-
6 Salesforce Security Best Practices
This post is for Salesforce Admins who want to learn more about advanced security best practices. If you haven’t already, we recommend you read Salesforce Security: Admin Checklist before you read this post. In it, we cover basic Salesforce security best practices your organization should be following. Salesforce Security Myths Before we dive into best
-
Top Five Salesforce Security Tips to Make Your Instance More Secure
As the cost and risks associated with data breaches continue to climb, cybersecurity is a topic that should be a priority for every B2B SaaS company. Recently, IBM published that the average cost of a data breach is $3.86 million. With so much at stake, organizations can’t afford to ignore security best practices. With Salesforce
-

Salesforce Security: Admin Checklist
The following post was written by Prag Ravichandran Kamalaveni, Salesforce Practice Lead at CloudKettle. Prag is an experienced consultant and an avid supporter of the Salesforce community. In addition to being a 6X Salesforce certified consultant, he has helped more than 250 people become certified as either Salesforce Administrators or Developers. Prag, was selected to speak at
-

How to Create a Dedicated Integration User in Salesforce
If you’re not sure what a Dedicated Integration User is or you’re not convinced there’s value in having an Integration User, check out our previous blog post: Why You Need a Dedicated Salesforce Integration User. Today’s post is aimed at Sales Operations leaders and Salesforce Administrators who are interested in the cost savings and increased
-

Why You Need A Dedicated Salesforce Integration User
Salesforce is the most powerful CRM in the world, in large part because of how diverse the ecosystem of tools that can be integrated with it is. Organizations have long seen the benefits of expanding the value they get out of Salesforce by integrating their marketing automation, data enrichment, collaboration, and productivity tools with their
