provide single sign-on (SSO). Your users and security teams will thank you!

dreamforcesalesforcesalesforce.com
Salesforce shield & summer 20 release
Salesforce shield & summer 20 releaseSalesforce shield & summer 20 release
Salesforce shield & summer 20 release

Devendra Sawant and Shraddha Salvi presented on various topics from the Salesforce Summer '20 release. Key points included: 1. The new Split List View feature allows users to see list view data and a selected record simultaneously. Dynamic Forms allow creating sub-sections on Lightning pages with visibility rules. 2. The Salesforce Optimizer tool is now an interactive app to analyze org performance. The new In-App Guidance Builder simplifies creating prompts and guidance for users. 3. Major Flow updates include running flows after record saves, triggering flows from platform events, simplified loop elements, bypassing permissions, and passing records from Lightning pages. 4. Additional topics

salesforceshieldsummer20
Demo
▪  Customizing with Encryption
–  Searching with SOSL
–  Sorting in Apex
Searching with SOSL
​ 'FIND '' + searchStr1 + ''
​ IN ALL FIELDS
​ RETURNING
​  Account (Id, Name, type),
​  Contact (name,email, DLN__c, SSN__c)'
​ 1
​ 2
​ 3
​ 4
​ 5
Sorting with Apex: Wrapper with Comparable Interface
​ public class AccountSortable implements Comparable {
​  public Account acct;
​  AccountSortable(Account acctParam){
​  acct = acctParam;
​  }
​  public Integer compareTo(Object compareTo){
​  AccountSortable compareToAcct = (AccountSortable) compareTo;
​  return acct.Name.compareTo(compareToAcct.acct.Name);
​  }
​ }
​ //invoked like:
​ List<AccountSortable> listWithCustomSort = new List<AccountSortable>();
​ //...fill list with Accounts
​ listWithCustomSort.sort();
​ 1
​ 2
​ 3
​ 4
​ 5
​ 6
​ 7
​ 8
​ 9
​ 10
​ 11
​ 12
​ 13
​ 14
​ 15
Searching with SOSL: Handling Descending in Controller
​ //invoke your sort
​ listWithCustomSort.sort();
​ //
​ List<AccountSortable> listToReturn = new List<AccountSortable>();
​ if (order.toLowerCase() == 'desc’) {
​  for(integer i = resultList.size()-1; i >= 0; i--){
​  items.add(resultList[i].obj);
​  }
​ } else {
​  listToReturn.addAll(listWithCustomSort);
​ }
​ return listToReturn;
​ 1
​ 2
​ 3
​ 4
​ 5
​ 6
​ 7
​ 8
​ 9
​ 10
​ 11
​ 12
​ 13
​ 14
​ 15
​ 16
​ 17
​ 18

Recommended for you

Platform Encryption for ISVs (February 23, 2016)
Platform Encryption for ISVs (February 23, 2016)Platform Encryption for ISVs (February 23, 2016)
Platform Encryption for ISVs (February 23, 2016)

Platform Encryption allows customers to encrypt data at rest in Salesforce while preserving functionality. ISVs need to test if their apps work with encrypted fields, as certain functions like SOQL WHERE clauses will fail. The roadmap includes allowing encryption on managed custom fields in Summer 2016. ISVs should update apps to use alternatives like SOSL where SOQL fails to ensure apps continue working with encryption.

Salesforce platform session 2
 Salesforce platform session 2 Salesforce platform session 2
Salesforce platform session 2

The document provides an overview of a platform session on deep diving into the Salesforce platform. It begins with forward-looking statements and limitations. The presenter then introduces himself and his background. The presentation discusses building applications on the Salesforce platform using Heroku and leveraging add-ons. It provides an example of building a treasure hunt web app within a week using these tools to enable quick time-to-market and scalability.

Lightning Developer Week - Bangalore Salesforce Developer Group
Lightning Developer Week - Bangalore Salesforce Developer GroupLightning Developer Week - Bangalore Salesforce Developer Group
Lightning Developer Week - Bangalore Salesforce Developer Group

The slide deck of Lightning Dev Week, presented in Bangalore Salesforce Developer Group, on March 14th 2015.

meetuplightning dev weeklightning
Workflow Field Update
Day__c Month__c Year__c
Birthday__c
Building Apps with Platform Encryption
​  SOSL Search
​  Sort in Apex
​  Workflow/Apex Trigger
​  SOSL is not SOQL
​  Search First
​  Text Data Type Field
​  Feature ​  Considerations
Read the Docs
Plan

Recommended for you

Dreamforce 2017: Salesforce DX - an Admin's Perspective
Dreamforce 2017:  Salesforce DX - an Admin's PerspectiveDreamforce 2017:  Salesforce DX - an Admin's Perspective
Dreamforce 2017: Salesforce DX - an Admin's Perspective

The Salesforce DX tool-set dramatically improves the development process for programmatic creation on the Salesforce platform but admins can use these same tools to streamline the declarative creation process as well. These slides were part of the Dreamforce 2017 admin track presentation titled "Salesforce DX - an Admin's Perspective" given on November 7, 2017.

salesforcedreamforce 2017salesforce dx
Platform Encryption World Tour Admin Zone
Platform Encryption World Tour Admin ZonePlatform Encryption World Tour Admin Zone
Platform Encryption World Tour Admin Zone

Presentation on Platform Encryption feature of Salesforce platform. "Encryption as a Service" on Salesforce combines strong encryption and customer ownership of keys with ease of implementation. This presentation is oriented toward non-technical administrators who will need to understand the basic features of Platform Encryption, and what it means to maintain their org when using it.

salesforceencryptionadministrator
Secure Salesforce: Lightning Components Best Practices
Secure Salesforce: Lightning Components Best PracticesSecure Salesforce: Lightning Components Best Practices
Secure Salesforce: Lightning Components Best Practices

