Many of us love and prefer using Salesforce and working with Salesforce data in remote locations, on mobile devices.
With an ever-increasing popularity and high-speed user adoption of phones & tablets come questions about privacy and data protection. Volumes of sensitive information we carry in our hands & pockets nowadays are growing, and ultimately, we want to keep ourselves and our data safe. Protection against losing business or user data is now a part of every mature enterprise strategy. All while the risks of misplacing a mobile device are much higher than with a desktop or laptop.
As the adoption of business mobility increases, the enterprises deem to strengthen mobile security. Protection by user’s PIN is simply not enough anymore.
As you evaluate your enterprise mobile strategy and deploy Salesforce data into field users’ mobile devices, here is a summary of considerations about security:
Fortify your data with Device Security Management
Accessing vital business information on the go can only be 100% risk-free with the combination of advanced features and mobile application management capabilities. Device Security Management integrated within the app that carries and handles all your Salesforce data will let you have your data under control every step of the way.
How to protect data your Salesforce data while on the go to maximum – when data storage on iOS and Android is only protected by user’s PIN? Well, the standard application databases on mobile devices are NOT protected, and there are no secure storage APIs. However, user login and application configuration need to be protected. Again, this is not handled in a secure way on any mobile platform’s APIs.
So, how to handle device security on any mobile platform API? Since user session (automatic logout after 10 minutes) and app-password protection APIs are missing or on a very low level, it all must be developed from the ground up. This requires complex engineering with a high risk attached to even a smallest oversight.
Integrate MDM & MAM capabilities into your Salesforce mobile solution
Resco Mobile CRM – an all-in-one business application that lets you use and limitlessly manage Salesforce data in the field gives a whole new perspective to Salesforce mobile security.
There is no need to get external Mobile Application Management and Mobile Device Management tools to secure your data. With Resco Mobile CRM, these are incorporated natively within the application. You can see a detailed overview of each device the app is running on, divide them into groups and apply various security rules. There is a possibility to remotely lock & wipe the entire app.
Resco is not built on Salesforce (force.com platform). It is a native mobile app connecting to Salesforce via its API. Easy to implement and use, once you deploy Resco with all Salesforce data to mobile devices, you won’t need to integrate any other 3rd party app, since you will have an all-under-one-roof business tool with hundreds of capabilities to choose from.
Data security is super high on the list of Resco’s priorities – meaning, it has had zero issues with client data.
How to handle Data Encryption?
Being able to work without ‘technical’ disruptions and interruptions is a top requirement of every company, every field rep. When there is no WIFI, no or bad connection – offline mode in Resco for Salesforce comes into play. Anyone can access, create, modify or delete Salesforce data with no connection with the Resco app. The data stored locally on the device for offline functionality and faster performance of the app is always securely encrypted by default. The encryption is based on an application key, which is randomly generated when the database is created and protected by password. The key is stored in an encrypted form in the device’s file system and decrypted when required.
There is more you can do to make the app ‘bulletproof’
Ø Predefine security profiles for users (e.g. wipe application data when an incorrect password is entered three times)
Ø Take advantage of fingerprint login and multi-factor authentication using the OAuth2 authentication standard
Ø With the Resco LoginTag technology, you can use advanced sign-in via NFC tags or QR codes
Ø Enable Geofencing – allow certain actions only in certain areas and respond to the user’s actions in real-time
Ø To confirm that our mobile app is secure and that there aren’t any hidden threats, you can get the source code of our application to an independent security authority for audit and certification
Want to hear about what big of a role should security play when setting an enterprise mobile strategy in detail? Check out the brochure or contact the mobility experts from Resco at email@example.com.