July 26, 2022·Imagine this scenario: Two separate companies have heavily customized Salesforce orgs that work perfectly for their own respective business needs. Then, one company acquires the other company. Overview The Two... Read More
Impact of Scheduling Policies on Territories in Salesforce Field Service
Within Salesforce Field Service, the proper configuration of territories is an essential component of the success of any organization’s service delivery. Defining a territory in itself doesn’t make an agent...
Read More
Why Students Should Learn Salesforce
Salesforce? Trailhead? CRM? If you’re a student and you have no idea what any of those terms mean, then you’re in the right place! Salesforce is currently the world’s #1...
Read More
Salesforce Security Pillar 2: System Access
It’s time for Part 2 of our Pillars of Salesforce Security series. If you’re not caught up, take a quick look back at our Intro Blog and Part 1: User...
Read More
How to Build a Multilingual Dynamic Email Template in 6 Simple Steps
If your business has an international workforce or is based in a multilingual country like Canada, sending multilingual emails is likely a core part of your internal and external communication...
Read More
Salesforce Security Pillar 1: User Access
If you’ve been following along with our blog, you may have already seen our original post, The 3 Pillars of Salesforce Security. In this post, we’re going to do a...
Read More
Salesforce Summer 22 Release Features – Our Top Picks
Our Salesforce team has poured over the Salesforce Summer ’22 Release notes and picked the top 5 features that they believe will have the biggest positive impact on the lives...
Read More
Key Considerations when Configuring Service Territories in Salesforce Field Service
Within Salesforce Field Service, the configuration of service territories is a very important step. Making sure that these are set up properly, and aligned with an organization’s business goals, allows...
Read More
The Three Pillars of Salesforce Security
We live in a world where data breaches are not a question of if, but a question of when. Data breaches are on the rise for the third consecutive year,...
Read More
Quality Assurance for Marketing Automation
Your metrics are only as good as your data, so how do you take steps to ensure your marketing automation (MA) system stays clean and is working optimally? The easiest...
Read More
Please do not try to build your own Lead Routing Solution in Salesforce
I beg of you. Don’t do it. One might assume that an organization that provides high end resources to enterprises would want to build big complex things. And in some...
Read More
Creating Effective User Stories for Salesforce
When managing any Salesforce project, one of the keys to success is the creation of properly written User Stories. These will provide your team with the building blocks they need...
Read More
The Art of IP Warming
So you have a marketing automation system and you are trying to make a big decision: dedicated IP or shared IP? How do you know what will work best for...
Read More
Security Guide: How to Protect and Monitor Salesforce
As the cost and risks associated with data breaches continue to climb, cybersecurity is a topic that should be a priority for every B2B SaaS company.
Download NowSign up for the latest tips & news from CloudKettle