Agentforce 360 Platform (formerly Salesforce Platform) Features
Application Design (5)
UI Code Extending
Gives users the ability to edit or write custom HTML, Javascript or CSS code.
Programming Code Extending
Allows users to edit or write custom code with programming languages.
Customized Branding
Provides tools for inserting brand logos, colors, quotes, and other proprietary content.
Application Templates
Provides base-level application templates to build atop and which users can customize for specifc users and actions.
Workflows
Allows the creation ofpage sequences, forms, and libraries for users navigating the application.
Data Control (9)
Data Migration
Lets users add data from existing sources when creating the initial application or changing data sources.
Data Synchronization
Continuously updates data as users or external data sources are edited.
Data Security
Encrypts or provides some form of firewall to prevent external parties from accessing sensitive data.
Data Migration
Lets users add data from existing sources when creating the initial application or changing data sources.
Data Synchronization
Continuously updates data as users or external data sources are edited.
Data Security
Encrypts or provides some form of firewall to prevent external parties from accessing sensitive data.
Data Migration
Lets users add data from existing sources when creating the initial application or changing data sources.
Data Synchronization
Continuously updates data as users or external data sources are edited.
Data Security
Encrypts or provides some form of firewall to prevent external parties from accessing sensitive data.
Publishing (6)
Application Deployment
Releases the application for access on desktop or mobile devices.
Platform Compatability
Lets users build cross-platform applications or provide specific templates for different device types.
Lifecycle Management
Provides ability to manage application and maintenance from build, throughout the release, and until it's deactivation.
Application Deployment
Releases the application for access on desktop or mobile devices.
Platform Compatibility
Lets users build cross-platform applications or provide specific templates for different device types.
Lifecycle Management
Provides ability to manage application and maintenance from build, throughout the release, and until it's deactivation.
Development (9)
Application Deployment
Provides tools for building, deploying, or integrating source code into hosted application.
Development Tools
Provides tools for writing code, editing code, syntax, debugging, or utilizing frameworks.
Development Environment
Provides tools for sharing code, tracking progress, and shipping software.
Language Support
Supports programming languages such as Java, C, or Python. Support for front-end languages such as HTML, CSS, and JavaScript.
Testing
Tests the functionality of a software application. Detects and diagnoses issues in application.
Application Templates
Provides base-level application templates to build atop and which users can customize for specifc users and actions.
UI Code Extending
Gives users the ability to edit or write custom HTML, Javascript or CSS code.
WYSIWYG Editor
Provides the ability to drag-and-drop elements into the application to customize interface.
Collaborative Development
Share, review and develop web applications remotely between members of a collaborative team.
Database (5)
Database Management
Lets developers manage database services. Provides support for different types of databases and integration methods.
Analytics
Lets users analyze deployment, user, storage, and business metrics.
Auto Scaling
Provides tools or bots that scale services and data automatically or on demand.
Backup / Recovery
Stores versions of application and data or incrementally backs up data.
Storage
Provides scalable cloud storage for different forms of data. Store analytics and records for reporting.
Infrastructure (3)
Networking
Allows users to provision networks, deliver content, balance loads, and manage traffic.
Virtual Machines
Provides virtual networks and operating systems.
Security
Secures applications, encrypt data, and manage identities.
User Interface Design (4)
WYSIWYG Editor
Provides the ability to drag-and-drop elements into the application to customize interface.
Customized Branding
Provides tools for inserting brand logos, colors, quotes, and other proprietary content.
App Templates
Provides base-level application templates to build atop and customize for specifc users and actions.
Workflow Management
Allows the creation ofpage sequences, forms, and libraries for users navigating the application.
Data Masking (5)
Sensitive Fields
The ability to create fields that automatically mask data such as credit card numbers or passwords.
Dynamic Masking
The ability to mask data in real time as it is entered.
Static Masking
The ability to apply or remove masking after data has been entered.
Consistent Masking
Tools to mask data using a consistent ruleset.
Random Masking
Tools to mask data using random characters and data.
Administration (12)
Application Deployment
Releases the application for access on desktop or mobile devices.
Native Deployment
Application hosting abilities are delivered directly by the product's vendor.
Data Security
Encrypts or provides some form of firewall to prevent external parties from accessing sensitive data.
Access Control
Allows administrators to control access to updates, releases and changes.
Scalability
Provides features to allow scaling for large organizations.
Lifecycle Management
Provides ability to manage application and maintenance from build, throughout the release, and until it's deactivation.
Policy, User, and Role Management
Creates access requirements and standards and establishes user, roles, and access rights.
Approval Workflows
Allows administrators to approve or reject access changes to using defined workflows.
