The Vantage View | Salesforce

Managed Packages & AppExchange: Evaluating Third-Party Salesforce Solutions

Written by David Cockrum | Jan 2, 2026 1:00:01 PM

Maximizing AppExchange Value While Minimizing Integration Risks and Hidden Costs

 

Managing thousands of customers while maintaining personalized service—this is the challenge keeping business leaders awake at night. Unlike purely transactional businesses, customer-centric organizations build long-term relationships that drive repeat business, referrals, and sustainable growth.

The promise of AppExchange is compelling: pre-built solutions that extend Salesforce without custom development. The reality is more nuanced. For any organization, third-party packages introduce risks that require systematic evaluation.

A poorly chosen managed package can create security vulnerabilities in your customer data, compliance gaps that emerge during audits, integration conflicts that break existing functionality, and vendor lock-in that constrains future flexibility.

This post provides the evaluation framework and implementation best practices needed to leverage AppExchange effectively while managing the inherent risks. As we discussed in Post 5: Data Security, Privacy & Compliance, security considerations pervade every aspect of your Salesforce implementation. Third-party solutions require equal scrutiny.

Understanding Managed vs. Unmanaged Packages

The distinction between managed and unmanaged packages has significant implications for your implementation.

Managed Packages

Characteristics:

  • Developed by Salesforce ISV (Independent Software Vendor) partners
  • Intellectual property protected (code not visible)
  • Upgradeable by the vendor
  • Support provided by vendor
  • Listed on AppExchange

Advantages:

  • Vendor maintains and improves the product
  • Security reviews by Salesforce
  • Professional support channels
  • Roadmap for future enhancements

Disadvantages:

  • Limited customization (can't modify vendor code)
  • Vendor dependency (what if they go out of business?)
  • Licensing costs
  • Potential conflicts with other packages or customizations

Unmanaged Packages

Characteristics:

  • Open source or sample code
  • Full access to all components
  • No upgrade path (changes overwrite customizations)
  • No vendor support

Advantages:

  • Full customization flexibility
  • No licensing costs (typically)
  • Complete control

Disadvantages:

  • You own all maintenance
  • No security review
  • No professional support
  • Technical debt accumulates

Use cases: Salesforce Labs samples, community-contributed utilities, learning/prototyping

AppExchange Security Review

Understanding what Salesforce's Security Review does and doesn't provide is critical for making informed decisions.

What the Security Review Covers

Salesforce requires managed packages on AppExchange to pass security review covering:

Data security and privacy:

  • Data storage and handling practices
  • Access control implementation
  • Data in transit protection

Authentication and authorization:

  • OAuth implementation
  • Session management
  • Permission verification

Secure coding practices:

  • SOQL injection prevention
  • Cross-site scripting (XSS) protection
  • CSRF protection
  • Hardcoded credentials (prohibited)

Infrastructure security:

  • External service security
  • Third-party library vulnerabilities

Testing:

  • Automated vulnerability scanning
  • Manual penetration testing

What Security Review Doesn't Guarantee

Fitness for your specific needs: Security Review verifies general security hygiene, not industry-specific compliance requirements. A package might pass Security Review but lack audit trails or data retention features you require.

Data handling practices: The review confirms secure implementation but doesn't audit the vendor's internal data handling, backup practices, or employee access controls.

Long-term viability: Security Review is point-in-time. It doesn't ensure the vendor will maintain the product, remain in business, or continue meeting your needs.

Integration compatibility: Security Review doesn't test compatibility with your specific configuration, other packages, or custom code.

Popular AppExchange Solution Categories

Understanding the landscape of available solutions helps frame evaluation.

Document Generation & E-Signatures

  • Conga Composer: Document generation and automation
  • Nintex DocGen: Document generation platform
  • DocuSign for Salesforce: Electronic signature integration
  • Adobe Sign: E-signature and document workflows

Configure, Price, Quote (CPQ)

  • Salesforce CPQ: Native quoting solution
  • PROS Smart CPQ: AI-powered pricing and quoting
  • Conga CPQ: End-to-end quote-to-cash

Data Integration & Management

  • MuleSoft: Enterprise integration platform
  • Jitterbit: Integration platform
  • Informatica: Data quality and integration
  • Salesforce Connect: External data access

Backup & Recovery

  • OwnBackup: Enterprise backup and recovery
  • Gearset: DevOps and metadata management
  • Spanning Backup: Cloud-to-cloud backup

Project Management

  • TaskRay: Project management native to Salesforce
  • Milestones PM+: Project and task tracking
  • FinancialForce PSA: Professional services automation

Marketing & Engagement

  • Marketing Cloud Account Engagement (Pardot): B2B marketing automation
  • Mailchimp for Salesforce: Email marketing integration
  • ZoomInfo: B2B data enrichment

Due Diligence Checklist for Package Evaluation

Systematic evaluation prevents costly mistakes.

