Debe estar validado a través de LinkedIn o un correo electrónico empresarial para acceder a esta página.
Save to My Lists

Salesforce Shield Features

What are the features of Salesforce Shield?

Compliance

  • Training and Guidelines

Administration

  • Data Modelling

Functionality

  • Dashboard
  • Reporting
  • Integrations
  • End-user management
  • Audit trails
  • APIs
  • Mobile SDK
  • Customizable design
  • Server-side storage

Security

  • Access Control
  • Roles Management
  • Compliance Management

Maintainence

  • Policy Management

Top Rated Salesforce Shield Alternatives

Filter for Features

Encryption

Email Encryption

Encrypts the content of emails and their attachments.

Not enough data

Messaging Encryption

Encrypts messages being sent via text or within an application.

Not enough data

File Transfer Encryption

Protects data with within or as it leaves your secure or local network.

Not enough data

Data Encryption

Provide a level of encryption of data in transit, protecting sensitive data while it lives in the backup application.

Not enough data

Document Encryption

Provides a level of encryption for text documents.

Not enough data

Full-Disk Encryption

Encrypts entire device to secure data in case it is lost or stolen.

Not enough data

Compliance

Authentication

Allows administrators to set multi-factor authentication requirements including tokens, keys, or sms messaging

Not enough data

Policy Enforcement

Abilities to set standards for database security and risk management.

Not enough data

Access Management

Allows administrators to set user access privileges to permit approved parties to access sensitive data.

Not enough data

Sensitive Data Compliance

Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.

Not enough data

Training and Guidelines

As reported in 10 Salesforce Shield reviews. Provides guidelines or training related to sensitive data compliance requirements,
93%
(Based on 10 reviews)

Policy Enforcement

Allows administrators to set policies for security and data governance

Not enough data

Compliance Monitoring

Monitors data quality and send alerts based on violations or misuse

Not enough data

At-Risk Analysis

Uses machine learning to identify at-risk data.

Not enough data

DLP Configuration

Offers data loss prevention tools to protect data from leaving the environments it is allowed to.

Not enough data

GDPR compliant

Meets GDPR requirements for pseudonymisation under the Data Protection by Design and by Default requirements.

Not enough data

CCPA compliant

Meets de-identification requirements under the CCPA.

Not enough data

Management

Backup

Stores data remotely, on-premise, or in cloud databases in case of recovery during disaster.

Not enough data

Recovery

Decrypts datasets or files or allows users access to a backup database for reintegration.

Not enough data

File Management

Allows administrators to set levels of encryption for file types. Allows administrators to decide which files to encrypt.

Not enough data

Anomaly Detection

Monitors activity within networks and alerts administrators when unusual activity occurs.

Not enough data

Business Glossary

Lets users build a glossary of business terms, vocabulary and definitions across multiple tools.

Not enough data

Data Discovery

Provides a built-in integrated data catalog that allows users to easily locate data across multiple sources.

Not enough data

Data Profililng

Monitors and cleanses data with the help of business rules and analytical algorithms.

Not enough data

Reporting and Visualization

Visualize data flows and lineage that demonstrates compliance with reports and dashboards through a single console.

Not enough data

Data Lineage

Provides an automated data lineage functionality which provides visibility over the entire data movement journey from data origination to destination.

Not enough data

Data Masking

Sensitive Fields

The ability to create fields that automatically mask data such as credit card numbers or passwords.

Not enough data

Dynamic Masking

The ability to mask data in real time as it is entered.

Not enough data

Static Masking

The ability to apply or remove masking after data has been entered.

Not enough data

Consistent Masking

Tools to mask data using a consistent ruleset.

Not enough data

Random Masking

Tools to mask data using random characters and data.

Not enough data

Administration

Data Modelling

Tools to (re)structure data in a manner that allows extracting insights quickly and accurately 10 reviewers of Salesforce Shield have provided feedback on this feature.
98%
(Based on 10 reviews)

Recommendations

Based on 10 Salesforce Shield reviews. Analyzes data to find and recommend the highest value customer segmentations.
95%
(Based on 10 reviews)

Workflow Management

As reported in 10 Salesforce Shield reviews. Tools to create and adjust workflows to ensure consistency.
97%
(Based on 10 reviews)

Dashboards and Visualizations

Presents information and analytics in a digestible, intuitive, and visually appealing way. This feature was mentioned in 10 Salesforce Shield reviews.
95%
(Based on 10 reviews)

Auditing

Documents access and alterations of the database for analytics and reporting.

Not enough data

Compliance

Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.

Not enough data

Management Console

Provides Administration tools/console that are easy to use and learn for routine maintenance tasks.

Not enough data

Policy, User, and Role Management

Creates access requirements and standards and establishes user, roles, and access rights.

