www.fromdev.com
Open in
urlscan Pro
2a02:4780:b:851:0:157f:2a72:1
Public Scan
Submitted URL: http://www.fromdev.com//category//sales
Effective URL: https://www.fromdev.com/2017/12/salesforce-cloud-security.html
Submission: On September 03 via api from US — Scanned from DE
Effective URL: https://www.fromdev.com/2017/12/salesforce-cloud-security.html
Submission: On September 03 via api from US — Scanned from DE
Form analysis
5 forms found in the DOMGET https://www.fromdev.com/
<form method="get" role="search" class="searchform" action="https://www.fromdev.com/">
<input type="search" aria-label="Search" class="field" name="s" value="" placeholder="Type keyword(s) here…"><input type="submit" class="submit btn" value="Search">
</form>
POST https://www.fromdev.com/wp-comments-post.php
<form action="https://www.fromdev.com/wp-comments-post.php" method="post" id="commentform" class="comment-form">
<p class="comment-notes"><span id="email-notes">Your email address will not be published.</span> <span class="required-field-message">Required fields are marked <span class="required">*</span></span></p>
<p class="comment-form-comment"><textarea id="comment" name="comment" cols="45" rows="8" aria-required="true"></textarea></p>
<p class="comment-form-author"><label for="author">Name<span class="required">*</span></label><input id="author" name="author" type="text" value="" size="30" aria-required="true"></p>
<p class="comment-form-email"><label for="email">Email<span class="required">*</span></label><input id="email" name="email" type="text" value="" size="30" aria-required="true"></p>
<p class="comment-form-url"><label for="url">Website</label><input id="url" name="url" type="text" value="" size="30"></p>
<p class="comment-form-cookies-consent"><input id="wp-comment-cookies-consent" name="wp-comment-cookies-consent" type="checkbox" value="yes"> <label for="wp-comment-cookies-consent">Save my name, email, and website in this browser for the next time
I comment.</label></p>
<p class="form-submit"><input name="submit" type="submit" id="submit" class="submit" value="Post comment"> <input type="hidden" name="comment_post_ID" value="1111" id="comment_post_ID">
<input type="hidden" name="comment_parent" id="comment_parent" value="0">
</p>
</form>
GET https://www.fromdev.com/
<form method="get" role="search" class="searchform" action="https://www.fromdev.com/">
<input type="search" aria-label="Search" class="field" name="s" value="" placeholder="Type keyword(s) here and hit Enter …"><input type="submit" class="submit btn" value="Search">
</form>
#0
<form class="lrm-form" action="#0" data-action="login">
<div class="lrm-integrations lrm-integrations--login">
</div>
<p class="lrm-form-message lrm-form-message--init"></p>
<div class="fieldset">
<label class="image-replace lrm-email lrm-ficon-mail" title="Email or Username"></label>
<input name="username" class="full-width has-padding has-border" type="text" aria-label="Email or Username" placeholder="Email or Username" required="" value="" autocomplete="username" data-autofocus="1">
<span class="lrm-error-message"></span>
</div>
<div class="fieldset">
<label class="image-replace lrm-password lrm-ficon-key" title="Password"></label>
<input name="password" class="full-width has-padding has-border" type="password" aria-label="Password" placeholder="Password" required="" value="">
<span class="lrm-error-message"></span>
<span class="hide-password lrm-ficon-eye" data-show="Show" data-hide="Hide" aria-label="Show"></span>
</div>
<div class="fieldset">
<label class="lrm-nice-checkbox__label lrm-remember-me-checkbox">Remember me <input type="checkbox" class="lrm-nice-checkbox lrm-remember-me" name="remember-me" checked="">
<div class="lrm-nice-checkbox__indicator"></div>
</label>
</div>
<div class="lrm-integrations lrm-integrations--login lrm-integrations-before-btn">
</div>
<div class="lrm-integrations-otp"></div>
<div class="fieldset fieldset--submit">
<button class="full-width has-padding" type="submit"> Log in </button>
</div>
<div class="lrm-integrations lrm-integrations--login">
</div>
<input type="hidden" name="redirect_to" value="">
<input type="hidden" name="lrm_action" value="login">
<input type="hidden" name="wp-submit" value="1">
<!-- Fix for Eduma WP theme-->
<input type="hidden" name="lp-ajax" value="login">
<input type="hidden" id="security-login" name="security-login" value="fb8c61288a"><input type="hidden" name="_wp_http_referer" value="/2017/12/salesforce-cloud-security.html">