Functional Fit Assessment

Requirements match:

  • Does it solve your specific business problem?
  • Feature comparison against requirements (checklist)
  • Gaps requiring custom development
  • Workflow alignment with your processes

User experience:

  • Interface quality and design
  • Ease of use for target users
  • Mobile support (if required)
  • Accessibility compliance

Scalability:

  • Transaction volume capacity
  • User count support
  • Data volume handling

Security and Compliance Evaluation

AppExchange status:

  • Security Review current and passing
  • Review date (recent vs. dated)
  • Any conditions or limitations noted

Vendor security:

  • SOC 2 Type II report available
  • ISO 27001 certification
  • Data residency options (for GDPR, etc.)
  • Encryption at rest and in transit

Compliance support:

  • Audit trail capabilities
  • Retention and archiving
  • Regulatory reporting features
  • Compliance certifications relevant to your industry

Data practices:

  • Where is data stored?
  • Who has access?
  • What are backup and recovery capabilities?
  • How is data handled at contract termination?

Vendor Assessment

Company viability:

  • Years in business
  • Funding status and runway
  • Financial stability indicators
  • Customer base size and profile

Industry expertise:

  • Current customers in your industry
  • References from similar organizations
  • Industry-specific functionality
  • Understanding of your regulatory requirements

Support quality:

  • Support hours and channels
  • SLA commitments
  • Escalation process
  • Professional services availability

Installation Best Practices

Proper installation prevents problems.

Pre-Installation Preparation

Backup everything:

  • Metadata backup via Gearset, Salesforce DevOps Center, or similar
  • Data backup via OwnBackup or export
  • Document current state configuration

Review package contents:

  • Objects being created
  • Fields being added to existing objects
  • Page layouts affected
  • Permission sets included
  • Custom settings and metadata

Identify potential conflicts:

  • Field name collisions
  • Validation rule conflicts
  • Workflow/Flow interference
  • Existing package interactions

Plan rollback:

  • Uninstall procedure documented
  • Point-in-time recovery available
  • Rollback timeline defined

Installation Process

Always sandbox first:

  • Use Full Sandbox for production-like testing
  • Never install directly to production, regardless of vendor assurances
  • Test thoroughly before production deployment

Installation options:

  • "Install for Admins Only" (recommended initially)
  • Enables controlled rollout
  • Prevents user confusion during configuration

Monitor installation:

  • Watch for errors or warnings
  • Address issues before proceeding
  • Document any manual steps required

Post-installation verification:

  • Core functionality testing
  • Integration testing
  • Permission verification
  • Performance baseline

Permission Sets & Security for Managed Packages

Managed packages introduce permissions requiring careful management.

Understanding Package Permissions

Managed packages typically include:

  • Permission sets granting access to package objects/fields
  • Custom profiles (less common now)
  • Permission set groups for bundled access

Evaluation questions:

  • What access does each permission set grant?
  • Are permissions appropriate for your user roles?
  • Do permissions align with least-privilege principles?

Permission Set Layering

Best practice is layering permissions:

  1. Base profile with minimal access
  2. Standard Salesforce permission sets for native functionality
  3. Package permission sets for third-party functionality
  4. Custom permission sets for organization-specific needs

Critical Permissions to Monitor

Certain permissions require heightened scrutiny:

"View All Data" / "Modify All Data":

  • Bypasses sharing model
  • Should rarely be assigned
  • Document business justification

"View Encrypted Data":

  • Access to all Shield encrypted fields
  • Required for some package installations
  • Minimize users with this permission

"API Enabled":

  • Allows programmatic access
  • Necessary for integrations
  • Monitor API usage

Managing Package Upgrades

Managed packages receive updates requiring management.

