www.fromdev.com Open in urlscan Pro
2a02:4780:b:851:0:157f:2a72:1  Public Scan

Submitted URL: http://www.fromdev.com//category//sales
Effective URL: https://www.fromdev.com/2017/12/salesforce-cloud-security.html
Submission: On September 03 via api from US — Scanned from DE

Form analysis 5 forms found in the DOM

GET https://www.fromdev.com/

<form method="get" role="search" class="searchform" action="https://www.fromdev.com/">
  <input type="search" aria-label="Search" class="field" name="s" value="" placeholder="Type keyword(s) here…"><input type="submit" class="submit btn" value="Search">
</form>

POST https://www.fromdev.com/wp-comments-post.php

<form action="https://www.fromdev.com/wp-comments-post.php" method="post" id="commentform" class="comment-form">
  <p class="comment-notes"><span id="email-notes">Your email address will not be published.</span> <span class="required-field-message">Required fields are marked <span class="required">*</span></span></p>
  <p class="comment-form-comment"><textarea id="comment" name="comment" cols="45" rows="8" aria-required="true"></textarea></p>
  <p class="comment-form-author"><label for="author">Name<span class="required">*</span></label><input id="author" name="author" type="text" value="" size="30" aria-required="true"></p>
  <p class="comment-form-email"><label for="email">Email<span class="required">*</span></label><input id="email" name="email" type="text" value="" size="30" aria-required="true"></p>
  <p class="comment-form-url"><label for="url">Website</label><input id="url" name="url" type="text" value="" size="30"></p>
  <p class="comment-form-cookies-consent"><input id="wp-comment-cookies-consent" name="wp-comment-cookies-consent" type="checkbox" value="yes"> <label for="wp-comment-cookies-consent">Save my name, email, and website in this browser for the next time
      I comment.</label></p>
  <p class="form-submit"><input name="submit" type="submit" id="submit" class="submit" value="Post comment"> <input type="hidden" name="comment_post_ID" value="1111" id="comment_post_ID">
    <input type="hidden" name="comment_parent" id="comment_parent" value="0">
  </p>
</form>

GET https://www.fromdev.com/

<form method="get" role="search" class="searchform" action="https://www.fromdev.com/">
  <input type="search" aria-label="Search" class="field" name="s" value="" placeholder="Type keyword(s) here and hit Enter …"><input type="submit" class="submit btn" value="Search">
</form>

#0

<form class="lrm-form" action="#0" data-action="login">
  <div class="lrm-integrations lrm-integrations--login">
  </div>
  <p class="lrm-form-message lrm-form-message--init"></p>
  <div class="fieldset">
    <label class="image-replace lrm-email lrm-ficon-mail" title="Email or Username"></label>
    <input name="username" class="full-width has-padding has-border" type="text" aria-label="Email or Username" placeholder="Email or Username" required="" value="" autocomplete="username" data-autofocus="1">
    <span class="lrm-error-message"></span>
  </div>
  <div class="fieldset">
    <label class="image-replace lrm-password lrm-ficon-key" title="Password"></label>
    <input name="password" class="full-width has-padding has-border" type="password" aria-label="Password" placeholder="Password" required="" value="">
    <span class="lrm-error-message"></span>
    <span class="hide-password lrm-ficon-eye" data-show="Show" data-hide="Hide" aria-label="Show"></span>
  </div>
  <div class="fieldset">
    <label class="lrm-nice-checkbox__label lrm-remember-me-checkbox">Remember me <input type="checkbox" class="lrm-nice-checkbox lrm-remember-me" name="remember-me" checked="">
      <div class="lrm-nice-checkbox__indicator"></div>
    </label>
  </div>
  <div class="lrm-integrations lrm-integrations--login lrm-integrations-before-btn">
  </div>
  <div class="lrm-integrations-otp"></div>
  <div class="fieldset fieldset--submit">
    <button class="full-width has-padding" type="submit"> Log in </button>
  </div>
  <div class="lrm-integrations lrm-integrations--login">
  </div>
  <input type="hidden" name="redirect_to" value="">
  <input type="hidden" name="lrm_action" value="login">
  <input type="hidden" name="wp-submit" value="1">
  <!-- Fix for Eduma WP theme-->
  <input type="hidden" name="lp-ajax" value="login">
  <input type="hidden" id="security-login" name="security-login" value="fb8c61288a"><input type="hidden" name="_wp_http_referer" value="/2017/12/salesforce-cloud-security.html">
  <!-- For Invisible Recaptcha plugin -->
  <span class="wpcf7-submit" style="display: none;"></span>
</form>

