Want to see who topped the 2019 Best Software Awards?

Salesforce Platform: Shield

(11 reviews)

Salesforce Shield offers a powerful set of tools for any customer who needs an extra level of control to meet internal or regulatory compliance requirements.

Work for Salesforce Platform: Shield?

Learning about Salesforce?

We can help you find the solution that fits you best.

Salesforce Platform: Shield Features


Multi-Factor Authentication

Requires a second level of authentication, such as sms messaging or customized tokens, to access data.

(Based on 5 reviews)

Access Management

Allows administrators to set user access privileges to permit approved parties to access sensitive data.

(Based on 5 reviews)

Security and Compliance

Abilities to set standards for database security and risk management.

Not enough data available

Mobile Device Mangement

Ability to set standards for types of mobile devices and networks capable of accessing data.

Not enough data available


At-Risk Analysis

Identifies location of data that may be less protected and more vulnerable to threats.

Not enough data available

Device Control

Manages user network accessibility on laptops, mobile phones, tablets and other mobile devices.

Not enough data available

DLP Configuration

Sets protocols to alert administrators and back-up or encrypt data at rest or as incidents arise.

Not enough data available

Database Management

Administrators can access and organize data related to incidents to produce reports or make data more navigable.

(Based on 5 reviews)

Mobile App

Provides a local access point to view information about the mobile data security product.

Not enough data available


Data Encryption

Provide some level of encryption of data in transit, protecting sensitive data while it lives in the application.

Not enough data available

Data Transport

Protects data with some form of encryption as it leaves your secure or local network.

Not enough data available

Mobile VPN

Provides a virtual private network (VPN) to secure remote access to networks

Not enough data available


Stores data remotely, on-premise, or in cloud databases in case of recovery during disaster.

Not enough data available