Case Study · MeshMesh × Salesforce
The Engagement

How MeshMesh cleared every stage of Salesforce’s AI security review.

A multi-layered Salesforce security review — a sequence of deep technical evaluations, testing cycles, and stakeholder reviews where AI platforms face the highest scrutiny. Timelines don’t flex. Reviewers change between stages. The evidence bar only rises.

Traditional penetration testing would have satisfied a checklist. It would not have answered the questions Salesforce security was actually asking.

CLIENT
Mesh Mesh, Inc.
AI-native platform
ENGAGEMENT
Embedded AI Security Function
vCISO · Architecture · Red Team · GRC
OUTCOME
Cleared Every Stage
Multi-stage Salesforce review

Three pressures stacked at once.

01 / TIME

Timelines don't flex for security reviews.

As scrutiny around AI intensified, the bar kept rising — requiring consistent, high-confidence responses across repeated evaluations and testing cycles.

02 / SURFACE

The new security perimeter isn't fixed.

With LLMs and autonomous agents, every API call, tool invocation, and downstream service becomes part of a shifting trust boundary most teams can't fully see.

03 / SCRUTINY

Every stage brought new reviewers.

Initial security review, a Salesforce-appointed third-party assessment, and AppExchange review — each stage introduced new reviewers and raised the evidence bar.

Why a pen test alone doesn’t pass this review.

A pen test answers a static checklist. An AI security review tests how your platform behaves when attackers treat the model, its agents, and their tools as the attack surface — a shifting perimeter no checklist or static threat model covers.

TRADITIONAL CHECKLIST
A pen test answers
  • Can logins be bypassed?
  • Are APIs authenticated?
  • Are roles properly scoped?
  • Can SQL be injected?
ADVERSARIAL AI ATTACK SCENARIOS
Continuous adversarial testing
PROMPT INJECTION

Adversarial prompting, instruction override.

TOOL IMPERSONATION

Tools and APIs weaponized through agents.

MULTI-HOP INJECTION

Injection chained across agents and systems.

TRUST BOUNDARY BREACH

LLM between authenticated traffic and data.

EXCESSIVE AGENT AUTONOMY

Actions beyond user intent or authorization.

DATA EXFILTRATION

Model outputs leaking protected data.

The Solution

We didn’t deliver a test. We became a security function.

Most AI security vendors ship one of four playbooks — Scanners, Pen Test firms, vCISO firms, or GRC firms. Alone, none clears a multi-stage Salesforce security review.

ZIVIS is all four, in one team — in the room, in the code, in the policies, and in the reviewer’s meeting.

What ZIVIS Did
01

vCISO in every Salesforce review call

Jim Goldman — Salesforce's first VP of Global Security GRC, now a ZIVIS co-founder — joined every review call. Reviewers weren't being managed; they were speaking directly to someone who had built the function they operate within.

02

Continuous, shift-left security

The same team reviewed each new feature's architecture before release, then ran adversarial testing after. Most engagements break down where these don't reconcile. We closed the loop inside one team.

03

Pen testing + proprietary adversarial AI

Web, API, and LLM OWASP Top 10s executed in parallel — plus our proprietary adversarial AI taxonomy: context manipulation, tool impersonation, multi-hop prompt injection. Built on a living threat model of adversarial AI attack surfaces reviewers are now asking about.

04

GRC-as-a-Service in procurement's language

Compliance controls documented and evidenced as fast as findings were remediated. No separate GRC vendor needed to translate pen test results. Every finding tracked to verified closure with retest evidence.

Multi-stage Salesforce review — traced end to end.

No conditional approvals · No rework
01
Internal Readiness
02
Initial Security Review
03
3rd-Party Assessment
04
AppExchange Review
4 / 4 CLEARED
Approved
Time to signal
< 48h
Engagement to initial AI Security Blitz results
Report in hand
~2 wks
Across application and API layers
Deep AI coverage
~4 wks
Full proprietary adversarial scenario library
“We didn’t deliver a test. We became their security function — vCISO in the room, architecture review before features shipped, adversarial AI testing after, GRC evidence in lockstep with remediation.”

— Jake Miller, Co-Founder & CEO, ZIVIS

IN AN ACTIVE SECURITY REVIEW RIGHT NOW?
Talk to Jim & Jake directly.
zivis.ai/talk-to-us
Book a Call
Want a copy for your security team?
Download the executive case study (PDF)

Tell us about the deal.

Same situation as MeshMesh, or something different? Tell us what you're shipping and what's stalled. Jim and Jake respond within one business day.

We typically respond within 24 hours.

Your message goes directly to

Jim Goldman

Jim Goldman

Co-Founder & CISO

30+ yrs cybersecurity. Ex-Salesforce VP Enterprise Security. FBI Cyber Crime TFO.

Jake Miller

Jake Miller

Co-Founder & CEO

25+ yrs building secure enterprise systems. First engineer on Salesforce Journey Builder.