#0

<form class="lrm-form" action="#0" data-action="lost-password">
  <p class="lrm-form-message">Lost your password? Please enter your email address. You will receive mail with link to set new password.</p>
  <div class="fieldset">
    <label class="image-replace lrm-email lrm-ficon-mail" title="Email or Username"></label>
    <input class="full-width has-padding has-border" name="user_login" type="text" required="" placeholder="Email or Username" data-autofocus="1" aria-label="Email or Username">
    <span class="lrm-error-message"></span>
  </div>
  <div class="lrm-integrations lrm-integrations--reset-pass">
  </div>
  <input type="hidden" name="lrm_action" value="lostpassword">
  <input type="hidden" name="wp-submit" value="1">
  <input type="hidden" id="security-lostpassword" name="security-lostpassword" value="f5cc3b0249"><input type="hidden" name="_wp_http_referer" value="/2017/12/salesforce-cloud-security.html">
  <div class="fieldset fieldset--submit">
    <button class="full-width has-padding" type="submit"> Reset password </button>
  </div>
  <!-- For Invisible Recaptcha plugin -->
  <span class="wpcf7-submit" style="display: none;"></span>
</form>

Text Content

 * Home
 * Guest Post
 * Advertise
 * Contact
 * Subscribe



FROMDEV
Programming Books, Tutorials, Gaming, Hacking & Security

Menu
 * Surprise Me
 * Hacking
   * How To Be A Hacker
   * Hacking Books
   * FREE eBooks
   * Hacking Tutorials
   * Hacking Tools
   * More…
 * Books
   * Best Programming Books
   * Influential Books
   * Java Books
   * Android Books
   * Python Books
   * PHP Books
   * Scala Books
   * More…
 * Web Design
   * Developer Tools
   * Web Developer Apps – Mac
   * Best Form Builders
   * Inspiring Web Designs
 * Mobile
   * How-To Build Mobile App
   * Mobile Frameworks
   * Mobile App Testing
 * Big Data
   * Hadoop FAQs
   * Hadoop Best Books
   * When To Use Hadoop
   * Hadoop Alternatives
 * eCommerce
   * Best ECommerce Books
   * PayPal Alternatives
   * Open Source ECommerce Software
   * Magento Themes
   * Magento Tutorials
   * Drupal Templates
   * Joomla Templates
   * Joomla or Drupal
 * Take a Quiz
   * JavaScript Quiz
   * Java Quiz
   * Node.js Quiz
   * Python Quiz
   * SWIFT Quiz

CloudDataSalesforceSecurity


REASONS FOR TRUSTING THE SUPERIOR DATA SECURITY OF CLOUD SALESFORCE

By sarikazdubey

December 22, 2017

4 Mins read
391
0
Share



Trust is fundamental in choosing any cloud computing service, and it develops
from the amount of data security that you avail. When you are sure of complete
data protection, there is every reason to trust the service. 


The other factor that plays a significant role in choosing the cloud service
provider is reliability that is closely associated with trust. Salesforce DX,
the latest version of the platform bears the hallmarks of superior data security
that does not leave anything to doubt. 

Thus, when using the Salesforce cloud platform, you stay assured that your data
is more secure than ever before because of the continuous process of improvement
that addresses all ongoing concerns of users. 