How Upgrades Work

Push upgrades:

  • Vendor pushes automatically
  • Typically minor updates and patches
  • Usually non-breaking changes

Pull upgrades:

  • Administrator initiates
  • Major version changes
  • May include breaking changes
  • More control but requires action

Upgrade Planning

Review release notes:

  • New features and capabilities
  • Deprecated functionality
  • Breaking changes
  • Required actions

Test in sandbox:

  • Install upgrade in sandbox first
  • Test affected functionality
  • Verify integrations still work
  • Check custom code compatibility

User communication:

  • New feature announcements
  • Training for changed functionality
  • Timeline for production deployment

Rollback planning:

  • Upgrade rollback typically not possible
  • Ensure backups current before upgrade
  • Test critical functionality immediately post-upgrade

Integration User Setup for Packages

Proper integration user configuration prevents security issues and enables functionality.

What is an Integration User?

A dedicated user account for system-to-system operations:

  • Not tied to a specific person
  • Used for automated processes
  • Consistent credentials over time
  • Purpose-specific permissions

When Integration Users Are Needed

  • Package installation: Some packages require installation as a specific user type
  • API integrations: External systems authenticating to Salesforce
  • Scheduled processes: Batch jobs and scheduled automation
  • Encryption workarounds: Bypassing Shield encryption for legitimate needs

Integration User Best Practices

Naming conventions:

  • Descriptive names: "Integration_CPQ_Prod"
  • Distinguish production from sandbox: "_Prod" vs "_Dev"
  • Indicate purpose clearly

Profile and permissions:

  • Dedicated integration profile (not System Administrator)
  • Minimal permissions needed for integration function
  • Permission sets for specific capabilities
  • No interactive login when possible

Security configuration:

  • IP restrictions where applicable
  • Login hour restrictions if possible
  • API-only access (no UI login)
  • Strong password with regular rotation

Monitoring:

  • Login history review
  • API usage tracking
  • Activity logs for audit
  • Anomaly alerting

Alternatives to Managed Packages

Not every need requires a third-party solution.

Custom Development

When to build:

  • Unique business requirements
  • Competitive differentiation
  • No suitable package exists
  • Integration requirements too specific

Considerations:

  • Initial development cost
  • Ongoing maintenance burden
  • Technical debt accumulation
  • Staff capability requirements

Native Salesforce Features

Often overlooked native capabilities:

Flow Builder:

  • Complex automation without code
  • Screen flows for guided processes
  • Scheduled flows for batch operations
  • Integration capabilities via callouts

Lightning App Builder:

  • Custom pages without code
  • Component-based assembly
  • Mobile and desktop optimization

Reports and Dashboards:

  • Powerful native analytics
  • Custom report types
  • Dashboard subscriptions

Einstein features:

  • Prediction Builder
  • Next Best Action
  • Einstein Analytics

Before purchasing a package, verify native features can't address the need.

Vendor Management & Ongoing Support

Package success requires vendor relationship management.

Setting Support Expectations

SLA understanding:

  • Response time commitments
  • Severity level definitions
  • Resolution time expectations
  • Escalation procedures

Support channels:

  • Portal, email, phone availability
  • Hours of operation
  • Emergency/after-hours process

Getting Effective Support

Issue documentation:

  • Clear problem description
  • Steps to reproduce
  • Screenshots and error messages
  • Impact and urgency

Sandbox access:

  • Provide vendor sandbox access for troubleshooting
  • Separate credentials from production
  • Remove access after issue resolution

Contract Considerations

Term and renewal:

  • Auto-renewal provisions
  • Price increase limitations
  • Cancellation notice requirements

Data portability:

  • Data export capabilities
  • Format and completeness
  • Timeline for export after termination

Service levels:

  • Uptime guarantees
  • Performance standards
  • Credit or remedy for failures

Conclusion

AppExchange and managed packages offer tremendous potential for extending Salesforce capabilities without custom development. For any organization, realizing this potential requires rigorous evaluation, careful implementation, and ongoing management.

The framework in this post—security-first evaluation, sandbox-always implementation, permission-conscious configuration, and relationship-minded vendor management—enables you to leverage the ecosystem while managing inherent risks.

Next Steps:

  • Inventory your current managed packages against the evaluation criteria
  • Identify gaps where packages might address needs better than custom development
  • Develop an AppExchange governance policy for your organization
  • Schedule regular package audits

Series Conclusion: Key Themes & Next Steps

Throughout this 8-part series, we've explored the complete landscape of Salesforce CRM implementation and optimization. As we conclude, let's synthesize the key themes that emerged across all posts.