Not enough data

Approval Workflows

Allows administrators to approve or reject access changes to using defined workflows.

Not enough data

Automated Provisioning

Automates provisioning and deprovisioning to reduce the amount of administrative manual work.

Not enough data

Bulk Changes

Reduces manual administrative work.

Not enough data

Centralized Management

Manages identity information from on-premise and cloud applications.

Not enough data

Self-Service Access Requests

Automatically allows access if users meet policy requirements.

Not enough data

Data Quality

Data Preparation

Curates collected data for big data analytics solutions to analyze, manipulate, and model

Not enough data

Data Distribution

Facilitates the disseminating of collected big data throughout parallel computing clusters

Not enough data

Data Unification

Compile data from across all systems so that users can view relevant information easily.

Not enough data

Data Protection

Sensitive Data Discovery

Includes funcationality to automatically discover and classify sensitive and other defined data.

Not enough data

Structured and Unstructured Data

Can protect both structured and unstructured data using automated discovery tools.

Not enough data

Encryption

Includes encryption methods to protect data.

Not enough data

Persistent Protection

Protects data at rest, in transit, and in use.

Not enough data

Data Masking

Provides data masking functionality that hides specific data within a dataset based on the data's specific use policies.

Not enough data

Data Governance and Access Management

Provides policies and access controls to ensure the data is only handled by permisssioned users and processes.

Not enough data

Audit and Reporting

Includes audit and reporting functions to know exactly what actions have been taken on data, such as who has accessed it and when.

Not enough data

Usability

Visualization

Offers tools to help administrators visualize the flow of data, whether that be processes or data flows.

Not enough data

AI Algorithyms

Offers machine learning to locate data security risks and make recommendations on how to mitigate those risks.

Not enough data

Cross-Platforms

Allows data to move across multiple platform types and remain protected.

Not enough data

Functionality

Durability

Logs and stores multiple copies and versions of master keys.

Not enough data

Envelope Encryption

Implements a key hierarchy with a local data encryption key (DEK) and a key encryption key (KEK).

Not enough data

Automation

Allows administrative control over automated tasks related to key management, storage and distribution.

Not enough data

Multi-Factor Authentication

Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate.

Not enough data

Single Sign-On

Provides a single access point for users to access multiple cloud products without multiple logins.

Not enough data

BYOD support

Enables users to bring-your-own-device to access company applications.

Not enough data

Password Vault

Stores credentials and passwords in a secure vault. Eliminates hard-coded passwords. Hides passwords from users.

Not enough data

Centralized management

Ensures that credentials are centrally stored (in a secure vault) and when changed, that systems remain connected.

Not enough data

Role-based security

Allows privileges based on roles, such as business unit or other factors.

Not enough data

Live notifications

Configure which events will trigger a notification to prevent privileged access abuse in real-time.

Not enough data

Live session recording & playback

Offers live session recording and playback for compliance and auditing purposes.

Not enough data

Hide passwords

Offers the option to hide passwords when sharing with users, such as contract workers

Not enough data

Temporary, time-limited privilege

Allows for temporary privileges for a defined task or period of time, to reduce the risk of credential abuse.

Not enough data

Static pseudonymization

Offers traditional static de-identification (also known as consistent replacement), where the pseudonymized data uses the same pseudonyms across multiple data sets. For example, John Smith is replaced with Robert Fox and the Robert Fox name is used multiple times. This type of pseudonymization carries some risks of re-identification if paired with enough datasets.

Not enough data

Dynamic pseudonymization

Offers dynamic de-identification (also known as random replacement), where the pseudonymized data uses different pseudonyms across multiple data sets. For example, John Smith is replaced with Robert Fox once, and then the next time the data is used the name changes to Michael Jones. This type of pseudonymization carries lesser risk of re-identification if paired with many datasets.

Not enough data

Batch de-identification

Offers methods to de-identify large volumes of data using batch files.

Not enough data

Identity Verification

Identity verification functionality validates a person's identity prior to a company complying with a data subject access request.

Not enough data

Workflow

Offers workflows to process Data Subject Access Requests to enable multiple departments to assist when complying with user access and deletion requests.

Not enough data

DSAR Portal

Offers a user-facing portal for data subjects to request access to their data.

Not enough data

Reporting and logs

Has reporting and log functionality to prove that companies are in compliance with mandated response time, per privacy laws such as GDPR, CCPA, and others.