<!-- For Invisible Recaptcha plugin -->
<span class="wpcf7-submit" style="display: none;"></span>
</form>
#0
<form class="lrm-form" action="#0" data-action="lost-password">
<p class="lrm-form-message">Lost your password? Please enter your email address. You will receive mail with link to set new password.</p>
<div class="fieldset">
<label class="image-replace lrm-email lrm-ficon-mail" title="Email or Username"></label>
<input class="full-width has-padding has-border" name="user_login" type="text" required="" placeholder="Email or Username" data-autofocus="1" aria-label="Email or Username">
<span class="lrm-error-message"></span>
</div>
<div class="lrm-integrations lrm-integrations--reset-pass">
</div>
<input type="hidden" name="lrm_action" value="lostpassword">
<input type="hidden" name="wp-submit" value="1">
<input type="hidden" id="security-lostpassword" name="security-lostpassword" value="f5cc3b0249"><input type="hidden" name="_wp_http_referer" value="/2017/12/salesforce-cloud-security.html">
<div class="fieldset fieldset--submit">
<button class="full-width has-padding" type="submit"> Reset password </button>
</div>
<!-- For Invisible Recaptcha plugin -->
<span class="wpcf7-submit" style="display: none;"></span>
</form>
Text Content
* Home * Guest Post * Advertise * Contact * Subscribe FROMDEV Programming Books, Tutorials, Gaming, Hacking & Security Menu * Surprise Me * Hacking * How To Be A Hacker * Hacking Books * FREE eBooks * Hacking Tutorials * Hacking Tools * More… * Books * Best Programming Books * Influential Books * Java Books * Android Books * Python Books * PHP Books * Scala Books * More… * Web Design * Developer Tools * Web Developer Apps – Mac * Best Form Builders * Inspiring Web Designs * Mobile * How-To Build Mobile App * Mobile Frameworks * Mobile App Testing * Big Data * Hadoop FAQs * Hadoop Best Books * When To Use Hadoop * Hadoop Alternatives * eCommerce * Best ECommerce Books * PayPal Alternatives * Open Source ECommerce Software * Magento Themes * Magento Tutorials * Drupal Templates * Joomla Templates * Joomla or Drupal * Take a Quiz * JavaScript Quiz * Java Quiz * Node.js Quiz * Python Quiz * SWIFT Quiz CloudDataSalesforceSecurity REASONS FOR TRUSTING THE SUPERIOR DATA SECURITY OF CLOUD SALESFORCE By sarikazdubey December 22, 2017 4 Mins read 391 0 Share Trust is fundamental in choosing any cloud computing service, and it develops from the amount of data security that you avail. When you are sure of complete data protection, there is every reason to trust the service. The other factor that plays a significant role in choosing the cloud service provider is reliability that is closely associated with trust. Salesforce DX, the latest version of the platform bears the hallmarks of superior data security that does not leave anything to doubt. Thus, when using the Salesforce cloud platform, you stay assured that your data is more secure than ever before because of the continuous process of improvement that addresses all ongoing concerns of users. Despite the robust security measures, users remain skeptical due to lack of proper understanding of security systems. IGNORANCE LEADS TO APPREHENSION Users are very sensitive about the security of cloud computing because of their concern about the precious data they store in the cloud that is worth more than the most valuable possessions. Perhaps the invisible existence of the cloud has something to do with the apprehension about its vulnerability. Users might feel that data would remain more secure when stored in front of the eyes, on site, although this is not at all correct. While the debate continues, there should not be any concern about cloud security because 64% of enterprise companies use the cloud because they consider it safer and secure than legacy systems. The trust on cloud security reflects the attitude of the majority of cloud users (87%), who do not consider security as a factor among the top five concerns in cloud computing. Salesforce intends to take cloud security to the next level so that the cloud becomes an impregnable fortress for data. Read on to know how they achieve it. BUILDING TRUST BY STAYING TRANSPARENT Gaining the trust of users is essential to building their confidence about the reliability of cloud computing services. It is also necessary for implementing superior security systems that ensure safe cloud