How safe are your Lightning Components? Join us and learn about the foundations required for a secure application built on Lightning. We'll cover common misconceptions around field-level security, CRUD, content security policy (CSP), as well as other common mistakes with Lightning. You'll walk away with all the best practices for hardening your application and keeping your data secure.

dreamforcesalesforcesalesforce.com
Back Up Your Secret
Q & A
Peter Chittum
Developer Evangelist
@pchittum
github.com/pchittum
Assaf Ben-Gur
Senior Product Manager
@assafbengur
​ A list of resources will be posted to the session Chatter feed.
Share Your Feedback, and Win a GoPro!
3
Earn a GoPro prize entry for
each completed survey
Tap the bell to take a
survey2Enroll in a session1
Thank you

Recommended for you

Introduction to Developing Android Apps With the Salesforce Mobile SDK
Introduction to Developing Android Apps With the Salesforce Mobile SDKIntroduction to Developing Android Apps With the Salesforce Mobile SDK
Introduction to Developing Android Apps With the Salesforce Mobile SDK

This session will show mobile developers how to build enterprise Android applications using our new Salesforce Mobile SDK. Not only will users be shown how to use the new features and functions of the SDK but we'll also dive into best practices for building mobile APIs focussed on enterprise business applications.

dreamforcemobile sdksalesforce.com
Platform Shield encryption - Trailblazer Admin Community Kochi
Platform Shield encryption - Trailblazer Admin Community KochiPlatform Shield encryption - Trailblazer Admin Community Kochi
Platform Shield encryption - Trailblazer Admin Community Kochi

This document provides an agenda and information for a community group meeting on strengthening data security with Shield Platform Encryption. The agenda includes a welcome, presentation on Shield Platform Encryption, and Q&A session. The document also provides background on the community group leaders and goals of the group to learn, connect, have fun, and give back to the community. It concludes with a welcome message for new members.

encryptionsalesforceshield
TrailheaDX and Summer '19: Developer Highlights
TrailheaDX and Summer '19: Developer HighlightsTrailheaDX and Summer '19: Developer Highlights
TrailheaDX and Summer '19: Developer Highlights

We recently announced over 300 new features and enhancements at TrailheaDX '19 and for the Summer '19 release. In our Developer Highlights webinar we explore the top features with in-depth demos, including the latest updates for Lightning Web Components (LWC), LWC Open Source, CLI updates, Change Data Capture for external objects, Asynchronous Apex Triggers, Notification Builder and more. Watch the recording here: https://youtu.be/kmOkk74QiCo

trailheadxsummer'19summer19

More Related Content

What's hot

How Securematics Reseller can Sell its Products using VARStreet Ecommmerce Pl...
How Securematics Reseller can Sell its Products using VARStreet Ecommmerce Pl...How Securematics Reseller can Sell its Products using VARStreet Ecommmerce Pl...
How Securematics Reseller can Sell its Products using VARStreet Ecommmerce Pl...
Shane Emerson
 
Paris Salesforce Developer Group - 16 09 2014 - Summer '14
Paris Salesforce Developer Group - 16 09 2014 - Summer '14Paris Salesforce Developer Group - 16 09 2014 - Summer '14
Paris Salesforce Developer Group - 16 09 2014 - Summer '14
Paris Salesforce Developer Group
 
Security and Your Salesforce Org
Security and Your Salesforce OrgSecurity and Your Salesforce Org
Security and Your Salesforce Org
Salesforce Admins
 
Secure Salesforce: Org Access Controls
Secure Salesforce: Org Access ControlsSecure Salesforce: Org Access Controls
Secure Salesforce: Org Access Controls
Salesforce Developers
 
What’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & ComplianceWhat’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & Compliance
Shesh Kondi
 
Salesforce Security Best Practices for Every Admin
Salesforce Security Best Practices for Every AdminSalesforce Security Best Practices for Every Admin
Salesforce Security Best Practices for Every Admin
Cloud Analogy
 
Single Sign-On and User Provisioning with Salesforce Identity
Single Sign-On and User Provisioning with Salesforce IdentitySingle Sign-On and User Provisioning with Salesforce Identity
Single Sign-On and User Provisioning with Salesforce Identity
Salesforce Developers
 
Introduction to the Salesforce Security Model
Introduction to the Salesforce Security ModelIntroduction to the Salesforce Security Model
Introduction to the Salesforce Security Model
Salesforce Developers
 
2. 8 things that will make your business love your developers again
2. 8 things that will make your business love your developers again2. 8 things that will make your business love your developers again
2. 8 things that will make your business love your developers again
EuroCloud
 
Secure Salesforce: Secret Storage in Your Salesforce Instance
Secure Salesforce: Secret Storage in Your Salesforce InstanceSecure Salesforce: Secret Storage in Your Salesforce Instance
Secure Salesforce: Secret Storage in Your Salesforce Instance
Salesforce Developers
 
Integrating Active Directory With Salesforce Using Identity Connect
Integrating Active Directory With Salesforce Using Identity ConnectIntegrating Active Directory With Salesforce Using Identity Connect
Integrating Active Directory With Salesforce Using Identity Connect
Salesforce Developers
 
JDF18 - Connecting the customer success platform
JDF18 - Connecting the customer success platformJDF18 - Connecting the customer success platform
JDF18 - Connecting the customer success platform
Deepu Chacko
 
Navi Mumbai Salesforce DUG meetup on integration
Navi Mumbai Salesforce DUG meetup on integrationNavi Mumbai Salesforce DUG meetup on integration
Navi Mumbai Salesforce DUG meetup on integration
Rakesh Gupta
 
