Give every team the AI assistant they need, without giving up control of your CRM.

emcee lets Salesforce admins publish a narrow, reviewable assistant surface for each team, then release it to named users with clear runtime boundaries and audit events.

The result is a focused AI assistant for recruiting, sales, or service that answers against the surface the admin approved, not against the whole CRM.

Model publish before ask Access named seats + assistant grants Proof runtime audit events
The operating model

Control the assistant before the assistant answers.

1

Connect one Salesforce org

Start from the system your team already runs on instead of exporting data into a generic AI tool.

2

Publish one assistant surface

Define which objects, fields, bundles, and tools a specific assistant is allowed to use.

3

Grant access to named users

Seat access and assistant access are assigned deliberately instead of implied by a broad workspace login.

4

Resolve and log the runtime

Every session resolves to one tenant, org, user, and assistant, with structured runtime audit events behind it.

Admin overview and setup posture
Real onboarding and release setup surface used as proof in the homepage hero.
real product screen
Admin overview onboarding screenshot

Most teams already have the data. Few have a safe way to ask it questions.

Teams do not need another vague AI promise. They need a way to turn live Salesforce context into a useful assistant without handing a generic bot broad CRM access.

Voice 01

“We already have the data in Salesforce. Nobody can get a straight answer without asking ops to build a report.”

report debt
Voice 02

“We want to use AI, but we cannot just give a generic bot broad access to our CRM and hope for the best.”

access risk
Voice 03

“If security asks who can access what, we need a better answer than ‘the AI tool can see Salesforce.’”

audit pressure

Bounded. Reviewable. Auditable.

The model has to scan in seconds: a bounded assistant surface, a review step before release, and a runtime identity model a security reviewer can actually reason about.

01

Bounded surface, not broad access.

Admins publish exactly which objects, fields, bundles, and tools each assistant is allowed to use. The assistant cannot reach further than what was published.

Scopeobjects · fields · bundles
Controlassistant-specific surface
02

Preview before publish.

The product behaves more like a release pipeline than a settings screen. An admin reviews what changed, who is affected, and what the rollback path is before the team sees it.

Reviewvalidation · impact · rollback
Modestaged release
03

One assistant per team.

A recruiter does not need the same assistant as a sales rep. Each team gets a named assistant, its own data surface, its own user list, and its own audit trail.

Runtimeorg · user · assistant
Evidenceseparate runtime sessions

Plain-language answers for IT, ops, and security.

Most evaluations start with the same four questions. Here are the answers upfront.

What is emcee?

A control layer for team-specific Salesforce assistants.

Admins publish a focused assistant surface before end users ask questions. The product is not a generic chatbot pointed at the whole org.

How does emcee control access?

By publishing objects, fields, bundles, and tools per assistant.

The assistant can only reach the data surface the admin reviewed and published. There is no general-purpose path around that published surface.

How does a user get assistant access?

Named users receive a seat and assistant access explicitly.

The user signs in through emcee's runtime access flow, chooses the relevant org and assistant when needed, and starts one bounded runtime session at a time.

What can security review today?

The published surface, the identity model, and the audit foundation.

emcee can already show the bounded access model, named-user runtime binding, and structured audit events. The polished customer export and console remain on the roadmap.

From “we want an assistant” to “the team is using it.”

The product story becomes persuasive when it feels operational. This flow shows how a real assistant moves from template to published runtime access.

1

Start from a focused template

The admin opens the catalog and starts from the Recruitment Assistant template instead of configuring from a blank page.

Template start
Recruitment template setup screenshot
2

Define the data surface

Access is shaped around the assistant's workflow rather than exposed as a broad Salesforce query path.

Configuration model
Allow Jobs · Applications · Candidates
Bundle Interviews · notes · attachments
Guard No broad org search surface
Mode Assistant-specific access plan
3

Generate preview

Review what changed, who is affected, and what the rollback target is before anyone gets access.

Release preview model
Diff Recruitment bundle updated for interview notes
Impact 12 assigned seats would receive the new release
Checks Salesforce org healthy · runtime available
Rollback previous published version preserved
4

Publish and assign

Seat access is granted deliberately, with a runtime handoff that keeps admin and end-user identity separate.

Runtime handoff
End-user portal seat access screenshot
5

Use the assistant

Questions resolve against one published assistant surface instead of a blended, generic CRM bot.

Answer shape
Role Senior recruiter for Acme Production
Pipeline 4 active candidates, 1 final interview this week
Signals Notes show strong ops fit, compensation still open
Next Schedule hiring manager review and confirm rate band

“Summarize the context for this job.”

The admin story explains control. The end-user moment explains why the product exists at all: one question, grounded in the approved assistant surface, without stitching context together by hand.

End-user access portal
Proof of seat access, org choice, and assistant-specific runtime binding.
real product screen
End-user runtime access screenshot
Tuesday morning

Before emcee

Open the job record. Open the linked applications. Open the interview notes. Open the activity history. Piece together the context by hand before you can even decide what to do next.

With a published assistant

Ask once, within the surface that was already approved.

Question Summarize the context for this job.
Answer Candidate pipeline status, recent interview signals, placement risk, next step.
Model Recruitment today. Pipeline, account management, and service follow the same pattern.

Built for teams that already live in Salesforce.

Recruitment remains the hero example because it is the most concrete today. The rest of the grid signals range without pretending everything is GA.

Recruitment

Faster recruiter context across jobs, applications, interviews, notes, and placements.

Available early access

Pipeline / opportunity

Account-aware summaries for sales teams working live deals and active follow-up.

Status early access

Account management

Customer context without opening five tabs before every check-in or escalation.

Status early access

Case management

Faster triage with history, activity context, and the right assistant surface for support.

Status early access

Lead qualification

First-pass enrichment and next-step suggestions grounded in the workflow that owns the lead.

Status early access

Built for the moment IT starts asking real questions.

Security reviewers usually start with identity, entitlement, and auditability. This page answers those basics plainly, then hands off to the deeper architecture page.

What every assistant has by default
  • Bounded data surface chosen object by object and field by field.
  • Separate admin and runtime identities, with explicit seat access.
  • Runtime sessions tied to tenant, org, user, and assistant.
  • Encrypted token storage and provider secrets referenced, not exposed.
  • Structured runtime audit events on every call.

The security page expands this into the full access flow, including how a named user reaches one org and one assistant at runtime.

Security proof surface
Runtime seat access is part of the security story, not chrome around it.
real product screen
End-user portal security proof screenshot

emcee is in early access. We work directly with each team that joins.

That means onboarding happens with a member of our team in the room, the assistant surface is reviewed together, and we stay close during the first weeks of use. It also means we are not yet self-serve and we are not making compliance claims we cannot back up.

Talk to us about your team.

Start with the workflow that creates the most report debt or context stitching today. We will talk through the assistant surface, the rollout path, and the security review questions before anyone is asked to commit.

Who this is for
Admins Need a bounded assistant per workflow or team.
Security Need a defensible architecture explanation before rollout.
Salesforce teams Already have the data but not a safe path to ask it questions.
Early access Prefer close onboarding over a fake instant sign-up.
Request early access
Request early access

A real person replies. No autoresponder theater.