computing. By maintaining transparency about the security measures, Salesforce has been able to generate trust among users. With the goal of keeping users informed and updated about the status of user data, they continuously provide live data about any attempted intrusion, malware, phishing and data related to updates and system performance. The information helps users to know the state of their data at any point in time and gives the satisfaction of knowing that it is safe. MONITORING EVENTS The better you can keep a tab on events as and when it occurs, better you would be able to maintain the security of the system. In simple words, you must stay proactive and know about what is happening on the system to ensure better security. Salesforce implements event monitoring for providing users with the details of actions that take place and even actions that the service provider takes on the system. This helps in early detection of issues, and it is possible to resolve the issues quickly before it can harm the system. AUTHORIZATION FOR ACCESSING DATA The aspect of authorization is an important security feature for any software application to ensure that only authorized persons can access the data. However, for Salesforce, the authorization aspect acquires special importance due to the multi-tenant nature of the platform where a wide range of clients works on the same platform for different services. The authorization ensures that every client can access only the data of their organization so that the information and data of other clients remain protected. By using unique organization identifiers that initiates the process of logging into every session, it is possible to ensure that only persons authorized to access the data can use it. DATA ISOLATION The virtual openness of the cloud might make it appear as if anyone can access the data stored in it, but this is far from the truth. By keeping the data isolated it is possible to keep it most secured, and Salesforce uses this technique to assure users that their data remains well protected. The server environment remains wholly secured so that the data inside remains out of reach of trespassers. To prevent unauthorized access, it uses advanced technology that not only keeps the data protected but also ensures that no matter how many users access the system, the response time remains the same. AUTHENTICATION AND ENCRYPTION The technology used by Salesforce for authorization and authentication keeps it much ahead in ensuring the best security of data. For the purpose, they use Transport Layer Security (TLS), which is the most advanced version of data security management. By using the latest technology, it is possible to ward off threats to security that also keeps increasing. Thus, data remains safe and secure in the cloud. SECURITY HEALTH CHECK Although it is the primary responsibility of the cloud service provider to ensure complete security of data, users too must share the responsibility for proper data protection. Users must ensure that password policy, network configuration, and session settings are free from security weaknesses by eradicating any identifiable weakness. To help users, the Security Health Check feature of Salesforce is useful to identify security weaknesses in their areas and rectify it. SHARING BEST SECURITY PRACTICES For maintaining real security, the service providers and users must work together as partners. It will never be possible to ensure complete security by relying on the strength of service providers alone as explained above. Even the best security system of service providers can become ineffective if users do not play their part well. Users must gather knowledge about the best security practices and implement it correctly so that they can plug all gaps at their end. For keeping users well informed about the best security practices, Salesforce shares tailor-made and organization-specific updates with users. Only when users and service providers work in perfect harmony, can you achieve the highest standard of security that keeps data free from all threats? This is when users become empowered to do their jobs efficiently and safely. > Lucy Jones has worked on the Salesforce platform for more than a decade. > Briefly, she was associated with Flosum.com, as a CRM Specialist. Having a > penchant for writing, she is planning to launch a blog site soon. Share 391 0 Share Previous How Can a