Secure Salesforce: External App Integrations
Secure Salesforce: External App IntegrationsSecure Salesforce: External App Integrations
Secure Salesforce: External App Integrations
Salesforce Developers
 
Introducing Salesforce Identity
Introducing Salesforce IdentityIntroducing Salesforce Identity
Introducing Salesforce Identity
Salesforce Developers
 
Summer '15: User Provisioning for Connected Apps
Summer '15: User Provisioning for Connected AppsSummer '15: User Provisioning for Connected Apps
Summer '15: User Provisioning for Connected Apps
Salesforce Developers
 
Managing the Role Hierarchy at Enterprise Scale
Managing the Role Hierarchy at Enterprise ScaleManaging the Role Hierarchy at Enterprise Scale
Managing the Role Hierarchy at Enterprise Scale
Salesforce Developers
 
Salesforce Identity: Don't Treat Your Customers Like Your Employees
Salesforce Identity: Don't Treat Your Customers Like Your EmployeesSalesforce Identity: Don't Treat Your Customers Like Your Employees
Salesforce Identity: Don't Treat Your Customers Like Your Employees
Salesforce Developers
 
Integrating The Cloud - How to integrate Salesforce
Integrating The Cloud  - How to integrate SalesforceIntegrating The Cloud  - How to integrate Salesforce
Integrating The Cloud - How to integrate Salesforce
Roy Gilad
 
Integrating Active Directory with Salesforce
Integrating Active Directory with SalesforceIntegrating Active Directory with Salesforce
Integrating Active Directory with Salesforce
Salesforce Developers
 

What's hot (20)

How Securematics Reseller can Sell its Products using VARStreet Ecommmerce Pl...
How Securematics Reseller can Sell its Products using VARStreet Ecommmerce Pl...How Securematics Reseller can Sell its Products using VARStreet Ecommmerce Pl...
How Securematics Reseller can Sell its Products using VARStreet Ecommmerce Pl...
 
Paris Salesforce Developer Group - 16 09 2014 - Summer '14
Paris Salesforce Developer Group - 16 09 2014 - Summer '14Paris Salesforce Developer Group - 16 09 2014 - Summer '14
Paris Salesforce Developer Group - 16 09 2014 - Summer '14
 
Security and Your Salesforce Org
Security and Your Salesforce OrgSecurity and Your Salesforce Org
Security and Your Salesforce Org
 
Secure Salesforce: Org Access Controls
Secure Salesforce: Org Access ControlsSecure Salesforce: Org Access Controls
Secure Salesforce: Org Access Controls
 
What’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & ComplianceWhat’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & Compliance
 
Salesforce Security Best Practices for Every Admin
Salesforce Security Best Practices for Every AdminSalesforce Security Best Practices for Every Admin
Salesforce Security Best Practices for Every Admin
 
Single Sign-On and User Provisioning with Salesforce Identity
Single Sign-On and User Provisioning with Salesforce IdentitySingle Sign-On and User Provisioning with Salesforce Identity
Single Sign-On and User Provisioning with Salesforce Identity
 
Introduction to the Salesforce Security Model
Introduction to the Salesforce Security ModelIntroduction to the Salesforce Security Model
Introduction to the Salesforce Security Model
 
2. 8 things that will make your business love your developers again
2. 8 things that will make your business love your developers again2. 8 things that will make your business love your developers again
2. 8 things that will make your business love your developers again
 
Secure Salesforce: Secret Storage in Your Salesforce Instance
Secure Salesforce: Secret Storage in Your Salesforce InstanceSecure Salesforce: Secret Storage in Your Salesforce Instance
Secure Salesforce: Secret Storage in Your Salesforce Instance
 
Integrating Active Directory With Salesforce Using Identity Connect
Integrating Active Directory With Salesforce Using Identity ConnectIntegrating Active Directory With Salesforce Using Identity Connect
Integrating Active Directory With Salesforce Using Identity Connect
 
JDF18 - Connecting the customer success platform
JDF18 - Connecting the customer success platformJDF18 - Connecting the customer success platform
JDF18 - Connecting the customer success platform
 
Navi Mumbai Salesforce DUG meetup on integration
Navi Mumbai Salesforce DUG meetup on integrationNavi Mumbai Salesforce DUG meetup on integration
Navi Mumbai Salesforce DUG meetup on integration
 
Secure Salesforce: External App Integrations
Secure Salesforce: External App IntegrationsSecure Salesforce: External App Integrations
Secure Salesforce: External App Integrations
 
Introducing Salesforce Identity
Introducing Salesforce IdentityIntroducing Salesforce Identity
Introducing Salesforce Identity
 
Summer '15: User Provisioning for Connected Apps
Summer '15: User Provisioning for Connected AppsSummer '15: User Provisioning for Connected Apps
Summer '15: User Provisioning for Connected Apps
 
Managing the Role Hierarchy at Enterprise Scale
Managing the Role Hierarchy at Enterprise ScaleManaging the Role Hierarchy at Enterprise Scale
Managing the Role Hierarchy at Enterprise Scale
 
Salesforce Identity: Don't Treat Your Customers Like Your Employees
Salesforce Identity: Don't Treat Your Customers Like Your EmployeesSalesforce Identity: Don't Treat Your Customers Like Your Employees
Salesforce Identity: Don't Treat Your Customers Like Your Employees
 
Integrating The Cloud - How to integrate Salesforce
Integrating The Cloud  - How to integrate SalesforceIntegrating The Cloud  - How to integrate Salesforce
Integrating The Cloud - How to integrate Salesforce
 
Integrating Active Directory with Salesforce
Integrating Active Directory with SalesforceIntegrating Active Directory with Salesforce
Integrating Active Directory with Salesforce
 