Despite the robust security measures, users remain skeptical due to lack of
proper understanding of security systems.





IGNORANCE LEADS TO APPREHENSION

Users are very sensitive about the security of cloud computing because of their
concern about the precious data they store in the cloud that is worth more than
the most valuable possessions. Perhaps the invisible existence of the cloud has
something to do with the apprehension about its vulnerability. Users might feel
that data would remain more secure when stored in front of the eyes, on site,
although this is not at all correct. 


While the debate continues, there should not be any concern about cloud security
because 64% of enterprise companies use the cloud because they consider it safer
and secure than legacy systems. The trust on cloud security reflects the
attitude of the majority of cloud users (87%), who do not consider security as a
factor among the top five concerns in cloud computing.



Salesforce intends to take cloud security to the next level so that the cloud
becomes an impregnable fortress for data. Read on to know how they achieve it.


BUILDING TRUST BY STAYING TRANSPARENT



Gaining the trust of users is essential to building their confidence about the
reliability of cloud computing services. It is also necessary for implementing
superior security systems that ensure safe cloud computing. By maintaining
transparency about the security measures, Salesforce has been able to generate
trust among users. 


With the goal of keeping users informed and updated about the status of user
data, they continuously provide live data about any attempted intrusion,
malware, phishing and data related to updates and system performance. The
information helps users to know the state of their data at any point in time and
gives the satisfaction of knowing that it is safe.




MONITORING EVENTS



The better you can keep a tab on events as and when it occurs, better you would
be able to maintain the security of the system. In simple words, you must stay
proactive and know about what is happening on the system to ensure better
security. 


Salesforce implements event monitoring for providing users with the details of
actions that take place and even actions that the service provider takes on the
system. This helps in early detection of issues, and it is possible to resolve
the issues quickly before it can harm the system.




AUTHORIZATION FOR ACCESSING DATA



The aspect of authorization is an important security feature for any software
application to ensure that only authorized persons can access the data. However,
for Salesforce, the authorization aspect acquires special importance due to the
multi-tenant nature of the platform where a wide range of clients works on the
same platform for different services. 


The authorization ensures that every client can access only the data of their
organization so that the information and data of other clients remain protected.
By using unique organization identifiers that initiates the process of logging
into every session, it is possible to ensure that only persons authorized to
access the data can use it.




DATA ISOLATION



The virtual openness of the cloud might make it appear as if anyone can access
the data stored in it, but this is far from the truth. By keeping the data
isolated it is possible to keep it most secured, and Salesforce uses this
technique to assure users that their data remains well protected. 


The server environment remains wholly secured so that the data inside remains
out of reach of trespassers. To prevent unauthorized access, it uses advanced
technology that not only keeps the data protected but also ensures that no
matter how many users access the system, the response time remains the same.




AUTHENTICATION AND ENCRYPTION

The technology used by Salesforce for authorization and authentication keeps it
much ahead in ensuring the best security of data. For the purpose, they use
Transport Layer Security (TLS), which is the most advanced version of data
security management. By using the latest technology, it is possible to ward off
threats to security that also keeps increasing. Thus, data remains safe and
secure in the cloud.


SECURITY HEALTH CHECK

Although it is the primary responsibility of the cloud service provider to
ensure complete security of data, users too must share the responsibility for
proper data protection. 


Users must ensure that password policy, network configuration, and session
settings are free from security weaknesses by eradicating any identifiable
weakness. To help users, the Security Health Check feature of Salesforce is
useful to identify security weaknesses in their areas and rectify it.




SHARING BEST SECURITY PRACTICES



For maintaining real security, the service providers and users must work
together as partners. It will never be possible to ensure complete security by
relying on the strength of service providers alone as explained above. 


Even the best security system of service providers can become ineffective if
users do not play their part well. Users must gather knowledge about the best
security practices and implement it correctly so that they can plug all gaps at
their end. For keeping users well informed about the best security practices,
Salesforce shares tailor-made and organization-specific updates with users.



