
Email Encryption | Encrypts the content of emails and their attachments. | Not enough data | |
Messaging Encryption | Encrypts messages being sent via text or within an application. | Not enough data | |
File Transfer Encryption | Protects data with within or as it leaves your secure or local network. | Not enough data | |
Data Encryption | Provide a level of encryption of data in transit, protecting sensitive data while it lives in the backup application. | Not enough data | |
Document Encryption | Provides a level of encryption for text documents. | Not enough data | |
Full-Disk Encryption | Encrypts entire device to secure data in case it is lost or stolen. | Not enough data |
Authentication | Allows administrators to set multi-factor authentication requirements including tokens, keys, or sms messaging | Not enough data | |
Policy Enforcement | Abilities to set standards for database security and risk management. | Not enough data | |
Access Management | Allows administrators to set user access privileges to permit approved parties to access sensitive data. | Not enough data | |
Sensitive Data Compliance | Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. | Not enough data | |
Training and Guidelines | As reported in 10 Salesforce Shield reviews. Provides guidelines or training related to sensitive data compliance requirements, | 93% (Based on 10 reviews) | |
Policy Enforcement | Allows administrators to set policies for security and data governance | Not enough data | |
Compliance Monitoring | Monitors data quality and send alerts based on violations or misuse | Not enough data | |
At-Risk Analysis | Uses machine learning to identify at-risk data. | Not enough data | |
DLP Configuration | Offers data loss prevention tools to protect data from leaving the environments it is allowed to. | Not enough data | |
GDPR compliant | Meets GDPR requirements for pseudonymisation under the Data Protection by Design and by Default requirements. | Not enough data | |
CCPA compliant | Meets de-identification requirements under the CCPA. | Not enough data |
Backup | Stores data remotely, on-premise, or in cloud databases in case of recovery during disaster. | Not enough data | |
Recovery | Decrypts datasets or files or allows users access to a backup database for reintegration. | Not enough data | |
File Management | Allows administrators to set levels of encryption for file types. Allows administrators to decide which files to encrypt. | Not enough data | |
Anomaly Detection | Monitors activity within networks and alerts administrators when unusual activity occurs. | Not enough data | |
Business Glossary | Lets users build a glossary of business terms, vocabulary and definitions across multiple tools. | Not enough data | |
Data Discovery | Provides a built-in integrated data catalog that allows users to easily locate data across multiple sources. | Not enough data | |
Data Profililng | Monitors and cleanses data with the help of business rules and analytical algorithms. | Not enough data | |
Reporting and Visualization | Visualize data flows and lineage that demonstrates compliance with reports and dashboards through a single console. | Not enough data | |
Data Lineage | Provides an automated data lineage functionality which provides visibility over the entire data movement journey from data origination to destination. | Not enough data |
Sensitive Fields | The ability to create fields that automatically mask data such as credit card numbers or passwords. | Not enough data | |
Dynamic Masking | The ability to mask data in real time as it is entered. | Not enough data | |
Static Masking | The ability to apply or remove masking after data has been entered. | Not enough data | |
Consistent Masking | Tools to mask data using a consistent ruleset. | Not enough data | |
Random Masking | Tools to mask data using random characters and data. | Not enough data |
Data Modelling | Tools to (re)structure data in a manner that allows extracting insights quickly and accurately 10 reviewers of Salesforce Shield have provided feedback on this feature. | 98% (Based on 10 reviews) | |
Recommendations | Based on 10 Salesforce Shield reviews. Analyzes data to find and recommend the highest value customer segmentations. | 95% (Based on 10 reviews) | |
Workflow Management | As reported in 10 Salesforce Shield reviews. Tools to create and adjust workflows to ensure consistency. | 97% (Based on 10 reviews) | |
Dashboards and Visualizations | Presents information and analytics in a digestible, intuitive, and visually appealing way. This feature was mentioned in 10 Salesforce Shield reviews. | 95% (Based on 10 reviews) | |
Auditing | Documents access and alterations of the database for analytics and reporting. | Not enough data | |
Compliance | Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. | Not enough data | |
Management Console | Provides Administration tools/console that are easy to use and learn for routine maintenance tasks. | Not enough data | |
Policy, User, and Role Management | Creates access requirements and standards and establishes user, roles, and access rights. | Not enough data | |
Approval Workflows | Allows administrators to approve or reject access changes to using defined workflows. | Not enough data | |
Automated Provisioning | Automates provisioning and deprovisioning to reduce the amount of administrative manual work. | Not enough data | |
Bulk Changes | Reduces manual administrative work. | Not enough data | |
Centralized Management | Manages identity information from on-premise and cloud applications. | Not enough data | |
