Snapshot: salesforce.com - Salesforce Identity - 70630

Report Details

salesforce.com is one of the original enterprise cloud application vendors. Coupled with its flagship CRM solution, Salesforce is branching out its expertise into other areas of the cloud computing area. With the introduction of Salesforce Identity, the company is bringing its considerable infrastructure and knowledge to customers for managing application-independent identities for authentication and authorization in the cloud.

salesforce.com processes over 7 Billion logins a year on behalf of 100,000+ customers. After years of establishing identity as an integral part of its core products, the company is extending its identity paradigm from its own product line to third party clouds and applications with the introduction of Salesforce Identity.

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
Nov 02, 2012

Snapshot: salesforce.com - Salesforce Identity - 70630

salesforce.com is one of the original enterprise cloud application vendors. Coupled with its flagship CRM solution, Salesforce is branching out its expertise into other areas of the cloud computing area. With the introduction of Salesforce Identity, the company is bringing its considerable…

€190.00 Get access

Latest Related Reports

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Firewalls Are Not So Dead

Martin Kuppinger talks about firewalls and the fact that they are not really dead. [...]

Latest Insights

Hot Topics

Spotlight

Learn more

The Future of Identity & Access Management

Who will have access to what? In a complex world where everyone and everything – people, things and services - will be connected everywhere and anytime through a global cloud, IAM is going to remain one of the strongest means to protect enterprise security. Especially when firewalls as security perimeters are not sufficient any more. To take over the leading protection task, however, the IAM technology has to change fundamentally. Particularly with digital transformation of businesses, IAM moves into the center of operations. The mere defining of roles for individual access [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00