Only when users and service providers work in perfect harmony, can you achieve
the highest standard of security that keeps data free from all threats? This is
when users become empowered to do their jobs efficiently and safely.

> Lucy Jones has worked on the Salesforce platform for more than a decade.
> Briefly, she was associated with Flosum.com, as a CRM Specialist. Having a
> penchant for writing, she is planning to launch a blog site soon.

Share



391
0
Share


Previous
How Can a Web Hosting Datacenter Location Affect Your Website’s Performance
Next
10 Best Adsense Alternatives You Need To Check Now!




LEAVE A REPLY CANCEL REPLY

Your email address will not be published. Required fields are marked *



Name*

Email*

Website

Save my name, email, and website in this browser for the next time I comment.




 * ABOUT
   
   FromDev is a technology blog about Programming, Web Development, Tips &
   Tutorials.
   
   publisher@fromdev.com


 * NAVIGATION
   
    * Programming
      * Interactive Coding Websites
      * Coding Competition Sites
      * Web Programming Languages
      * Free Programming eBooks
      * Learn Java
    * Gaming
      * How To Be A Game Developer
      * Game Programming Books
      * 3D Game Programming Books
      * Game Hacking
      * Game Development Software
    * Career
      * Java Interview App
      * Work Perfumes
      * Programming Interview Books
      * Interview Preparation Guide
      * LinkedIn Profile Tips
      * Software Architect Questions
    * Tutorials


 * FRIENDS & LINKS
   
    * Developer Tools
    * Java Tutorial
    * BeginnersBook.com
    * Java by Nataraj
    * PC & Network Downloads


