How Spanning Protects Your Salesforce Org From All Sides





Threats to Your Salesforce Org

Your Salesforce Org faces threats from all directions. Danger lurks at your front door, back door and even inside your house. Hover over or click on the icons to learn about these threats and how Spanning can help protect your data from them.

Malware and Virus Protection

Intercepted Traffic

Without strong encryption, data in transit is like mail without an envelope. Bad actors can both steal sensitive information or alter it, thereby compromising data integrity.

How Can Spanning Protect My House?
Privileged Service Accounts

Privileged Service Accounts

Service accounts are prime targets for cybercriminals who leverage administrator rights and limited oversight to reconfigure systems and hide their activities.

How Can Spanning Protect My House?
Poor System Controls

Poor System Controls

Ineffective controls can negatively impact system security, availability and processing integrity, putting confidentiality and privacy of data at risk.

How Can Spanning Protect My House?
Human Error

Human Error

Everyday human errors account for up to 64 percent of data loss incidents according to Aberdeen’s research. Employees inevitably delete the wrong email, contacts or critical configurations.

How Can Spanning Protect My House?
Illegitimate Deletion Requests

Illegitimate Deletion Requests

SaaS providers will honor your deletion request without question. They have no way of knowing if it’s a hasty (or malicious) request and they are not responsible for any unexpected results.

How Can Spanning Protect My House?
Malicious Insiders

Malicious Insiders

Employee action is involved in up to 23 percent of all electronic crime events, according to the CERT Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute.

How Can Spanning Protect My House?
Programmatic Errors

Programmatic Errors

Otherwise known as sync errors, those powerful tools designed to streamline business processes can ruin critical data in a flash — with no way of undoing it.

How Can Spanning Protect My House?
Ransomware

Ransomware

Beyond a typical cyberattack, these forms of industrial-scale extortion are becoming increasingly aggressive and expensive.

How Can Spanning Protect My House?
Hackers

Hackers

Whether through technical means or social engineering, aggressive individuals and organizations are constantly inventing new tactics to get to your data.

How Can Spanning Protect My House?
Malware and Virus Protection

Malware & Viruses

Rogue software can spread mayhem with programmatic efficiency without an active attack from a hacker. Many malware programs and viruses emerge from existing code after hibernation, making them especially hard to defend against.

How Can Spanning Protect My House?

Back to the House

Front Door Threats


Upfront threats that can expose your tenant or compromise your Salesforce account, leading to unauthorized access to sensitive data.
SOC-2 Compliance
Comprehensive Protection
Back it all up: base objects, custom objects, metadata, attachments, files, Force.com apps, and Chatter posts – with no limits on storage, versions, and durations.

Zero-Effort Backup
Automated Backup
Automated Salesforce backup that auto-discovers new and/or altered content to back up. This takes place as part of a recurring, incremental backup process that runs quietly in the background every day without any additional effort from your admins or users.
Transparent Reporting
Transparent Reporting
Use the audit log for an immutable, detailed record of every action done by any user within Spanning. Drill down into any backup or restore for details, including error reporting and guidance.
Point-In-Time Restore
Point-in-time restore
Enjoy total restore flexibility with access to every point-in-time Salesforce backup performed by Spanning. Daily automated backup and unlimited on-demand backup equip your organization with an abundance of historical snapshots and versions of your backed-up Salesforce data. Find the last date on which your content was in the desired state and restore it directly back.

Back to the House

Inside Threats


Threats that live and breathe in your system. They can be devastating since they can cripple your entire Salesforce ecosystem without notice and with very little effort.
Point-In-Time Restore
Metadata Restore
Recover metadata into the same org or cross-org for 17 different metadata types, including Objects, Reports, Dashboards, Emails, Layouts, Triggers, Workflows, Classes, Pages and more, directly from Spanning and within Salesforce — without using other tools.
End-User Self-Service
Rapid Search and Restore
Minimize time and effort spent on data recovery so administrators can get back to work, fast.  
Zero-Effort Backup
Granular Restore
Recover specific fields of a record, or entire records that were updated or deleted. Restore related child records, or overwrite field values during restore — you choose, then restore just what you need.
Cross-User Restore
Cross-Org restore
Easily restore data and metadata from one organization into another, with an option to anonymize specific fields during restores.

Back to the House

Back Door Threats


Threats caused by vulnerabilities on the application side. Poorly architected solutions meant to improve your Salesforce operations and security, can instead increase the risk of data loss.
SOC-2 Compliance
SOC 2 Compliance
SOC 2 is the leading auditing standard addressing the protection and privacy of sensitive data. To be SOC 2 compliant, an organization must provide evidence and undergo rigorous audits demonstrating the quality and effectiveness of their systems and controls. SOC 2 – Type II is the gold standard for technology service providers that process or store their customer’s data in the cloud and establishes their commitment to the security and protection of data.
Strong Encryption
Strong Encryption
Spanning Backup protects data at rest with 256-bit AES object-level encryption (one of the strongest block ciphers available) with unique, randomly generated encryption keys for every single object and a rotating master key protecting the unique keys.  All data in transit is also protected with Transport Layer Security (TLS) encryption.
End-User Self-Service
Customer Managed Encryption Keys
With Spanning, customers have the option of providing their own keys, giving them full control over Spanning backup data. Customers can manage their own encryption keys using Amazon Web Services (AWS) Key Management Service and revoke access to their data whenever needed.
Certifications
Third-Party Privacy and Security Certifications
Spanning Backup has been awarded the Skyhigh CloudTrust™ rating of Enterprise-Ready. Skyhigh Enterprise-Ready cloud services fully satisfy the most stringent requirements for data protection, identity verification, service security, business practices and legal protection. Additionally, Spanning is SSAE 16, SOC2 Type II certified infrastructure globally; COBIT5, HIPAA certified; FERPA; GDPR compliant.