Automated Provisioning
Automates provisioning and deprovisioning to reduce the amount of administrative manual work.
Bulk Changes
Reduces manual administrative work.
Centralized Management
Manages identity information from on-premise and cloud applications.
Self-Service Access Requests
Automatically allows access if users meet policy requirements.
Automation (3)
Workflow Automation
Streamline the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process.
Workflow Mapping
Visually displays connected applications and integrated data. Allows customization and management of workflow structures.
Real-Time Updates
Processing changes to data sources and applications as changes are made in real-time.
Functionality (49)
Multi-Factor Authentication
Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate.
Single Sign-On
Provides a single access point for users to access multiple cloud products without multiple logins.
BYOD support
Enables users to bring-your-own-device to access company applications.
Password Vault
Stores credentials and passwords in a secure vault. Eliminates hard-coded passwords. Hides passwords from users.
Centralized management
Ensures that credentials are centrally stored (in a secure vault) and when changed, that systems remain connected.
Role-based security
Allows privileges based on roles, such as business unit or other factors.
Live notifications
Configure which events will trigger a notification to prevent privileged access abuse in real-time.
Live session recording & playback
Offers live session recording and playback for compliance and auditing purposes.
Hide passwords
Offers the option to hide passwords when sharing with users, such as contract workers
Temporary, time-limited privilege
Allows for temporary privileges for a defined task or period of time, to reduce the risk of credential abuse.
Data Migration
Migrate data from on-premises or cloud solutions to a separate cloud environment or solution.
Data Variety
Be compatible with a variety of data types for migration.
Alerts and Logging
Send alerts for migration failures, and log migration processes to show possible root causes for failures.
Data Replication
Copy and store the same data in multiple locations.
Dashboard
Offers a dashboard to capture, store, and manage granular user consents
Reporting
Provide reporting functions showing granular data to demonstrate compliance to regulators
Integrations
Integrates with marketing software and other analytical tools
End-user management
Allows end-users to manage their preferences online
Audit trails
Shows audit trails of how user consent preferences have changed
APIs
Offers APIs to link to your data
Mobile SDK
Offers a mobile SDK to use consent management tools on mobile apps
Customizable design
Offers customizeable designs to match corporate branding
Server-side storage
Offers server-side storage of consent, not client-side, for compliance reporting purposes
Self-registration and self-service
Enables a seamless customer experience with self-registration and self-service functions, including account creation and preference management.
Authentication
Verifies user identity with authentication, which may include multiple multi-factor authentication methods.
Scalability
Scales to support growing a customer base.
Consent and preference management
Captures and manages a customer's consent and preferences to comply with data privacy laws such as GDPR and CCPA.
Social login
Offers users the option to sign in with social media accounts.
Customer data linking
Integrates with directories or other data stores that house customer data to create a complete view of a customer.
User provisioning
Simplifies or automates user provisioning, deprovisioning, and other user role changes.
Password manager
Offers password management tools to end users.
Single Sign-on
Offers single sign-on functionalities to end users, allowing them to authenticate once and be given access to all of their company accounts.
Enforces policies
Enforces user-access policies based on individual, role type, group membership or other factors to prevent unauthorized access to company systems and data.
Authentication
Authenticates users prior to granting access to company systems.
Multi-factor authentication
Offers multi-factor authentication methods to verify a user's identity.
Automation
Successfully and thoroughly automates CI/CD processes.
Integrations
Allows for additional features and functionalities in the form of pre-packaged integrations and plug-ins.
Extensibility
Plug-in capable for added resources, features, and functions within the product itself.
App complexity
Allows users to create complex applications with rich features.
App Variety
Allows users to create a wide variety of application types.
Customized Branding
Provides tools for inserting brand logos, colors, quotes, and other proprietary content.
Application Templates
Provides base-level application templates to build atop and customize for specifc users and actions.
Ease of Use
Facilitates simpler user experience through syntax highlighting, shortcuts, completion aid automation, etc.
File Management
Manage individual software component files as a part of the greater overall project.
Multi-Language Support
Provides the ability to write in more than one programming language.
Customization
Allows users to modify interface (e.g., theme selection) and layout by personal preference.
Straight-Out-the-Box Functionality
Performs core functionalities without the need of immediate additional feature or add-on installations.
Help Guides
Supplies users with basic-to-intermediate guides regarding IDE functionality and use cases.
Patching & Updates
Downloads and installs updates automatically for product improvement and pace-keeping with programming language evolution.
Monitoring (3)
Audit Logging
Provides audit logs for compliance reasons.
Activity Logging
Monitors, records, and logs both real-time and post-event activity.