Self-Service Access Requests | Automatically allows access if users meet policy requirements. | Not enough data |
Data Preparation | Curates collected data for big data analytics solutions to analyze, manipulate, and model | Not enough data | |
Data Distribution | Facilitates the disseminating of collected big data throughout parallel computing clusters | Not enough data | |
Data Unification | Compile data from across all systems so that users can view relevant information easily. | Not enough data |
Sensitive Data Discovery | Includes funcationality to automatically discover and classify sensitive and other defined data. | Not enough data | |
Structured and Unstructured Data | Can protect both structured and unstructured data using automated discovery tools. | Not enough data | |
Encryption | Includes encryption methods to protect data. | Not enough data | |
Persistent Protection | Protects data at rest, in transit, and in use. | Not enough data | |
Data Masking | Provides data masking functionality that hides specific data within a dataset based on the data's specific use policies. | Not enough data | |
Data Governance and Access Management | Provides policies and access controls to ensure the data is only handled by permisssioned users and processes. | Not enough data | |
Audit and Reporting | Includes audit and reporting functions to know exactly what actions have been taken on data, such as who has accessed it and when. | Not enough data |
Visualization | Offers tools to help administrators visualize the flow of data, whether that be processes or data flows. | Not enough data | |
AI Algorithyms | Offers machine learning to locate data security risks and make recommendations on how to mitigate those risks. | Not enough data | |
Cross-Platforms | Allows data to move across multiple platform types and remain protected. | Not enough data |
Durability | Logs and stores multiple copies and versions of master keys. | Not enough data | |
Envelope Encryption | Implements a key hierarchy with a local data encryption key (DEK) and a key encryption key (KEK). | Not enough data | |
Automation | Allows administrative control over automated tasks related to key management, storage and distribution. | Not enough data | |
Multi-Factor Authentication | Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate. | Not enough data | |
Single Sign-On | Provides a single access point for users to access multiple cloud products without multiple logins. | Not enough data | |
BYOD support | Enables users to bring-your-own-device to access company applications. | Not enough data | |
Password Vault | Stores credentials and passwords in a secure vault. Eliminates hard-coded passwords. Hides passwords from users. | Not enough data | |
Centralized management | Ensures that credentials are centrally stored (in a secure vault) and when changed, that systems remain connected. | Not enough data | |
Role-based security | Allows privileges based on roles, such as business unit or other factors. | Not enough data | |
Live notifications | Configure which events will trigger a notification to prevent privileged access abuse in real-time. | Not enough data | |
Live session recording & playback | Offers live session recording and playback for compliance and auditing purposes. | Not enough data | |
Hide passwords | Offers the option to hide passwords when sharing with users, such as contract workers | Not enough data | |
Temporary, time-limited privilege | Allows for temporary privileges for a defined task or period of time, to reduce the risk of credential abuse. | Not enough data | |
Static pseudonymization | Offers traditional static de-identification (also known as consistent replacement), where the pseudonymized data uses the same pseudonyms across multiple data sets. For example, John Smith is replaced with Robert Fox and the Robert Fox name is used multiple times. This type of pseudonymization carries some risks of re-identification if paired with enough datasets. | Not enough data | |
Dynamic pseudonymization | Offers dynamic de-identification (also known as random replacement), where the pseudonymized data uses different pseudonyms across multiple data sets. For example, John Smith is replaced with Robert Fox once, and then the next time the data is used the name changes to Michael Jones. This type of pseudonymization carries lesser risk of re-identification if paired with many datasets. | Not enough data | |
Batch de-identification | Offers methods to de-identify large volumes of data using batch files. | Not enough data | |
Identity Verification | Identity verification functionality validates a person's identity prior to a company complying with a data subject access request. | Not enough data | |
Workflow | Offers workflows to process Data Subject Access Requests to enable multiple departments to assist when complying with user access and deletion requests. | Not enough data | |
DSAR Portal | Offers a user-facing portal for data subjects to request access to their data. | Not enough data | |
Reporting and logs | Has reporting and log functionality to prove that companies are in compliance with mandated response time, per privacy laws such as GDPR, CCPA, and others. | Not enough data | |
Dashboard | Offers a dashboard to capture, store, and manage granular user consents This feature was mentioned in 25 Salesforce Shield reviews. | 90% (Based on 25 reviews) | |
Reporting | Based on 25 Salesforce Shield reviews. Provide reporting functions showing granular data to demonstrate compliance to regulators | 90% (Based on 25 reviews) | |
