
Summer 15 is coming to a Salesforce org near you and is packed full of time saving and headache relieving features.
Summer 15 is right around the corner. There are a few key dates to make note of as we approach the upgrade:
- June 5th – The Second Release Weekend (NA6, NA7, NA8, NA9, NA17, NA18, NA22, EU5)
- June 12th and 13th – The Final Release Weekend (all remaining systems)
- Mid-June – Release Training Available
With over 225 new features, there’s a lot to cover in the release notes. Here are some of the features that caught my attention:
Chatter
Several Chatter improvements will be available, most notably the ability to edit your posts:
Chatter now allows you to share files to your content libraries anywhere file sharing is allowed. The permissions on your content library are respected.
Easily report on chatter engagement on standard and custom objects with custom report types. This also extends to tracking the number of feeds being editing and the type of users performing the edits. This comes in the form of revision history. Auditors will be happy to be able to see the origin of all communications.
Communities
(GA) When using the community case feed, the full case life cycle will appear in chronological order on the side panel. This will also open up more features for self service agents to customize their experience.
- Create chatter post and attach files to cases.
- View images and comments inline, making it easy to scan the feed for details.
- View all case attachments in the sidebar.
Communities default homepage is now able to be overridden from the administrator panel allowing you to specify your branded homepage without the need for setting up redirects. Clean and efficient.
Security
We all know security is every companies best friend. That is why Salesforce is bringing you the ability to:
- Monitor your data
- Encrypt files and more fields
The geographic location of users logging onto your organization will now be stored in the LoginGeo object. This object contains fields like country, city, postal code and IP address. Knowing where your users are logging in from can significantly increase your security. Example: If John works from home in Houston, Texas and his last few logins were from outside of the country you may have a problem.
Monitoring your data
In regards to monitoring your data, Salesforce has released a pilot which allows for monitoring of key data loss points (SOAP,REST, Bulk API). You will be able to know the following:
- Who saw what data
- When they saw that data
- Where they accessed the data
- What fields they accessed
- How long a query took
- How many records they accessed
Encryption
(GA) Salesforce has introduces encrypted organization-specific key fragment that is used to produce organization-specific data encryption keys. Salesforce Platform Encryption(fee based) sets up in minutes, with no additional hardware or software, and uses native strong, standards-based encryption. Platform Encryption provides an extra layer to Salesforce‘s security while enabling customers to enjoy business critical Platform features, such as search, workflow, and validation rules.
Salesforce also has non fee based out of the box encyption platform but there are some things to note:
Feature | Classic Encrypted Custom Fields (included in base user license) | Platform Encryption(additional fee applies) |
---|---|---|
Encryption at Rest | ![]() |
![]() |
Native Solution (No Hardware or Software is Required) | ![]() |
![]() |
Encryption Algorithm | 128-bit Advanced Encryption Standard (AES) | 256-bit Advanced Encryption Standard (AES) |
HSM-based Key Derivation | ![]() |
|
“Manage Encryption Keys” Permission | ![]() |
|
Generate, Export, Import, and Destroy Keys | ![]() |
![]() |
PCI-DSS L1 Compliance | ![]() |
|
Text (Encrypted) Field Type | ![]() (Dedicated custom field type, limited to 175 characters) |
|
Masking | ![]() |
![]() |
Mask Types and Characters | ![]() |
|
“View Encrypted Data” Permission is Required to Read Encrypted Field Values | ![]() |
![]() |
Email Template Values Respect “View Encrypted Data” Permission | ![]() |
|
Encrypted Standard Fields | ![]() |
|
Encrypted Attachments, Files, and Content | ![]() |
|
Encrypted Custom Short Text, Long Text Area, Phone, Email, and URL Fields | ![]() |
|
Encrypt Existing Fields for Supported Custom Field Types | ![]() |
|
Search (UI, Partial Search, Lookups) | ![]() |
|
API Access | ![]() |
![]() |
Available in Workflow Rules and Workflow Field Updates | ![]() |
|
Available in Approval Process Entry Criteria and Approval Step Criteria | ![]() |
How it works based on the flow above:
- Data is sent to the application server.
- The application server checks if the data encryption key exists in memory.
- One of the following occurs:
- If the data encryption key is found in the cache, the application server retrieves it.
- If the data encryption key is not found, the application server reads the organization’s encrypted active tenant secret from the database. The application server then requests a key from the key derivation server with accompanying information such as the encrypted tenant secret and release version. The key derivation server derives the key in the HSM using the master secret and the tenant secret and provides it to the application server.
- The encryption service encrypts the data on the application server.
- The encrypted data is stored.
To sum it all up your data your data is a little bit safer now. If you have questions on how to secure your data contact us.
Improved territories to opportunities assignment
Salesforce is providing a framework for filter based territory assignment. Here are some of the factors it can use:
- Is the opportunity excluded from filter-based territory assignment? If so, no territory is assigned.
- Does the opportunity have an account assigned and does that account have a territory assigned from the active territory model? If so, the account’s territory is assigned to the opportunity. If not, no territory is assigned.
- Does the opportunity’s assigned account have multiple territories from the active model assigned? If so, the job can use a priority value from the Territory2type object or other criteria to determine which territory (if any) to assign to the opportunity.
Enhanced visuaforce mapping features
- Easily create map makers & information modals on your maps.
- Apex queries can now be used to filter on distance and location fields.
Nice looking visual aids along with more detailed data can be presented easily with these two updates.
Duplication Management
Duplication Management is now built into record saves and updates allowing your Salesforce administrator / developer to create and handle custom defined rules for duplicate checking. Previously Salesforce users were required to implement completely custom code or obtain a 3rd party application to achieve this. This wil save you money and your developer time.
Development Lifecycle
Enhancements to the testing and development portion of the Salesforce application life cycle has been improved leading to reduced time to market for new and existing applications. Salesforce’s agility is one of the reasons it’s a leader in its space. With this latest improvement, they’ll be able to move even quicker.
Kadence Collective is always here to help you implement any of the new and existing features out there. Let us know how we can help.
- Salesforce Summer ’15 Release – Highlights - May 31, 2015
- Salesforce Summer ’15 Release – Highlights - May 31, 2015