 * CATEGORIES
   
   Android
   87 Posts
   Angular
   14 Posts
   Animation
   1 Posts
   Antivirus
   12 Posts
   Apple
   67 Posts
   Apps
   193 Posts
   Architecture
   22 Posts
   Artificial Intelligence
   37 Posts
   Audio
   6 Posts
   Backbone
   2 Posts
   Backup
   5 Posts
   Beginner
   8 Posts
   BigData
   34 Posts
   Bitcoin
   35 Posts
   Blockchain
   18 Posts
   Blogs
   10 Posts
   Books
   96 Posts
   Business
   202 Posts
   Caching
   3 Posts
   Camera
   2 Posts
   Career
   65 Posts
   Cheatsheet
   5 Posts
   Chrome
   9 Posts
   Cloud
   44 Posts
   Covid-19
   4 Posts
   Cryptocurrency
   65 Posts
   CSS
   7 Posts
   Customer
   13 Posts
   Cyber
   23 Posts
   Data
   47 Posts
   Data Recovery
   12 Posts
   Database
   18 Posts
   Design
   23 Posts
   Development
   52 Posts
   DevOps
   17 Posts
   Digital
   1 Posts
   Drupal
   9 Posts
   eBooks
   16 Posts
   eCommerce
   154 Posts
   Education
   49 Posts
   Electronics
   19 Posts
   Email
   22 Posts
   Employee
   5 Posts
   Ethereum
   7 Posts
   Example Code
   24 Posts
   Exception Handling
   5 Posts
   FAANG
   4 Posts
   Featured
   236 Posts
   Finance
   37 Posts
   Frameworks
   25 Posts
   Freebies
   36 Posts
   Freelancing
   7 Posts
   Gadgets
   45 Posts
   Gaming
   68 Posts
   Git
   5 Posts
   Giveaway
   18 Posts
   Google
   38 Posts
   GPS
   1 Posts
   Graph
   9 Posts
   Graphic
   10 Posts
   Hacking
   93 Posts
   Hadoop
   15 Posts
   Headphones
   3 Posts
   HealthCare
   4 Posts
   Hosting
   24 Posts
   How-To
   56 Posts
   HTML5
   24 Posts
   Icons
   16 Posts
   Image
   14 Posts
   Inforgraphics
   10 Posts
   Internet
   10 Posts
   Interview
   39 Posts
   Investment
   6 Posts
   iOS
   37 Posts
   IOT
   6 Posts
   iPhone
   38 Posts
   IT
   15 Posts
   Java
   58 Posts
   JavaScript
   56 Posts
   JDBC
   3 Posts
   Joomla
   14 Posts
   jQuery
   9 Posts
   Kotlin
   1 Posts
   Kubernetes
   8 Posts
   Laptop
   13 Posts
   Learning
   11 Posts
   Library
   3 Posts
   Liferay
   3 Posts
   LinkedIn
   3 Posts
   Linux
   11 Posts
   Logo
   4 Posts
   Mac
   30 Posts
   Machine Learning
   18 Posts
   Magento
   19 Posts
   Management
   17 Posts
   Marketing
   55 Posts
   Maven
   3 Posts
   Media
   12 Posts
   Memcached
   6 Posts
   Microservice
   3 Posts
   Microsoft
   9 Posts
   Mobile
   79 Posts
   Money
   7 Posts
   MongoDB
   8 Posts
   Music
   17 Posts
   MySQL
   7 Posts
   Native App
   2 Posts
   Neo4j
   3 Posts
   News
   2 Posts
   Nodejs
   15 Posts
   NoSQL
   10 Posts
   Obfuscation
   2 Posts
   online
   13 Posts
   Online Collaboration
   9 Posts
   OpenSource
   53 Posts
   OTT
   1 Posts
   Outsourcing
   7 Posts
   Password
   4 Posts
   Payment
   7 Posts
   PDF
   13 Posts
   Performance
   18 Posts
   Photo
   3 Posts
   Photoshop
   10 Posts
   PHP
   19 Posts
   Plugins
   4 Posts
   PrestaShop
   2 Posts
   Printing
   4 Posts
   Privacy
   18 Posts
   Productivity
   52 Posts
   Programming
   149 Posts
   Project Management
   2 Posts
   Python
   29 Posts
   Responsive
   9 Posts
   Review
   73 Posts
   Robotics
   8 Posts
   Ruby
   8 Posts
   Sales
   7 Posts
   Salesforce
   6 Posts
   SAP
   5 Posts
   Scala
   4 Posts
   Security
   166 Posts
   SEO
   55 Posts
   Shopify
   3 Posts
   Social
   20 Posts
   Software
   187 Posts
   Splunk
   3 Posts
   Spring
   3 Posts
   Spy
   9 Posts
   SQL
   9 Posts
   Startup
   20 Posts
   Stock Exchange
   3 Posts
   Storage
   25 Posts
   Strategy
   3 Posts
   Student
   28 Posts
   Supply chain
   1 Posts
   Technology
   70 Posts
   Templates
   5 Posts
   Testing
   36 Posts
   Themes
   33 Posts
   Tips
   289 Posts
   Tomcat
   4 Posts
   Tools
   146 Posts
   Trading
   3 Posts
   Trending
   5 Posts
   Trends
   52 Posts
   Tutorials
   62 Posts
   Twitter
   4 Posts
   Ubuntu
   3 Posts
   Uncategorized
   11 Posts
   Usability
   13 Posts
   Video
   37 Posts
   Video Games
   27 Posts
   Virtual Reality
   3 Posts
   Virtualization
   3 Posts
   VOIP
   2 Posts
   VPN
   37 Posts
   Watch
   4 Posts
   Web
   236 Posts
   Web App
   7 Posts
   Web Design
   146 Posts
   Webmaster
   55 Posts
   Wifi
   7 Posts
   Windows
   19 Posts
   Wordpress
   56 Posts
   Work
   14 Posts
   Writing
   23 Posts
   Youtube
   20 Posts

Powered by FROMDEV


 * Sign in

Remember me



Log in


Forgot your password?

Lost your password? Please enter your email address. You will receive mail with
link to set new password.



Reset password

Back to login

close
Go to mobile version