Similar to Dreamforce 15 - Platform Encryption for Developers

Salesforce shield &amp; summer 20 release
Salesforce shield &amp; summer 20 releaseSalesforce shield &amp; summer 20 release
Salesforce shield &amp; summer 20 release
Devendra Sawant
 
Platform Encryption for ISVs (February 23, 2016)
Platform Encryption for ISVs (February 23, 2016)Platform Encryption for ISVs (February 23, 2016)
Platform Encryption for ISVs (February 23, 2016)
Salesforce Partners
 
Salesforce platform session 2
 Salesforce platform session 2 Salesforce platform session 2
Salesforce platform session 2
Salesforce - Sweden, Denmark, Norway
 
Lightning Developer Week - Bangalore Salesforce Developer Group
Lightning Developer Week - Bangalore Salesforce Developer GroupLightning Developer Week - Bangalore Salesforce Developer Group
Lightning Developer Week - Bangalore Salesforce Developer Group
Abhilash Kuntar
 
Dreamforce 2017: Salesforce DX - an Admin's Perspective
Dreamforce 2017:  Salesforce DX - an Admin's PerspectiveDreamforce 2017:  Salesforce DX - an Admin's Perspective
Dreamforce 2017: Salesforce DX - an Admin's Perspective
Mike White
 
Platform Encryption World Tour Admin Zone
Platform Encryption World Tour Admin ZonePlatform Encryption World Tour Admin Zone
Platform Encryption World Tour Admin Zone
Peter Chittum
 
Secure Salesforce: Lightning Components Best Practices
Secure Salesforce: Lightning Components Best PracticesSecure Salesforce: Lightning Components Best Practices
Secure Salesforce: Lightning Components Best Practices
Salesforce Developers
 
Introduction to Developing Android Apps With the Salesforce Mobile SDK
Introduction to Developing Android Apps With the Salesforce Mobile SDKIntroduction to Developing Android Apps With the Salesforce Mobile SDK
Introduction to Developing Android Apps With the Salesforce Mobile SDK
Salesforce Developers
 
Platform Shield encryption - Trailblazer Admin Community Kochi
Platform Shield encryption - Trailblazer Admin Community KochiPlatform Shield encryption - Trailblazer Admin Community Kochi
Platform Shield encryption - Trailblazer Admin Community Kochi
Anil Somasundaran
 
TrailheaDX and Summer '19: Developer Highlights
TrailheaDX and Summer '19: Developer HighlightsTrailheaDX and Summer '19: Developer Highlights
TrailheaDX and Summer '19: Developer Highlights
Salesforce Developers
 
Integrating with salesforce
Integrating with salesforceIntegrating with salesforce
Integrating with salesforce
Mark Adcock
 
The Power of Salesforce APIs World Tour Edition
The Power of Salesforce APIs World Tour EditionThe Power of Salesforce APIs World Tour Edition
The Power of Salesforce APIs World Tour Edition
Peter Chittum
 
Building Apps Faster with Lightning and Winter '17
Building Apps Faster with Lightning and Winter '17Building Apps Faster with Lightning and Winter '17
Building Apps Faster with Lightning and Winter '17
Mark Adcock
 
Building apps faster with lightning and winter '17
Building apps faster with lightning and winter '17Building apps faster with lightning and winter '17
Building apps faster with lightning and winter '17
Salesforce Developers
 
Salesforce DX for Accidential Admins
Salesforce DX for Accidential AdminsSalesforce DX for Accidential Admins
Salesforce DX for Accidential Admins
Martin Humpolec
 
API Design for Your Packaged App
API Design for Your Packaged AppAPI Design for Your Packaged App
API Design for Your Packaged App
Salesforce Developers
 
CCT London 2013 Theatre Intro to Apex
CCT London 2013 Theatre Intro to ApexCCT London 2013 Theatre Intro to Apex
CCT London 2013 Theatre Intro to Apex
Peter Chittum
 
Visualforce Hack for Junction Objects
Visualforce Hack for Junction ObjectsVisualforce Hack for Junction Objects
Visualforce Hack for Junction Objects
Ritesh Aswaney
 
API Design for Your Packaged App
API Design for Your Packaged AppAPI Design for Your Packaged App
API Design for Your Packaged App
Salesforce Developers
 
Elevate london dec 2014.pptx
Elevate london dec 2014.pptxElevate london dec 2014.pptx
Elevate london dec 2014.pptx
Peter Chittum
 

Similar to Dreamforce 15 - Platform Encryption for Developers (20)

Salesforce shield &amp; summer 20 release
Salesforce shield &amp; summer 20 releaseSalesforce shield &amp; summer 20 release
Salesforce shield &amp; summer 20 release
 
Platform Encryption for ISVs (February 23, 2016)
Platform Encryption for ISVs (February 23, 2016)Platform Encryption for ISVs (February 23, 2016)
Platform Encryption for ISVs (February 23, 2016)
 
Salesforce platform session 2
 Salesforce platform session 2 Salesforce platform session 2
Salesforce platform session 2
 
Lightning Developer Week - Bangalore Salesforce Developer Group
Lightning Developer Week - Bangalore Salesforce Developer GroupLightning Developer Week - Bangalore Salesforce Developer Group
Lightning Developer Week - Bangalore Salesforce Developer Group
 
Dreamforce 2017: Salesforce DX - an Admin's Perspective
Dreamforce 2017:  Salesforce DX - an Admin's PerspectiveDreamforce 2017:  Salesforce DX - an Admin's Perspective
Dreamforce 2017: Salesforce DX - an Admin's Perspective
 
Platform Encryption World Tour Admin Zone
Platform Encryption World Tour Admin ZonePlatform Encryption World Tour Admin Zone
Platform Encryption World Tour Admin Zone
 
