Events
Office Hours
Previous Sessions
Granular Restore at a Field/Object/App/Snapshot Level
Whether fixing small errors or recovering from major issues, Granular Restore provides the tools to maintain data integrity and business continuity with accuracy and speed.
Ability to Deploy Profiles via Repo/Pipelines
Properly managing your profiles requires strategic usage of automation and planning. We’ll explain how deploying these settings streamlines setup.
Compare Org Metadata
Differences between metadata sets can create difficulties. Join us to learn how to compare metadata across orgs for reliable consistency, track changes, and more.
Repo Syncing from Production Org
Failing to keep production and the main repository in sync leads to confusion and errors. We’ll discuss how to ensure everything fits together perfectly.
Automating Sandbox Syncing
Syncing developer sandboxes can be time consuming. Join us to learn how to automate this process and keep your team on the same page.
How to Build a Disaster Recovery Plan
You need to be prepared for the worst-case scenario. Join us to learn how to prepare for data loss or a total outage.
How to Set Up CS Code IDE Plugins & Increase Adoption
Sit down with a CodeScan expert and learn how to set up and get the most from your static code anlaysis tools.
Seamless JIRA Integration with ARM
Connecting JIRA and ARM is a great way to track work. This is your opportunity to get answers to any questions regarding setup and use of this powerful integration.
Watch On-Demand Webinars
Bringing Flow to Work
Join Andrew Davis, Chief Product Officer at AutoRABIT, and Josh Corman, Founder of I am The Cavalry, for a discussion on the severity of the digital threats facing the healthcare industry and what can be done to address them.
Unveiling Hidden Risks in Salesforce the CISO Needs to Know
As you adapt Salesforce for more of your business needs, are you ensuring your environment remains fully secure? The prevailing belief in Salesforce’s inherent security faces a challenging reality as customization with code security, mounting tech debt, third-party applications, integrations, and custom configurations introducing unseen vulnerabilities.
The State of Salesforce Security
How do data breaches, leaks, and regulatory violations happen on Salesforce? As the platform grows and your customizations expand, new threats emerge every day. Likewise, new tools and tactics to combat these threats are routinely introduced.
Designing Secure Architectures in the Cloud
Safely working in the cloud requires strict oversight and an intentional approach. This is true for every organization, but regulated industries require additional layers of security to properly protect sensitive information.
Watch Customer Testimonial
DIG DEEPER