Not enough data

Dashboard

Offers a dashboard to capture, store, and manage granular user consents This feature was mentioned in 25 Salesforce Shield reviews.
90%
(Based on 25 reviews)

Reporting

Based on 25 Salesforce Shield reviews. Provide reporting functions showing granular data to demonstrate compliance to regulators
90%
(Based on 25 reviews)

Integrations

As reported in 25 Salesforce Shield reviews. Integrates with marketing software and other analytical tools
91%
(Based on 25 reviews)

End-user management

Allows end-users to manage their preferences online 25 reviewers of Salesforce Shield have provided feedback on this feature.
88%
(Based on 25 reviews)

Audit trails

As reported in 23 Salesforce Shield reviews. Shows audit trails of how user consent preferences have changed
88%
(Based on 23 reviews)

APIs

Offers APIs to link to your data 23 reviewers of Salesforce Shield have provided feedback on this feature.
86%
(Based on 23 reviews)

Mobile SDK

Offers a mobile SDK to use consent management tools on mobile apps 21 reviewers of Salesforce Shield have provided feedback on this feature.
87%
(Based on 21 reviews)

Customizable design

As reported in 25 Salesforce Shield reviews. Offers customizeable designs to match corporate branding
89%
(Based on 25 reviews)

Server-side storage

Based on 23 Salesforce Shield reviews. Offers server-side storage of consent, not client-side, for compliance reporting purposes
91%
(Based on 23 reviews)

Silent Deploy

Silently deploys on endpoints without alerting users.

Not enough data

Detect Data Movement

Detects data movement to external USBs or external drives or uploaded to cloud storage or emails and excessive printer-usage.

Not enough data

File and Application Activity

Tracks activities taken on files or in applications, including save, print, or delete actions.

Not enough data

Trigger Alerts

Sends alerts to administrators when users take insider threat actions .

Not enough data

Searchable Evidence

Maintains active and historical evidence in a searchable format.

Not enough data

Risk Scoring

Provides risk scoring for suspicious activity.

Not enough data

Availability

API/Integrations

Integrates with third-party software to provide other features and expand functionality.

Not enough data

Service Integration

Integrates with major cloud service provider offerings for simplified management and distribution.

Not enough data

Regional Support

Supports key distribution across multi-regions to increase availability.

Not enough data

Scalability

Expands functionality while maintaining balanced loads. Serves growing demand without reducing functionality.

Not enough data

Monitoring

Audit Logging

Provides audit logs for compliance reasons.

Not enough data

Activity Logging

Monitors, records, and logs both real-time and post-event activity.

Not enough data

Anomaly Detection

Detects abnormal user behavior to mitigate risks.

Not enough data

Screen Recording

Records video or screenshots of endpoint sessions.

Not enough data

Keystroke Logging

Logs keystrokes of users.

Not enough data

Sentiment Analysis

Analyzes user writing patterns to determine sentiment changes to identify disgruntled workers.

Not enough data

Connectivity

Mobile SDK

Connects to mobile platforms using a mobile SDK.

Not enough data

Web services APIs

Offers APIs to connect products.

Not enough data

Reporting

Audit log

Creates a comprehnsive log of all activities when utilizing Privileged Access Management Software software.

Not enough data

Reporting

Includes reporting functionality.

Not enough data

API Management

API Discovery

Detects new and undocumented assets as they enter a network and add them to asset inventory.

Not enough data

API Monitoring

Detects anomalies in functionality, user accessibility, traffic flows, and tampering.

Not enough data

Reporting

Provides results of the simulation and reveals potential security gaps or vulnerabilitites.

Not enough data

Change Management

Tools to track and implement required security policy changes.

Not enough data

Security Testing

Compliance Monitoring

Monitors data quality and send alerts based on violations or misuse.

Not enough data

API Verification

Allows users to set customizable API verification settings to improve security requirements.

Not enough data

API Testing

Runs pre-scripted security tests without requiring manual work.

Not enough data

Security Management

Security and Policy Enforcement

Abilities to set standards for network, application, and API security risk management.

Not enough data

Anomoly Detection

Constantly monitors activity related to user behavior and compares activity to benchmarked patterns.

Not enough data

Bot Detection

Monitors for and rids systems of bots suspected of committing fraud or abusing applications.

Not enough data

Security

Access Control

Authenticates and authorizes individuals to access the data they are allowed to see and use. 10 reviewers of Salesforce Shield have provided feedback on this feature.
95%
(Based on 10 reviews)

Roles Management

Helps identify and manage the roles of owners and stewards of data. 10 reviewers of Salesforce Shield have provided feedback on this feature.
90%
(Based on 10 reviews)

Compliance Management

Based on 10 Salesforce Shield reviews. Helps adhere to data privacy regulations and norms.
92%
(Based on 10 reviews)

Maintainence

Data Quality Management

As reported in 10 Salesforce Shield reviews. Defines, validates, and monitors business rules to safeguard master data readiness.
97%
(Based on 10 reviews)

Policy Management

Allows users to create and review data policies to make them consistent across the organization. This feature was mentioned in 10 Salesforce Shield reviews.
97%
(Based on 10 reviews)