Secure Salesforce: Lightning Components Best Practices
Secure Salesforce: Lightning Components Best PracticesSecure Salesforce: Lightning Components Best Practices
Secure Salesforce: Lightning Components Best Practices
 
Introduction to Developing Android Apps With the Salesforce Mobile SDK
Introduction to Developing Android Apps With the Salesforce Mobile SDKIntroduction to Developing Android Apps With the Salesforce Mobile SDK
Introduction to Developing Android Apps With the Salesforce Mobile SDK
 
Platform Shield encryption - Trailblazer Admin Community Kochi
Platform Shield encryption - Trailblazer Admin Community KochiPlatform Shield encryption - Trailblazer Admin Community Kochi
Platform Shield encryption - Trailblazer Admin Community Kochi
 
TrailheaDX and Summer '19: Developer Highlights
TrailheaDX and Summer '19: Developer HighlightsTrailheaDX and Summer '19: Developer Highlights
TrailheaDX and Summer '19: Developer Highlights
 
Integrating with salesforce
Integrating with salesforceIntegrating with salesforce
Integrating with salesforce
 
The Power of Salesforce APIs World Tour Edition
The Power of Salesforce APIs World Tour EditionThe Power of Salesforce APIs World Tour Edition
The Power of Salesforce APIs World Tour Edition
 
Building Apps Faster with Lightning and Winter '17
Building Apps Faster with Lightning and Winter '17Building Apps Faster with Lightning and Winter '17
Building Apps Faster with Lightning and Winter '17
 
Building apps faster with lightning and winter '17
Building apps faster with lightning and winter '17Building apps faster with lightning and winter '17
Building apps faster with lightning and winter '17
 
Salesforce DX for Accidential Admins
Salesforce DX for Accidential AdminsSalesforce DX for Accidential Admins
Salesforce DX for Accidential Admins
 
API Design for Your Packaged App
API Design for Your Packaged AppAPI Design for Your Packaged App
API Design for Your Packaged App
 
CCT London 2013 Theatre Intro to Apex
CCT London 2013 Theatre Intro to ApexCCT London 2013 Theatre Intro to Apex
CCT London 2013 Theatre Intro to Apex
 
Visualforce Hack for Junction Objects
Visualforce Hack for Junction ObjectsVisualforce Hack for Junction Objects
Visualforce Hack for Junction Objects
 
API Design for Your Packaged App
API Design for Your Packaged AppAPI Design for Your Packaged App
API Design for Your Packaged App
 
Elevate london dec 2014.pptx
Elevate london dec 2014.pptxElevate london dec 2014.pptx
Elevate london dec 2014.pptx
 

More from Peter Chittum

Dreamforce 2013 - Enhancing the Chatter Feed with Topics and Apex
Dreamforce 2013 - Enhancing the Chatter Feed with Topics and ApexDreamforce 2013 - Enhancing the Chatter Feed with Topics and Apex
Dreamforce 2013 - Enhancing the Chatter Feed with Topics and Apex
Peter Chittum
 
Winter 21 Developer Highlights for Salesforce
Winter 21 Developer Highlights for SalesforceWinter 21 Developer Highlights for Salesforce
Winter 21 Developer Highlights for Salesforce
Peter Chittum
 
LMS Lightning Message Service
LMS Lightning Message ServiceLMS Lightning Message Service
LMS Lightning Message Service
Peter Chittum
 
Apply the Salesforce CLI To Everyday Problems
Apply the Salesforce CLI To Everyday ProblemsApply the Salesforce CLI To Everyday Problems
Apply the Salesforce CLI To Everyday Problems
Peter Chittum
 
If You Can Write a Salesforce Formula, You Can Use the Command Line
If You Can Write a Salesforce Formula, You Can Use the Command LineIf You Can Write a Salesforce Formula, You Can Use the Command Line
If You Can Write a Salesforce Formula, You Can Use the Command Line
Peter Chittum
 
If you can write a Salesforce Formula you can use the command line
If you can write a Salesforce Formula you can use the command lineIf you can write a Salesforce Formula you can use the command line
If you can write a Salesforce Formula you can use the command line
Peter Chittum
 
Do Not Fear the Command Line
Do Not Fear the Command LineDo Not Fear the Command Line
Do Not Fear the Command Line
Peter Chittum
 
Don't Fear the Command Line
Don't Fear the Command LineDon't Fear the Command Line
Don't Fear the Command Line
Peter Chittum
 
Maths Week - About Computers, for Kids
Maths Week - About Computers, for KidsMaths Week - About Computers, for Kids
Maths Week - About Computers, for Kids
Peter Chittum
 
Best api features of 2016
Best api features of 2016Best api features of 2016
Best api features of 2016
Peter Chittum
 
Streaming api with generic and durable streaming
Streaming api with generic and durable streamingStreaming api with generic and durable streaming
Streaming api with generic and durable streaming
Peter Chittum
 
Spring '16 Release Overview - Bilbao Feb 2016
Spring '16 Release Overview - Bilbao Feb 2016Spring '16 Release Overview - Bilbao Feb 2016
Spring '16 Release Overview - Bilbao Feb 2016
Peter Chittum
 
All Aboard the Lightning Components Action Service
All Aboard the Lightning Components Action ServiceAll Aboard the Lightning Components Action Service
All Aboard the Lightning Components Action Service
Peter Chittum
 
Boxcars and Cabooses: When One More XHR Is Too Much
Boxcars and Cabooses: When One More XHR Is Too MuchBoxcars and Cabooses: When One More XHR Is Too Much
Boxcars and Cabooses: When One More XHR Is Too Much
Peter Chittum
 
