Did you know you can control access to your Salesforce organization based on user IP addresses? You can! If you’re an administrator who wants to understand login IPs and trusted IPs, this post is for you.
Tag Archives: Security
In Wave, row-level security is enforced using predicates, and it works a bit like this: <dataset column> <operation> <value> You can go for simple comparisons or get sophisticated and apply security at a record owner, role-based or even team-based level. For the skinny on that, see this post: http://explore.wave6.com/blog/how-security-is-applied-to-dashboards-of-salesforce-analytics-cloud But... once you go down that road, it […]
Join the best security technologists at the most innovative company in the world, salesforce.com, for a fantastic part-time security internship.
Remember your old campus job working in the school library or computer lab? The pay was OK and you got a bit of real world experience, but it didn’t necessarily prepare you for life after school. You may have had a summer internship and it was fantastic, but it only lasted three months. Why not take the great experience you’d get from a summer internship, skip that campus job and come work (remote is fine!) for the most innovative company in the world filled with some of the best security technologists you’ll ever find.
As we put another DevOps conference in the books, we reflect back on an amazing Day 2. We kicked off the conference with a panel of DevOps practitioners: Bruno Connelly, VP Engineering, Site Reliability at LinkedIn; Jeremy Carroll, Operations Engineer, Pinterest; Pedro Canahuati, Director, Production Engineering & Site Reliability at Facebook; and, Jason Wong, Director of Engineering, Infrastructure, Etsy.
Security is perhaps the No.1 feature of Salesforce. Salesforce provides multiple layers of security at every level starting from servers to mobile SDKs. One such security feature is "PIN Security" feature. Enable it and it will force mobile (i.e. both Native or Hybrid SDK) users to set 4 to 8 digit passcode for their app. Once enabled, if the user switches to a different app and comes back after some specified time, the app will ask for the passcode! Sweet, isn't it? Even cooler part is that it's built-in and with few simple configurations, your users are ready to use it. Let's see how it works.
Vancouver presented a solid week of world-class information security conferences and courses geared at developers and hackers between CanSacWest and BSides. Salesforce.com and Unbounce collaborated to present an accessible security discussion, our Tech Security Talks (#techsec) event. We decided on an evening fireside chat with industry experts followed by a Q&A session that would be geared towards covering the implications of security issues ranging from bugs to privacy laws.
With the powerful Salesforce sharing features, you can support collaboration within your organization while keeping sensitive information secure. And while you must always balance collaboration with security, there are situations in which you might need to make absolutely sure that record access is limited to a very small number of people, regardless of their position within the corporate hierarchy. In this post, you'll learn about the sharing features and strategies you can use to do just that.
Learn how Salesforce Identity features fit together to provide coordinated user authorization management and access to third party apps. Start using My Domain, connected apps, and the App Launcher together for a streamlined user experience. And, find out more about other features like Identity Connect for Active Directory user synchronization, custom login pages, two-factor authentication, mobile apps, and reporting.
Record ownership is at the core of Salesforce’s record access capabilities, which allow you to specify which users or types of users should be able to access specific records or types of records. Salesforce.com’s architects and developers have spent years creating a highly functional and massively scalable record access infrastructure around record ownership, saving you the monumental effort of building that infrastructure yourself. In this post, you'll learn how those years of heavy lifting have actually simplified record access for the most common enterprise security models, allowing you to configure record access declaratively instead of with painstakingly developed code. You'll also get an “under the hood” view of record access, and learn how to implement your record access model and avoid potential pitfalls along the way.