Core Themes

1. Purpose-Built Solutions Outperform Generic Approaches

From CRM fundamentals to industry-specific configurations, the consistent message is clear: organizations that invest in tailored solutions achieve dramatically better outcomes than those accepting generic implementations. Whether it's relationship modeling for complex B2B sales, patient engagement for healthcare, or subscription management for SaaS, Salesforce's flexibility is only valuable when leveraged for your specific context.

2. Integration is the Force Multiplier

Salesforce as an isolated system delivers modest value. Salesforce as the connected hub of your technology ecosystem—integrated with ERP, marketing automation, e-commerce, and operational systems—delivers transformational value. The architectural decisions you make about integration (middleware vs. point-to-point, real-time vs. batch, API governance) will determine whether your systems amplify each other or create friction.

3. AI Changes Everything—Responsibly

The shift from Einstein's recommendations to Agentforce's autonomous execution represents a fundamental capability leap. Organizations that deploy agentic AI thoughtfully—with appropriate governance, human oversight, and ethical frameworks—will achieve competitive advantages that compound over time. Those that ignore AI or deploy it recklessly face both competitive and regulatory risks.

4. Security and Compliance are Foundation, Not Afterthought

Data protection isn't a feature to add later—it's a foundational requirement that shapes architecture, configuration, and governance from day one. Shield Platform Encryption, proper permission architecture, audit trails, and privacy compliance create the trust that enables digital transformation.

5. People Determine Success More Than Technology

The most sophisticated Salesforce implementation fails without user adoption. Change management, executive sponsorship, role-specific training, and systematic adoption measurement determine whether your CRM investment delivers value or becomes expensive shelfware.

6. The Ecosystem Extends Capabilities—With Careful Evaluation

AppExchange offers powerful extensions, but third-party packages introduce risks that require systematic management. Security review, vendor viability, integration compatibility, and total cost of ownership all factor into responsible ecosystem leverage.

Your Next Steps

If You're Evaluating Salesforce:

  1. Document your specific requirements using the frameworks in Posts 1-2
  2. Map your integration landscape against Post 3
  3. Assess AI readiness using Post 4 guidelines
  4. Evaluate compliance requirements per Post 5
  5. Identify industry-specific needs from Post 6

If You're Implementing Salesforce:

  1. Build your adoption strategy before configuration (Post 7)
  2. Establish integration architecture early (Post 3)
  3. Configure security and compliance from day one (Post 5)
  4. Plan phased rollout with pilot programs (Post 7)
  5. Evaluate AppExchange solutions systematically (Post 8)

If You're Optimizing an Existing Implementation:

  1. Audit current adoption metrics (Post 7)
  2. Identify AI opportunities (Post 4)
  3. Review security configuration (Post 5)
  4. Assess integration architecture for gaps (Post 3)
  5. Inventory managed packages for risk (Post 8)

The Strategic Imperative

Salesforce CRM is not merely a software purchase—it's a strategic platform decision that will shape how your organization builds customer relationships, drives operational efficiency, and competes in increasingly digital markets.

The organizations that succeed treat Salesforce as a long-term capability investment, continuously optimizing, extending, and leveraging the platform as business needs evolve and technology capabilities advance.

We hope this series provides the foundation for your Salesforce success. The capabilities exist. The frameworks are proven. The competitive advantage awaits those who execute thoughtfully.

Disclaimer: This content is for informational purposes only and does not constitute professional advice. Consult with qualified professionals regarding your specific business and AI implementation requirements.

About Vantage Point

Vantage Point specializes in helping financial institutions design and implement client experience transformation programs using Salesforce Financial Services Cloud. Our team combines deep Salesforce expertise with financial services industry knowledge to deliver measurable improvements in client satisfaction, operational efficiency, and business results.

 

 

About the Author

David Cockrum  founded Vantage Point after serving as Chief Operating Officer in the financial services industry. His unique blend of operational leadership and technology expertise has enabled Vantage Point's distinctive business-process-first implementation methodology, delivering successful transformations for 150+ financial services firms across 400+ engagements with a 4.71/5.0 client satisfaction rating and 95%+ client retention rate.