Salesforce Lightning Components and App Builder EMEA World Tour 2015
Salesforce Lightning Components and App Builder EMEA World Tour 2015Salesforce Lightning Components and App Builder EMEA World Tour 2015
Salesforce Lightning Components and App Builder EMEA World Tour 2015
Peter Chittum
 
Building Applications on the Salesforce1 Platform for Imperial College London
Building Applications on the Salesforce1 Platform for Imperial College LondonBuilding Applications on the Salesforce1 Platform for Imperial College London
Building Applications on the Salesforce1 Platform for Imperial College London
Peter Chittum
 
AngularJS App In Two Weeks
AngularJS App In Two WeeksAngularJS App In Two Weeks
AngularJS App In Two Weeks
Peter Chittum
 
Df14 Salesforce Advanced Developer Certification
Df14 Salesforce Advanced Developer CertificationDf14 Salesforce Advanced Developer Certification
Df14 Salesforce Advanced Developer Certification
Peter Chittum
 
Javascript and Remote Objects on Force.com Winter 15
Javascript and Remote Objects on Force.com Winter 15Javascript and Remote Objects on Force.com Winter 15
Javascript and Remote Objects on Force.com Winter 15
Peter Chittum
 
S1 Tour Paris Developpeurs
S1 Tour Paris DeveloppeursS1 Tour Paris Developpeurs
S1 Tour Paris Developpeurs
Peter Chittum
 

More from Peter Chittum (20)

Dreamforce 2013 - Enhancing the Chatter Feed with Topics and Apex
Dreamforce 2013 - Enhancing the Chatter Feed with Topics and ApexDreamforce 2013 - Enhancing the Chatter Feed with Topics and Apex
Dreamforce 2013 - Enhancing the Chatter Feed with Topics and Apex
 
Winter 21 Developer Highlights for Salesforce
Winter 21 Developer Highlights for SalesforceWinter 21 Developer Highlights for Salesforce
Winter 21 Developer Highlights for Salesforce
 
LMS Lightning Message Service
LMS Lightning Message ServiceLMS Lightning Message Service
LMS Lightning Message Service
 
Apply the Salesforce CLI To Everyday Problems
Apply the Salesforce CLI To Everyday ProblemsApply the Salesforce CLI To Everyday Problems
Apply the Salesforce CLI To Everyday Problems
 
If You Can Write a Salesforce Formula, You Can Use the Command Line
If You Can Write a Salesforce Formula, You Can Use the Command LineIf You Can Write a Salesforce Formula, You Can Use the Command Line
If You Can Write a Salesforce Formula, You Can Use the Command Line
 
If you can write a Salesforce Formula you can use the command line
If you can write a Salesforce Formula you can use the command lineIf you can write a Salesforce Formula you can use the command line
If you can write a Salesforce Formula you can use the command line
 
Do Not Fear the Command Line
Do Not Fear the Command LineDo Not Fear the Command Line
Do Not Fear the Command Line
 
Don't Fear the Command Line
Don't Fear the Command LineDon't Fear the Command Line
Don't Fear the Command Line
 
Maths Week - About Computers, for Kids
Maths Week - About Computers, for KidsMaths Week - About Computers, for Kids
Maths Week - About Computers, for Kids
 
Best api features of 2016
Best api features of 2016Best api features of 2016
Best api features of 2016
 
Streaming api with generic and durable streaming
Streaming api with generic and durable streamingStreaming api with generic and durable streaming
Streaming api with generic and durable streaming
 
Spring '16 Release Overview - Bilbao Feb 2016
Spring '16 Release Overview - Bilbao Feb 2016Spring '16 Release Overview - Bilbao Feb 2016
Spring '16 Release Overview - Bilbao Feb 2016
 
All Aboard the Lightning Components Action Service
All Aboard the Lightning Components Action ServiceAll Aboard the Lightning Components Action Service
All Aboard the Lightning Components Action Service
 
Boxcars and Cabooses: When One More XHR Is Too Much
Boxcars and Cabooses: When One More XHR Is Too MuchBoxcars and Cabooses: When One More XHR Is Too Much
Boxcars and Cabooses: When One More XHR Is Too Much
 
Salesforce Lightning Components and App Builder EMEA World Tour 2015
Salesforce Lightning Components and App Builder EMEA World Tour 2015Salesforce Lightning Components and App Builder EMEA World Tour 2015
Salesforce Lightning Components and App Builder EMEA World Tour 2015
 
Building Applications on the Salesforce1 Platform for Imperial College London
Building Applications on the Salesforce1 Platform for Imperial College LondonBuilding Applications on the Salesforce1 Platform for Imperial College London
Building Applications on the Salesforce1 Platform for Imperial College London
 
AngularJS App In Two Weeks
AngularJS App In Two WeeksAngularJS App In Two Weeks
AngularJS App In Two Weeks
 
Df14 Salesforce Advanced Developer Certification
Df14 Salesforce Advanced Developer CertificationDf14 Salesforce Advanced Developer Certification
Df14 Salesforce Advanced Developer Certification
 
Javascript and Remote Objects on Force.com Winter 15
Javascript and Remote Objects on Force.com Winter 15Javascript and Remote Objects on Force.com Winter 15
Javascript and Remote Objects on Force.com Winter 15
 
S1 Tour Paris Developpeurs
S1 Tour Paris DeveloppeursS1 Tour Paris Developpeurs
S1 Tour Paris Developpeurs
 

Recently uploaded

UiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs ConferenceUiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs Conference
UiPathCommunity
 
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-InTrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc
 
WPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide DeckWPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide Deck
Lidia A.
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
Neo4j
 
20240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 202420240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 2024
Matthew Sinclair
 
What's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptxWhat's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptx
Stephanie Beckett
 
Observability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetryObservability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetry
Eric D. Schabell
 