Anomaly Detection
Detects abnormal user behavior to mitigate risks.
Management (7)
Backup and Recovery
Offer backup and/or recovery options for data being migrated to the cloud.
Integration Variety
Integrates with a variety of sources and/or migration targets.
Access and Security
Maintain user access and security features associated with pre-migrated data in the post-migration environment.
Real time Monitoring
Real-time view and status of every component in the cloud environment.
Configuration Management
Grants users control over application updates, versions, and alterations.
Access Control
Allows administrators to control access to updates, releases and changes.
Orchestration
Helps develop processes for reliable automated releases.
Reporting (2)
Audit log
Creates a comprehnsive log of all activities when utilizing Privileged Access Management Software software.
Reporting
Includes reporting functionality.
Type (2)
On-premises solution
Provides an IAM solution for on-prem systems.
Cloud-solution
Provides an IAM solution for cloud-based systems.
Reporting (4)
Tracking
Tracks user activities across protected systems.
Reporting
Provides reporting functionality.
Access & Permission Change Reporting
Log and report all modifications to user roles and access rights.
Compliance & Audit Trail Export
Provide standardized reports for regulatory compliance and audits.
Security (1)
Data Protection
Transform or encode data before being moved to the cloud.
Processes (3)
Pipeline Control
Grants control and organization for infrastructure and release processes.
Workflow Visualization
Allows users to easily map their and examine pipelines.
Continuous Deployment
Automates releases of the application for access on desktop, web, or or mobile devices.
Agentic AI - Software Testing (3)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Natural Language Interaction
Engages in human-like conversation for task delegation
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Agentic AI - Low-Code Development Platforms (3)
Adaptive Learning
Improves performance based on feedback and experience
Natural Language Interaction
Engages in human-like conversation for task delegation
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Agentic AI - Drag and Drop App Builder (3)
Adaptive Learning
Improves performance based on feedback and experience
Natural Language Interaction
Engages in human-like conversation for task delegation
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Agentic AI - No-Code Development Platforms (3)
Adaptive Learning
Improves performance based on feedback and experience
Natural Language Interaction
Engages in human-like conversation for task delegation
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Agentic AI - Cloud Migration (3)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Decision Making
Makes informed choices based on available data and objectives
Authentication & Authorization - Identity and Access Management (IAM) (1)
Adaptive & Contextual Access Control
Grant access based on user attributes, location, device posture or risk.
Administration & Governance - Identity and Access Management (IAM) (2)
Identity Lifecycle Management
Automate onboarding, offboarding, and access reviews throughout user lifecycles.
Self‑Service Account Management
Enable users to reset passwords and update profiles without admin support.
Generative AI - Identity and Access Management (IAM) (3)
AI‑Driven Access Anomaly Detection
Identify unusual access patterns using machine learning models.
Automated Policy Tuning
Dynamically adjust access policies based on risk and AI-generated insights.
Predictive Role Recommendations
Suggest appropriate user roles based on usage patterns and peer behavior.
AI Authentication Risk Management - Customer Identity and Access Management (CIAM) (5)
Adaptive MFA
Possesses AI-driven triggers to determine when to require MFA or stronger authentication rather than always requiring it.
Anomaly Detection
Builds profiles of known devices/environments per user and flags deviations such as new devices, new networks, and/or suspicious locations as higher risk.
Fraudulent Login Detection
Spot fraudulent behavior, such as account takeover attempts, credential stuffing, bots, and brute force attacks through the use of AI.
Adaptive Authentication Policies
Uses machine learning to analyze past authentication events and suggest optimizations to security policies (e.g. thresholds, triggers) or to adjust rules over time.
Risk-Based Authentication
Leverages AI to assign a risk score to a login attempt based on context, device, IP, historical patterns to dynamically decide whether to prompt for MFA, additional challenges, or allow seamless login.
AI Biometric & Behavioral Analysis - Customer Identity and Access Management (CIAM) (2)
Behavioral Biometric Analysis
Monitors behavioral signals including typing patterns, mouse movement, and/or touch/swipe dynamics to verify user identity either at login or continuously after login.
Liveness Detection
Uses computer vision, facial recognition, or other biometrics during onboarding or at risk events, with AI-based liveness checks to prevent spoofing or replay attacks.
AI Context-Aware Security Controls - Customer Identity and Access Management (CIAM) (2)
Account Recovery Assistants
Generates dynamic prompts to guide users through account recovery workflows.
Constraint Enforcement
Implements artificial intelligence to filter, rewrite, or block prompts that attempt to access unauthorized data, escalate privileges improperly, exploit system weaknesses, or otherwise re-provision customer access permissions.