Integrations | As reported in 25 Salesforce Shield reviews. Integrates with marketing software and other analytical tools | 91% (Based on 25 reviews) | |
End-user management | Allows end-users to manage their preferences online 25 reviewers of Salesforce Shield have provided feedback on this feature. | 88% (Based on 25 reviews) | |
Audit trails | As reported in 23 Salesforce Shield reviews. Shows audit trails of how user consent preferences have changed | 88% (Based on 23 reviews) | |
APIs | Offers APIs to link to your data 23 reviewers of Salesforce Shield have provided feedback on this feature. | 86% (Based on 23 reviews) | |
Mobile SDK | Offers a mobile SDK to use consent management tools on mobile apps 21 reviewers of Salesforce Shield have provided feedback on this feature. | 87% (Based on 21 reviews) | |
Customizable design | As reported in 25 Salesforce Shield reviews. Offers customizeable designs to match corporate branding | 89% (Based on 25 reviews) | |
Server-side storage | Based on 23 Salesforce Shield reviews. Offers server-side storage of consent, not client-side, for compliance reporting purposes | 91% (Based on 23 reviews) | |
Silent Deploy | Silently deploys on endpoints without alerting users. | Not enough data | |
Detect Data Movement | Detects data movement to external USBs or external drives or uploaded to cloud storage or emails and excessive printer-usage. | Not enough data | |
File and Application Activity | Tracks activities taken on files or in applications, including save, print, or delete actions. | Not enough data | |
Trigger Alerts | Sends alerts to administrators when users take insider threat actions . | Not enough data | |
Searchable Evidence | Maintains active and historical evidence in a searchable format. | Not enough data | |
Risk Scoring | Provides risk scoring for suspicious activity. | Not enough data |
API/Integrations | Integrates with third-party software to provide other features and expand functionality. | Not enough data | |
Service Integration | Integrates with major cloud service provider offerings for simplified management and distribution. | Not enough data | |
Regional Support | Supports key distribution across multi-regions to increase availability. | Not enough data | |
Scalability | Expands functionality while maintaining balanced loads. Serves growing demand without reducing functionality. | Not enough data |
Audit Logging | Provides audit logs for compliance reasons. | Not enough data | |
Activity Logging | Monitors, records, and logs both real-time and post-event activity. | Not enough data | |
Anomaly Detection | Detects abnormal user behavior to mitigate risks. | Not enough data | |
Screen Recording | Records video or screenshots of endpoint sessions. | Not enough data | |
Keystroke Logging | Logs keystrokes of users. | Not enough data | |
Sentiment Analysis | Analyzes user writing patterns to determine sentiment changes to identify disgruntled workers. | Not enough data |
Mobile SDK | Connects to mobile platforms using a mobile SDK. | Not enough data | |
Web services APIs | Offers APIs to connect products. | Not enough data |
Audit log | Creates a comprehnsive log of all activities when utilizing Privileged Access Management Software software. | Not enough data | |
Reporting | Includes reporting functionality. | Not enough data |
API Discovery | Detects new and undocumented assets as they enter a network and add them to asset inventory. | Not enough data | |
API Monitoring | Detects anomalies in functionality, user accessibility, traffic flows, and tampering. | Not enough data | |
Reporting | Provides results of the simulation and reveals potential security gaps or vulnerabilitites. | Not enough data | |
Change Management | Tools to track and implement required security policy changes. | Not enough data |
Compliance Monitoring | Monitors data quality and send alerts based on violations or misuse. | Not enough data | |
API Verification | Allows users to set customizable API verification settings to improve security requirements. | Not enough data | |
API Testing | Runs pre-scripted security tests without requiring manual work. | Not enough data |
Security and Policy Enforcement | Abilities to set standards for network, application, and API security risk management. | Not enough data | |
Anomoly Detection | Constantly monitors activity related to user behavior and compares activity to benchmarked patterns. | Not enough data | |
Bot Detection | Monitors for and rids systems of bots suspected of committing fraud or abusing applications. | Not enough data |
Access Control | Authenticates and authorizes individuals to access the data they are allowed to see and use. 10 reviewers of Salesforce Shield have provided feedback on this feature. | 95% (Based on 10 reviews) | |
Roles Management | Helps identify and manage the roles of owners and stewards of data. 10 reviewers of Salesforce Shield have provided feedback on this feature. | 90% (Based on 10 reviews) | |
Compliance Management | Based on 10 Salesforce Shield reviews. Helps adhere to data privacy regulations and norms. | 92% (Based on 10 reviews) |
Data Quality Management | As reported in 10 Salesforce Shield reviews. Defines, validates, and monitors business rules to safeguard master data readiness. | 97% (Based on 10 reviews) | |
Policy Management | Allows users to create and review data policies to make them consistent across the organization. This feature was mentioned in 10 Salesforce Shield reviews. | 97% (Based on 10 reviews) |