Choose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presenceChoose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presence
rajancomputerfbd
 
How RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptxHow RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptx
SynapseIndia
 
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsScaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Mydbops
 
find out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challengesfind out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challenges
huseindihon
 
Password Rotation in 2024 is still Relevant
Password Rotation in 2024 is still RelevantPassword Rotation in 2024 is still Relevant
Password Rotation in 2024 is still Relevant
Bert Blevins
 
20240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 202420240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 2024
Matthew Sinclair
 
Quality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of TimeQuality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of Time
Aurora Consulting
 
Recent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS InfrastructureRecent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS Infrastructure
KAMAL CHOUDHARY
 
Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...
BookNet Canada
 
Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024
BookNet Canada
 
Mitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing SystemsMitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing Systems
ScyllaDB
 
How to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptxHow to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptx
Adam Dunkels
 
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALLBLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
Liveplex
 

Recently uploaded (20)

UiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs ConferenceUiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs Conference
 
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-InTrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
 
WPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide DeckWPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide Deck
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
 
20240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 202420240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 2024
 
What's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptxWhat's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptx
 
Observability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetryObservability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetry
 
Choose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presenceChoose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presence
 
How RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptxHow RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptx
 
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsScaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
 
find out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challengesfind out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challenges
 
Password Rotation in 2024 is still Relevant
Password Rotation in 2024 is still RelevantPassword Rotation in 2024 is still Relevant
Password Rotation in 2024 is still Relevant
 
20240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 202420240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 2024
 
Quality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of TimeQuality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of Time
 
Recent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS InfrastructureRecent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS Infrastructure
 
Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...
 
Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024
 
Mitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing SystemsMitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing Systems
 
How to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptxHow to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptx
 
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALLBLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
 

