Security Experts:

Connect with us

Hi, what are you looking for?


Cloud Security

Salesforce.Com Announces Enterprise Database Built for the Cloud today announced “Database.Com,” a new service that it’s calling the first “enterprise database built for the cloud,” leveraging the infrastructure and technology that powers it’s core business of 87,000 customers. The service isn’t scheduled to be available until 2011, maybe they can can come up with a better logo before the service goes live.Database.Com today announced “Database.Com,” a new service that it’s calling the first “enterprise database built for the cloud,” leveraging the infrastructure and technology that powers it’s core business of 87,000 customers. The service isn’t scheduled to be available until 2011, maybe they can can come up with a better logo before the service goes live.Database.Com was built from the ground up to power new enterprise applications that are cloud, mobile and social. is open for use with any language, platform and device and it enables developers to focus on building applications instead of tuning, maintaining and scaling databases. 

“We see cloud databases as a massive market opportunity that will power the shift to enterprise applications that are natively cloud, mobile and social,” said Marc Benioff, chairman and CEO, 

For CIOs, IT departments and developers, provides many benefits over client/server databases:

Developers can write their applications in Java, C#, Ruby, PHP and other languages and can run their apps on any platform –, VMforce, Amazon EC2, Google AppEngine, Heroku or Microsoft Azure.

Applications can run natively on any device, like an Android phone, Blackberry, iPad, or iPhone. These apps can all make calls using the APIs securely over the Internet.

• iPhone and iPad app developers can write native iOS apps. These apps run natively on Apple devices and connect to over the Internet.

• Android developers can write native Android apps using Java. These apps run natively on Android devices and connect to

• Web developers can build apps on Amazon EC2 using PHP and connect to

• Java developers can write an application that runs on VMforce and connects to

Security Features uses the security technologies built into’s global service delivery infrastructure, offering SSL, single-sign on, identity confirmation and anti-phishing tools. It also provides secure access, including user and role-based security and sharing rules and row-level data security. has also received some of the most stringent security certifications in the industry, including ISO 27001, SAS 70 Type II and SysTrust. powers’s service, and is one of the world’s largest enterprise databases, containing more than 20 billion records and delivering more than 25 billion transactions per fiscal quarter at an average response time of less than 300 milliseconds. combines the best features of enterprise databases, such as user management, row-level security, triggers, stored procedures, authentication and powerful APIs, with the benefits of cloud computing: no hardware or software to manage, automatic scalability, upgrades, backups, and disaster recovery. It also includes a new social data model, new developer console and more:

• Relational data store: Proven, secure and trusted database, including tables, relationships, support for a wide variety of field types, triggers and stored procedures, a query language and enterprise search;

• File storage: for documents, video, images and more;

• SOAP and REST APIs: includes standard web services APIs, making it easy for developers to access their data;

• Social data model: New kinds of apps require new data models. includes a pre-built social data model for feeds, user profiles, status updates, and a following model for all database records. includes social APIs that developers can use to easily interact with the social components of their data models. For example, they can specify followers for database records or request data feeds to display real-time data updates;

• Automatic elasticity: is built for Internet scale with automatic tuning, upgrades, backups and replication to remote data centers, and automatic creation of sandboxes for development, test and training;

• Identity and Authentication: Access can be managed via oAuth or SAML. provides user management features including identity/profiles and authentication;

• Row-level security: Point-and-click tools allow developers to define data security access rules down to the row-level. These rules drive filtering logic that for all database queries from custom apps built on top of;

• Enterprise search: includes powerful enterprise search services. Developers can access a full-text search engine that automatically respects enterprise security rules;

• Tools: includes a new developer console and ETL tools. has made a series of developer toolkits available separately to accelerate app development.

A developer toolkit will be available and supports Java, .NET, Ruby and PHP,  iOS and Android , Google AppEngine, Google Data, Microsoft Azure, Amazon Web Services, Facebook, and Twitter, and Adobe Flash/Flex. will be free for 3 users, and up to 100,000 records and 50,000 transactions/month. After that, charges $10/month for each set of 100,000 records beyond that and $10/month for each set of 150,000 transactions beyond that.


Written By

Click to comment

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.

Cloud Security

Orca Security published details on four server-side request forgery (SSRF) vulnerabilities impacting different Azure services.

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Cloud Security

Cloud Disaster Recovery - Ingredients for a Recipe that Saves Money and Offers a Safe, More Secure Situation with Greater Accessibility

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...