Salesforce Data Security Part 2

Mark your calendar for the thrilling sequel to our enlightening Salesforce webinar series! MVP Manoj Nambiranjan and our very own Business Solutions Manager, Manuj Bajaj, are back for part two. Get ready to delve deeper into the world of Salesforce data security and uncover the critical measures to shield your invaluable data from relentless attacks. This is a webinar you won't want to miss

Become a Speaker at Forcetalks Webinar!

What You Will Learn

Topics that will be covered in this webinar

1 Overview

Salesforce MVP Manoj Nambiranjan and Manuj Bajaj discuss Salesforce data security in this webinar. They emphasize the importance of platform and application security, including proactive monitoring and evolving security measures. They also highlight the significance of securing guest users and offer insights into application security.  

The conversation covers the use of tools like health checks and scale centers to ensure security. They stress the need for compliance and governance documentation, such as data dictionaries and permission reports. The discussion touches on the transition from profiles to permission sets in Salesforce.

2 Highlights


  • Platform and application security are crucial for safeguarding customer data on Salesforce. 

  • Proactive monitoring and evolving security measures help protect against threats. 

  • Collaboration with developers and business units is essential for application security. 

  • Compliance and governance documents like data dictionaries aid in maintaining security standards. 

  • Transitioning from profiles to permission sets in Salesforce is a possible future change. 


 

3 Topic Breakdown

0:00 Introduction  

1:16 Recap of Part 1  

1:47 Topic Explanation – Salesforce is a leading customer relationship management (CRM) platform that places a strong emphasis on ensuring the security of its customers' data. The company employs a comprehensive approach to secure the platform. 

13:52 Application Security Overview - Application Security layer is closest to users, vulnerable to attacks, contains personal data; securing applications vital for cybersecurity.  Salesforce has evolved to prevent data exposure and leakage vulnerabilities for guest users.   

19:25 Salesforce Security Health Checks - System Audit helps identify vulnerabilities and to employ best practices. Regularly backup data and plan for recovery to guard against data loss. Segregate data on Salesforce platform to limit impact of cyber-attacks. Educate employees about phishing, malware, and password protection to prevent human errors. Data security requires ongoing effort, evolving with technology and tactics to avoid potential disasters. 

26:21 Compliance and Governance - Five essential documents that can aid in achieving compliance, governance, and security. Data Dictionary Documents properties of Custom Objects and Fields for tracking org state. Combined Permissions Report Shows security permissions for users based on Profiles and Permission Sets. Record Level Security Report Manages sharing rules and provides detailed access info for records. Asset History Report Tracks changes and deployment of org configurations for compliance and governance. Metadata Differences Report Analyzes changes over time for security audits and compliance. Activity Timeline Report Details user interactions with Salesforce for forensics and security monitoring 

35:52 Conclusion  

38:33 Thank You  

Guest Speakers

Designation:
Salesforce MVP
About:
Experienced Consultant for Salesforce Enterprise Architecture with a demonstrated history of working in the information technology and services industry. Skilled in Software as a Service (SaaS), Business Intelligence, Solution Architecture, and Agile Methodologies.
Designation:
Business Solutions Manager, Algoworks
About:
Experienced Senior Business System Consultant with a demonstrated history of working in the Information Technology and Services Industry, skilled in Salesforce CRM, SAP ERP, SAP Business ByDesign, Functional Analysis and SAP Business One.