Web Hosting Datacenter Location Affect Your Website’s Performance Next 10 Best Adsense Alternatives You Need To Check Now! LEAVE A REPLY CANCEL REPLY Your email address will not be published. Required fields are marked * Name* Email* Website Save my name, email, and website in this browser for the next time I comment. * ABOUT FromDev is a technology blog about Programming, Web Development, Tips & Tutorials. publisher@fromdev.com * NAVIGATION * Programming * Interactive Coding Websites * Coding Competition Sites * Web Programming Languages * Free Programming eBooks * Learn Java * Gaming * How To Be A Game Developer * Game Programming Books * 3D Game Programming Books * Game Hacking * Game Development Software * Career * Java Interview App * Work Perfumes * Programming Interview Books * Interview Preparation Guide * LinkedIn Profile Tips * Software Architect Questions * Tutorials * FRIENDS & LINKS * Developer Tools * Java Tutorial * BeginnersBook.com * Java by Nataraj * PC & Network Downloads * CATEGORIES Android 87 Posts Angular 14 Posts Animation 1 Posts Antivirus 12 Posts Apple 67 Posts Apps 193 Posts Architecture 22 Posts Artificial Intelligence 37 Posts Audio 6 Posts Backbone 2 Posts Backup 5 Posts Beginner 8 Posts BigData 34 Posts Bitcoin 35 Posts Blockchain 18 Posts Blogs 10 Posts Books 96 Posts Business 202 Posts Caching 3 Posts Camera 2 Posts Career 65 Posts Cheatsheet 5 Posts Chrome 9 Posts Cloud 44 Posts Covid-19 4 Posts Cryptocurrency 65 Posts CSS 7 Posts Customer 13 Posts Cyber 23 Posts Data 47 Posts Data Recovery 12 Posts Database 18 Posts Design 23 Posts Development 52 Posts DevOps 17 Posts Digital 1 Posts Drupal 9 Posts eBooks 16 Posts eCommerce 154 Posts Education 49 Posts Electronics 19 Posts Email 22 Posts Employee 5 Posts Ethereum 7 Posts Example Code 24 Posts Exception Handling 5 Posts FAANG 4 Posts Featured 236 Posts Finance 37 Posts Frameworks 25 Posts Freebies 36 Posts Freelancing 7 Posts Gadgets 45 Posts Gaming 68 Posts Git 5 Posts Giveaway 18 Posts Google 38 Posts GPS 1 Posts Graph 9 Posts Graphic 10 Posts Hacking 93 Posts Hadoop 15 Posts Headphones 3 Posts HealthCare 4 Posts Hosting 24 Posts How-To 56 Posts HTML5 24 Posts Icons 16 Posts Image 14 Posts Inforgraphics 10 Posts Internet 10 Posts Interview 39 Posts Investment 6 Posts iOS 37 Posts IOT 6 Posts iPhone 38 Posts IT 15 Posts Java 58 Posts JavaScript 56 Posts JDBC 3 Posts Joomla 14 Posts jQuery 9 Posts Kotlin 1 Posts Kubernetes 8 Posts Laptop 13 Posts Learning 11 Posts Library 3 Posts Liferay 3 Posts LinkedIn 3 Posts Linux 11 Posts Logo 4 Posts Mac 30 Posts Machine Learning 18 Posts Magento 19 Posts Management 17 Posts Marketing 55 Posts Maven 3 Posts Media 12 Posts Memcached 6 Posts Microservice 3 Posts Microsoft 9 Posts Mobile 79 Posts Money 7 Posts MongoDB 8 Posts Music 17 Posts MySQL 7 Posts Native App 2 Posts Neo4j 3 Posts News 2 Posts Nodejs 15 Posts NoSQL 10 Posts Obfuscation 2 Posts online 13 Posts Online Collaboration 9 Posts OpenSource 53 Posts OTT 1 Posts Outsourcing 7 Posts Password 4 Posts Payment 7 Posts PDF 13 Posts Performance 18 Posts Photo 3 Posts Photoshop 10 Posts PHP 19 Posts Plugins 4 Posts PrestaShop 2 Posts Printing 4 Posts Privacy 18 Posts Productivity 52 Posts Programming 149 Posts Project Management 2 Posts Python 29 Posts Responsive 9 Posts Review 73 Posts Robotics 8 Posts Ruby 8 Posts Sales 7 Posts Salesforce 6 Posts SAP 5 Posts Scala 4 Posts Security 166 Posts SEO 55 Posts Shopify 3 Posts Social 20 Posts Software 187 Posts Splunk 3 Posts Spring 3 Posts Spy 9 Posts SQL 9 Posts Startup 20 Posts Stock Exchange 3 Posts Storage 25 Posts Strategy 3 Posts Student 28 Posts Supply chain 1 Posts Technology 70 Posts Templates 5 Posts Testing 36 Posts Themes 33 Posts Tips 289 Posts Tomcat 4 Posts Tools 146 Posts Trading 3 Posts Trending 5 Posts Trends 52 Posts Tutorials 62 Posts Twitter 4 Posts Ubuntu 3 Posts Uncategorized 11 Posts Usability 13 Posts Video 37 Posts Video Games 27 Posts Virtual Reality 3 Posts Virtualization 3 Posts VOIP 2 Posts VPN 37 Posts Watch 4 Posts Web 236 Posts Web App 7 Posts Web Design 146 Posts Webmaster 55 Posts Wifi 7 Posts Windows 19 Posts Wordpress 56 Posts Work 14 Posts Writing 23 Posts Youtube 20 Posts Powered by FROMDEV * Sign in Remember me Log in Forgot your password? Lost your password? Please enter your email address. You will receive mail with link to set new password. Reset password Back to login close Go to mobile version