Connect with us

Hi, what are you looking for?


Cloud Security

Salesforce.Com Announces Enterprise Database Built for the Cloud today announced “Database.Com,” a new service that it’s calling the first “enterprise database built for the cloud,” leveraging the infrastructure and technology that powers it’s core business of 87,000 customers. The service isn’t scheduled to be available until 2011, maybe they can can come up with a better logo before the service goes live.Database.Com today announced “Database.Com,” a new service that it’s calling the first “enterprise database built for the cloud,” leveraging the infrastructure and technology that powers it’s core business of 87,000 customers. The service isn’t scheduled to be available until 2011, maybe they can can come up with a better logo before the service goes live.Database.Com was built from the ground up to power new enterprise applications that are cloud, mobile and social. is open for use with any language, platform and device and it enables developers to focus on building applications instead of tuning, maintaining and scaling databases. 

“We see cloud databases as a massive market opportunity that will power the shift to enterprise applications that are natively cloud, mobile and social,” said Marc Benioff, chairman and CEO, 

For CIOs, IT departments and developers, provides many benefits over client/server databases:

Developers can write their applications in Java, C#, Ruby, PHP and other languages and can run their apps on any platform –, VMforce, Amazon EC2, Google AppEngine, Heroku or Microsoft Azure.

Applications can run natively on any device, like an Android phone, Blackberry, iPad, or iPhone. These apps can all make calls using the APIs securely over the Internet.

• iPhone and iPad app developers can write native iOS apps. These apps run natively on Apple devices and connect to over the Internet.

• Android developers can write native Android apps using Java. These apps run natively on Android devices and connect to

Advertisement. Scroll to continue reading.

• Web developers can build apps on Amazon EC2 using PHP and connect to

• Java developers can write an application that runs on VMforce and connects to

Security Features uses the security technologies built into’s global service delivery infrastructure, offering SSL, single-sign on, identity confirmation and anti-phishing tools. It also provides secure access, including user and role-based security and sharing rules and row-level data security. has also received some of the most stringent security certifications in the industry, including ISO 27001, SAS 70 Type II and SysTrust. powers’s service, and is one of the world’s largest enterprise databases, containing more than 20 billion records and delivering more than 25 billion transactions per fiscal quarter at an average response time of less than 300 milliseconds. combines the best features of enterprise databases, such as user management, row-level security, triggers, stored procedures, authentication and powerful APIs, with the benefits of cloud computing: no hardware or software to manage, automatic scalability, upgrades, backups, and disaster recovery. It also includes a new social data model, new developer console and more:

• Relational data store: Proven, secure and trusted database, including tables, relationships, support for a wide variety of field types, triggers and stored procedures, a query language and enterprise search;

• File storage: for documents, video, images and more;

• SOAP and REST APIs: includes standard web services APIs, making it easy for developers to access their data;

• Social data model: New kinds of apps require new data models. includes a pre-built social data model for feeds, user profiles, status updates, and a following model for all database records. includes social APIs that developers can use to easily interact with the social components of their data models. For example, they can specify followers for database records or request data feeds to display real-time data updates;

• Automatic elasticity: is built for Internet scale with automatic tuning, upgrades, backups and replication to remote data centers, and automatic creation of sandboxes for development, test and training;

• Identity and Authentication: Access can be managed via oAuth or SAML. provides user management features including identity/profiles and authentication;

• Row-level security: Point-and-click tools allow developers to define data security access rules down to the row-level. These rules drive filtering logic that for all database queries from custom apps built on top of;

• Enterprise search: includes powerful enterprise search services. Developers can access a full-text search engine that automatically respects enterprise security rules;

• Tools: includes a new developer console and ETL tools. has made a series of developer toolkits available separately to accelerate app development.

A developer toolkit will be available and supports Java, .NET, Ruby and PHP,  iOS and Android , Google AppEngine, Google Data, Microsoft Azure, Amazon Web Services, Facebook, and Twitter, and Adobe Flash/Flex. will be free for 3 users, and up to 100,000 records and 50,000 transactions/month. After that, charges $10/month for each set of 100,000 records beyond that and $10/month for each set of 150,000 transactions beyond that.


Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.


The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Cloud Security

Microsoft and Proofpoint are warning organizations that use cloud services about a recent consent phishing attack that abused Microsoft’s ‘verified publisher’ status.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...