Overview of Salesforce Platform Encryption solution with specific discussion of developer use of the feature. Overview of the Salesforce Shield compliance toolset features with special focus on encrypting data at rest, natively on Salesforce App Cloud, and strategies developers can use to make the most of this feature.
Salesforce is the worlds best Customer Relationship Management (CRM) platform which is flexible and powerful database supplier in the market.This blog is introducing about Salesforce and it’s CRM, Multitenant Architecture etc.
The document provides information about Configure, Price, Quote (CPQ) software and how it can be used to generate quotes. It discusses how CPQ allows sales teams to standardize processes and focus on selling rather than administrative tasks. The document then outlines several topics that will be covered in a Salesforce CPQ lecture, including products and bundles, configuration, pricing rules, quote templates, and the quote creation process.
Flow is a powerful business automation tool that can manipulate data in Salesforce in a variety of ways. Such application can be created right from the org’s setup with just drag-drop/point-click. The ease of creating flows makes it the number one go-to tool when it comes to complex business requirements.
This document provides best practices for using Apex in 2022. It discusses security practices like enforcing CRUD/FLS permissions and encrypting data. It also covers performance techniques like using Platform Cache to store reusable data. Designing for scale is addressed, including bulkifying code and using Queueables for large data volumes. The document also discusses making code reusable with trigger frameworks, and maintainable through coding standards, error logging, and writing tests.
This document discusses techniques for hardening a Salesforce org against cybersecurity threats. It covers Salesforce security at the infrastructure and application levels. It also recommends best practices like using two-factor authentication, auditing permissions, and providing security training for users. The document promotes the Salesforce Toolkit and a free online cybersecurity course for further resources.
Salesforce is a cloud-based customer relationship management (CRM) platform that offers various products including the Sales Cloud, Service Cloud, and Marketing Cloud. It was founded in 1999 by Marc Benioff and has grown to serve over 150,000 companies. Salesforce provides an all-in-one platform for managing contacts, leads, accounts, and opportunities across multiple departments.
This document discusses sharing and security controls in Salesforce, including profiles, permission sets, and record-level security. Profiles control object, field, and user permissions, while permission sets can grant additional access. Record-level security can be set at the organization, manual sharing, role hierarchy, and sharing rule levels to determine which users can access individual records.
Salesforce MVPs Alex Sutherland and Maria Belli give Salesforce Admins an overview of security in Salesforce. From Org wide defaults, to object, field, and record access this presentation will help you understand how to secure your data and understand sharing rules.
Since Salesforce CPQ (Part of Revenue Cloud) entered the market, it has been a real game-changer for businesses. However, it comes with some challenges, especially if you assume that maintaining Salesforce CPQ is like core Salesforce products. Failing to recognize the level of expertise needed to manage Salesforce CPQ can lead to a landslide of bugs and errors and costly consequences to the business. But no need to worry. We have the right technology to help you get it right! Join our upcoming webinar with Salesforce MVP Ben McCarthy, Salesforce CPQ master, Alyssa Lefebvre and Oz Lavee, Panaya ForeSight CTO: During the webinar, you will learn how to Simplify the Complexity of Salesforce CPQ by: · Successfully managing CPQ deployments · Dealing with ongoing CPQ implementations, Org dependencies review, and updates · Easily finding the root cause of a bug or a failure · Managing CPQ tests the smart way
This Salesforce Training tutorial is all you need to learn about Salesforce. It is ideal for both beginners and professionals who want to understand the various Salesforce cloud services. Below are topics covered in this tutorial: 1. Why is Salesforce popular & in-demand? 2. Advantages: On-premise vs. Cloud 3. Where does Salesforce fit in the cloud model? 4. Various Salesforce Cloud Services 5. Salesforce architecture 6. Demo: Sales Cloud & Service Cloud
Salesforce Sales Cloud includes a variety of services and products that help salespeople close more deals and develop stronger customer connections. Check out this presentation for more details on Sales Cloud.
Presented at Israel User Group December 2019: Mixed DMLS Operations, Too Many SOQL Queries, Too Many DML Statements, CPU Timeout: Salesforce's Governor limits are there for a reason but even when you employ best practices you may still exceed them. A good developer will look at all tools available on the platform and find the best approach to solving the problem they are facing. Join us to add the newest tool to your developer toolbelt. Use Platform Events to change the rules of the game, process more, and faster within governor limits. Link to GitHub repository: https://github.com/RoyGilad/Dreamforce-2019-Do-more-within-Salesforce-Governor-Limits-using-Platform-Events
This document provides an introduction to Salesforce for students. It outlines the course roadmap, which covers what Salesforce is, why learning Salesforce skills is important, how to learn Salesforce through Trailhead, what the Trailblazer Community is, and includes a hands-on activity. The document encourages students to create a free Trailhead account to begin exploring trails and building skills, and to engage with the Trailblazer Community to learn and connect with others.
Learn how to take control of your profile and permission sets, as well as best practices of permission management.
An introduction to Salesforce Commerce Cloud Development, this talk has been presented at Dreamforce, Melbourne Developer Group & Hyderabad Developer Groups in year 2018
Salesforce Identity Management. Basics of authentication and authorization. SAML, OAuth 2.0, DIfferent flows in Oauth 2.o, Demo in Saklesforce for Identity and Service Provider. Fremont Trailblazer Group March 2020 Presentation.