Dreamforce 15 - Platform Encryption for Developers

  • 1. Platform Encryption Enhanced Native Encryption in the App Cloud ​ Peter Chittum ​ Developer Evangelist ​ @pchittum ​ github.com/pchittum ​  ​ Assaf Ben-Gur ​ Senior Product Manager ​ @assafbengur ​ 
  • 2. Safe Harbor Safe harbor statement under the Private Securities Litigation Reform Act of 1995: This presentation may contain forward-looking statements that involve risks, uncertainties, and assumptions. If any such uncertainties materialize or if any of the assumptions proves incorrect, the results of salesforce.com, inc. could differ materially from the results expressed or implied by the forward-looking statements we make. All statements other than statements of historical fact could be deemed forward-looking, including any projections of product or service availability, subscriber growth, earnings, revenues, or other financial items and any statements regarding strategies or plans of management for future operations, statements of belief, any statements concerning new, planned, or upgraded services or technology developments and customer contracts or use of our services. The risks and uncertainties referred to above include – but are not limited to – risks associated with developing and delivering new functionality for our service, new products and services, our new business model, our past operating losses, possible fluctuations in our operating results and rate of growth, interruptions or delays in our Web hosting, breach of our security measures, the outcome of any litigation, risks associated with completed and any possible mergers and acquisitions, the immature market in which we operate, our relatively limited operating history, our ability to expand, retain, and motivate our employees and manage our growth, new releases of our service and successful customer deployment, our limited history reselling non-salesforce.com products, and utilization and selling to larger enterprise customers. Further information on potential factors that could affect the financial results of salesforce.com, inc. is included in our annual report on Form 10-K for the most recent fiscal year and in our quarterly report on Form 10-Q for the most recent fiscal quarter. These documents and others containing important disclosures are available on the SEC Filings section of the Investor Information section of our Web site. Any unreleased services or features referenced in this or other presentations, press releases or public statements are not currently available and may not be delivered on time or at all. Customers who purchase our services should make the purchase decisions based upon features that are currently available. Salesforce.com, inc. assumes no obligation and does not intend to update these forward-looking statements.
  • 3. Peter Chittum Developer Evangelist @pchittum github.com/pchittum Assaf Ben-Gur Senior Product Manager @assafbengur Speakers
  • 4. Agenda ▪  Overview of Platform Encryption ▪  Features and Architecture ▪  Managing Platform Encryption ▪  Developing in a Platform Encryption Environment
  • 5. Introducing: Salesforce Shield New services to help you build trusted apps fast Infrastructure Services Network Services Application Services Secure Data Centers Backup and Disaster Recovery HTTPS Encryption Penetration Testing Advanced Threat Detection Identity & Single Sign On Two Factor Authentication User Roles & Permissions Field & Row Level Security Secure Firewalls Real-time replication Password Policies Third Party Certifications IP Login Restrictions Customer Audits Salesforce Shield Platform Encryption Event Monitoring Field Audit Trail
  • 6. Encrypt Sensitive Data, Preserving Business Functionality Seamlessly protect data at rest Encrypt standard & custom fields, files & attachments ​  Natively integrated with key Salesforce features E.g., Search, Validation Rules, Lookups work with encrypted data Customer managed keys Customer-driven encryption key lifecycle management
  • 7. Platform Encryption Use Cases ▪  Regulatory Compliance ▪  Unauthorized Access to Database ▪  Contractual Obligations
  • 8. Platform Encryption is Not ▪  Sharing Model ▪  Object/Field Level Security ▪  Data Residency Solution ▪  Encryption for Other Non-Salesforce Data ▪  Protection against Social Engineering trust.salesforce.com
  • 9. Encryption Authentication & SSO Two factor Auth Profiles/Permissions Sharing & FLS Setup Audit Trail Field History Tracking Event Monitoring Identity Encryption
  • 10. Platform Encryption Is Unique ▪  Quickly Seamlessly interact and protect sensitive data ▪  Setup takes minutes - No Software! No Hardware! ▪  Makes the App Cloud ‘encryption aware’ (metadata driven) ▪  Salesforce1 Mobile-ready, natively
  • 11. Agenda ▪  Overview of Platform Encryption ▪  Features and Architecture ▪  Managing Platform Encryption ▪  Developing in a Platform Encryption Environment
  • 12. Users
  • 13. Encrypt at Rest: Fields Name: Darla Hood Name: aI90xi60csICOdk Encryption Service Darla Hood ***********
  • 14. Encrypt at Rest: Files Lorem ipsum dolor Encryption Service Xvier0c 9ghcru cjf4x21f fdqbBLorem ipsum dolor
  • 15. Granular Control: Fields ▪  Individual Custom Fields –  Text –  Text Area –  Text Area (Long) –  Email –  Phone –  URL –  Selected Standard Fields ▪  Enabled with flag
  • 16. Granular Control: Files ▪  Files enabled separately –  Attachments –  Chatter –  Files –  Libraries ▪  All or none
  • 17. Encryption Key ▪  Master Secret (Salesforce) –  Rotated each release –  Stored in the Key Derivation Servers ▪  Tenant Secret (Customer) –  Can be Rotated once per day in Prod –  Stored encrypted in DB ▪  Data Encryption Key –  Derived from Secrets –  Stored in cache, never persisted
  • 18. Features and Support ▪  Feature License Required ▪  Available to evaluate in Developer Edition orgs ▪  Support for –  Search –  Workflow Rules –  Validation Rules –  Apex and VF Pages –  And A LOT MORE...
  • 19. Architecture & Encryption Process Flow Customer driven key lifecycle management FIPS140-2 Hardware Security Module based key management infrastructure AES encryption using 256bit keys in CBC mode and random IV Uses PBDKF2 HMAC with SHA256 deriving secure 256-bit keys that are never persisted in Salesforce Data encryption and decryption actions are transparent
  • 20. Agenda ▪  Overview of Platform Encryption ▪  Features and Architecture ▪  Managing Platform Encryption ▪  Developing in a Platform Encryption Environment
  • 21. Demo ▪  Managing Encryption –  Select Fields/Files –  Audit Encrypted Fields –  Rotate Your Key –  The TenantSecret sObject
  • 22. The Tenant Secret sObject ​ String descText = UserInfo.getName() + ' new secret via Lightning'; ​ TenantSecret newSecret = new TenantSecret(Description=descText); ​ insert newSecret; ​ 1 ​ 2 ​ 3 ​ 4 ​ 5 ​ 6
  • 23. Agenda ▪  Overview of Platform Encryption ▪  Features and Architecture ▪  Managing Platform Encryption ▪  Developing in a Platform Encryption Environment
  • 24. Building Apps with Platform Encryption ​  SOQL Where Clauses/Filters ​  SOQL Order By/Sorting ​  Formula Fields ​  SOSL Search ​  Sort in Apex ​  Workflow/Apex Trigger ​  Instead of… ​  Use this feature…
  • 25. Demo ▪  Customizing with Encryption –  Searching with SOSL –  Sorting in Apex
  • 26. Searching with SOSL ​ 'FIND '' + searchStr1 + '' ​ IN ALL FIELDS ​ RETURNING ​  Account (Id, Name, type), ​  Contact (name,email, DLN__c, SSN__c)' ​ 1 ​ 2 ​ 3 ​ 4 ​ 5
  • 27. Sorting with Apex: Wrapper with Comparable Interface ​ public class AccountSortable implements Comparable { ​  public Account acct; ​  AccountSortable(Account acctParam){ ​  acct = acctParam; ​  } ​  public Integer compareTo(Object compareTo){ ​  AccountSortable compareToAcct = (AccountSortable) compareTo; ​  return acct.Name.compareTo(compareToAcct.acct.Name); ​  } ​ } ​ //invoked like: ​ List<AccountSortable> listWithCustomSort = new List<AccountSortable>(); ​ //...fill list with Accounts ​ listWithCustomSort.sort(); ​ 1 ​ 2 ​ 3 ​ 4 ​ 5 ​ 6 ​ 7 ​ 8 ​ 9 ​ 10 ​ 11 ​ 12 ​ 13 ​ 14 ​ 15
  • 28. Searching with SOSL: Handling Descending in Controller ​ //invoke your sort ​ listWithCustomSort.sort(); ​ // ​ List<AccountSortable> listToReturn = new List<AccountSortable>(); ​ if (order.toLowerCase() == 'desc’) { ​  for(integer i = resultList.size()-1; i >= 0; i--){ ​  items.add(resultList[i].obj); ​  } ​ } else { ​  listToReturn.addAll(listWithCustomSort); ​ } ​ return listToReturn; ​ 1 ​ 2 ​ 3 ​ 4 ​ 5 ​ 6 ​ 7 ​ 8 ​ 9 ​ 10 ​ 11 ​ 12 ​ 13 ​ 14 ​ 15 ​ 16 ​ 17 ​ 18
  • 29. Workflow Field Update Day__c Month__c Year__c Birthday__c
  • 30. Building Apps with Platform Encryption ​  SOSL Search ​  Sort in Apex ​  Workflow/Apex Trigger ​  SOSL is not SOQL ​  Search First ​  Text Data Type Field ​  Feature ​  Considerations
  • 32. Plan
  • 33. Back Up Your Secret
  • 34. Q & A Peter Chittum Developer Evangelist @pchittum github.com/pchittum Assaf Ben-Gur Senior Product Manager @assafbengur ​ A list of resources will be posted to the session Chatter feed.
  • 35. Share Your Feedback, and Win a GoPro! 3 Earn a GoPro prize entry for each completed survey Tap the bell to take a survey2Enroll in a session1