Events

Office Hours

Previous Sessions

Granular Restore at a Field/Object/App/Snapshot Level

Whether fixing small errors or recovering from major issues, Granular Restore provides the tools to maintain data integrity and business continuity with accuracy and speed.

Ability to Deploy Profiles via Repo/Pipelines

Properly managing your profiles requires strategic usage of automation and planning. We’ll explain how deploying these settings streamlines setup.

Compare Org Metadata

Differences between metadata sets can create difficulties. Join us to learn how to compare metadata across orgs for reliable consistency, track changes, and more.

Repo Syncing from Production Org

Failing to keep production and the main repository in sync leads to confusion and errors. We’ll discuss how to ensure everything fits together perfectly.

Automating Sandbox Syncing

Syncing developer sandboxes can be time consuming. Join us to learn how to automate this process and keep your team on the same page.

How to Build a Disaster Recovery Plan

You need to be prepared for the worst-case scenario. Join us to learn how to prepare for data loss or a total outage.

How to Set Up CS Code IDE Plugins & Increase Adoption

Sit down with a CodeScan expert and learn how to set up and get the most from your static code anlaysis tools.

Seamless JIRA Integration with ARM

Connecting JIRA and ARM is a great way to track work. This is your opportunity to get answers to any questions regarding setup and use of this powerful integration.

Watch On-Demand Webinars

Bringing Flow to Work

Bringing Flow to Work

Join Andrew Davis, Chief Product Officer at AutoRABIT, and Josh Corman, Founder of I am The Cavalry, for a discussion on the severity of the digital threats facing the healthcare industry and what can be done to address them.

Unveiling Hidden Risks in Salesforce the CISO Needs to Know

Unveiling Hidden Risks in Salesforce the CISO Needs to Know

As you adapt Salesforce for more of your business needs, are you ensuring your environment remains fully secure? The prevailing belief in Salesforce’s inherent security faces a challenging reality as customization with code security, mounting tech debt, third-party applications, integrations, and custom configurations introducing unseen vulnerabilities. 

The State of Salesforce Security

The State of Salesforce Security

How do data breaches, leaks, and regulatory violations happen on Salesforce? As the platform grows and your customizations expand, new threats emerge every day. Likewise, new tools and tactics to combat these threats are routinely introduced. 

Designing Secure Architectures in the Cloud

Designing Secure Architectures in the Cloud

Safely working in the cloud requires strict oversight and an intentional approach. This is true for every organization, but regulated industries require additional layers of security to properly protect sensitive information. 

Watch Customer Testimonial

DIG DEEPER

View our entire catalog of on
demand webinars