This document provides an overview and introduction to Apex for developers. It begins with an introduction to Apex and the Salesforce platform. It then outlines the agenda which includes an overview of the platform, writing Apex classes, accessing data using SOQL and DML, writing triggers, and additional topics like Visualforce, REST APIs, and unit testing. It encourages participants to use their developer environment and provides a link to sign up. It describes what will be built in the session which is an app to manage sessions and speakers at a conference. It includes two forward-looking statements disclaimers.
Visualforce is a framework for building custom user interfaces for Salesforce data using a component-based tag syntax. It follows the model-view-controller pattern with standard and custom objects as the model, Apex code as the controller, and Visualforce pages as the view. Visualforce components have a prefix identifying their library and a name indicating their type, and attributes are used to pass values to the components. Over 140 standard Visualforce tags are available to create fields, actions, charts, and more, or custom components can be built by integrating Visualforce with HTML, JavaScript, and CSS. The presentation demonstrated building Visualforce pages.
Salesforce Performance hacks - Client Side meetup slides http://www.meetup.com/Paris-Salesforce-Developer-User-Group/events/228006735/
As your team creates more apps in your Salesforce Org, you're faced with a new set of challenges: managing a well-designed org. Join us to learn about using the practices defined in the Salesforce Governance framework, and the set of tools available for managing issues such as security, coding standards, decisions over declarative verses Apex apps, design standards, overall Org strategy, and change control. By applying these best practices, your team can continue to grow your apps to meet the continuing challenges of your company.
This document discusses how to scale and deploy NodeJS applications. It begins with an introduction of the author, Yacobus Reinhart, and then asks what the discussion will be about. It indicates that the talk will cover improving concurrency and deploying with JavaScript. It then asks how NodeJS works and provides a warning about blocking callbacks. It discusses the dangers of long-running callbacks and how NodeJS is single-threaded. It provides four solutions to these issues: making tasks asynchronous, using worker pools, using clusters, and taking a hybrid approach. It asks if there are any questions and shifts to discussing the deployment process, listing deployment alternatives like Capistrano, Mina, Minco, and Mina JS.
Platform Encryption allows customers to encrypt data at rest in Salesforce while preserving functionality. ISVs need to test if their apps work with encrypted fields, as certain functions like SOQL WHERE clauses will fail. The roadmap includes allowing encryption on managed custom fields in Summer 2016. ISVs should update apps to use alternatives like SOSL where SOQL fails to ensure apps continue working with encryption.
Do you want to spend more time developing new and exciting features, and less time maintaining existing code when a field is added or an error message needs to change? Then keep yourself and your Administrator happy by coding to anticipate these changes using Custom Settings, Field Sets, and Labels. Source code is available at: https://gist.github.com/RoyGilad This presentation was presented by Roy Gilad at Dreamforce 2013
The document provides an overview of Salesforce's Jump-Start program for consulting partners. It includes the following key points: 1. It discusses the four phases of the consulting partner enablement lifecycle: plan, build, sell & market, and manage your business. 2. It highlights important resources like the partner community, certification process, marketing and sales tools to help partners get started and grow their Salesforce practice. 3. It emphasizes the importance of developing a certification plan and training practice team members to obtain different Salesforce certifications.
The document discusses Salesforce's partner program which includes consulting partners, independent software vendors, resellers, a partner community, and support for partner operations, marketing, and development. The program aims to build the world's largest cloud ecosystem by enabling partners to deliver Salesforce solutions and services to customers.
The document discusses Test-Driven Development (TDD) and Acceptance Test-Driven Development (ATDD). It defines TDD and ATDD, provides demos of applying each approach to building a calculator and pet shop application, and discusses how they help keep design simple. Tools for TDD/ATDD and who writes unit/acceptance tests are also covered, along with why the approaches are used.
If you are using Salesforce, you would be having a lot of data stored in Salesforce objects. Some of it would be sensitive data, and some of it would even be sensitive enough that you don’t want anyone to look at it, like revenue related data. So the question is, is the data on your Salesforce implementation secure enough? How fastidious are you about your customer’s or company’s sensitive data and how to make sure that the data remains secure and be accessible to particular eyes necessarily? Encrypting Data in Salesforce Salesforce in general has very strict security protocols and standards so usually there is no need to additionally secure any data. But for some data there is nothing paranoid about taking extra precaution. More and more companies nowadays are taking the security of their user and financial data very seriously and to satisfy them Salesforce and third party Salesforce developers have provided users a number of ways to encrypt their data. Salesforce Custom Field Encryption (Both Classic and Platform) For those using Salesforce Developer, Enterprise, Performance, Unlimited, and Database.com editions, there is a way that they can encrypt data values. This is applicable to custom fields only. Using Apex Crypto Class Now if you are slightly more paranoid and you think that custom field encryption is not enough, you can leverage the APEX class’s properties for encrypting data at rest and in-transit. Apex classes are more granular level of encryption and requires significant know-how about Salesforce, Apex programming, and Salesforce customization. Therefore we recommend you to consult a Salesforce expert before using this method. Third Party Encryption Services The third method to encrypt your data is using third party encryption services. Google ‘Salesforce Encryption Services’ and you will find hundred such third party solutions. These services are, in almost every case, paid and requires a subscription licensed based fees. These services are mainly deployed as an added layer between data entry points and Salesforce, and can be used to both encrypt and authenticate data. Theoretically they should create some latency in data addition and retrieval, but in most practical cases the latency is negligible, provided the service is flawless of course.